论文标题
针对一般缩放攻击的强大图像对照方案
A Robust Image Steganographic Scheme against General Scaling Attacks
论文作者
论文摘要
假定传统的秘密图像通信可以以最大的有效载荷,无损渠道以最大可能的方式传输消息,并且相关的隐志方案通常容易受到主动攻击的影响,例如JPEG重新压缩,扩展,扩展,如在社交网络上所见。尽管在对JPEG重新压缩的强大隐身志上取得了很大进展,但由于算法设计涉及的棘手的逆插值,很少有能够抵抗缩放攻击的地理方案。为了解决这个问题,本文提出了一个固定图像隐肌的框架,以抗固定形式的一般插值抗缩放的框架,或者在本文中提出了具有可变块的固定插值块,或基于过滤前进行过滤的抗偏置实现。并且可以将强大隐身志的任务制定为旨在从Stego图像中完美恢复秘密消息的限制性整数编程之一,同时最大程度地减少了封面和Stego图像之间的差异。通过引入度量标准 - 像素参与度(DPI)以识别封面图像中的可修改像素,上面的优化问题可以使用分支和结合算法有效解决(B \&B)。此外,采用了缩放的Stego图像的自定义失真功能,以进一步提高安全性能。进行了广泛的实验,这表明所提出的方案不仅可以通过清晰的边缘在安全方面胜过先前的艺术,而且还适用于在任意缩放因素(SFS)上使用各种插值技术抵抗缩放攻击。
Conventional covert image communication is assumed to transmit the message, in the securest way possible for a given payload, over lossless channels, and the associated steganographic schemes are generally vulnerable to active attacks, e.g., JPEG re-compression, scaling, as seen on social networks. Although considerable progress has been made on robust steganography against JPEG re-compression, there exist few steganographic schemes capable of resisting to scaling attacks due to the tricky inverse interpolations involved in algorithm design. To tackle this issue, a framework for robust image steganography resisting to scaling with general interpolations either in standard form with fixed interpolation block, or pre-filtering based anti-aliasing implementation with variable block, is proposed in this paper. And the task of robust steganography can be formulated as one of constrained integer programming aiming at perfectly recover the secret message from stego image while minimizing the difference between cover and stego images. By introducing a metric - the degree of pixel involvement (dPI) to identify the modifiable pixels in cover image, the optimization problem above could be effectively solved using branch and bound algorithm (B\&B). In addition, a customized distortion function for scaled stego images is adopted to further boost the security performance. Extensive experiments are carried out which demonstrate that the proposed scheme could not only outperform the prior art in terms of security by a clear margin, but also be applicable to resisting the scaling attacks with various interpolation techniques at arbitrary scaling factors (SFs).