Title :
Multi-bit Adaptive Embedding Algorithm for Anti-forensic Steganography
Author :
Chen, Rong-Jian ; Horng, Shi-Jinn
Author_Institution :
Dept. of Electron. Eng., Nat. United Univ., Miaoli, Taiwan
Abstract :
Multi-bit minimum error replacement (MER) is a method that can embed multi-bit logo/secret data into k least-significant bits (LSBs) of cover data only introduces minimum embedding error (MEE). However, k-LSBs MER suffers from weak anti-forensics. Moreover, it is unfortunate because other previous steganography works have seldom considered both large embedding capacity and high image quality. Therefore, this work proposes an anti-forensic steganography system using multi-bit adaptive embedding algorithm with flexible bit location to overcome the problem of forensics and to achieve high performance includes both large embedding capacity and high image quality. The proposed embedding algorithm embeds and hides multi-bit (k-bit, k ≥ =1) logo/secret data into any adjoining (starting with the ith location) k-bit bibi-1⋯Kbi-k+1 of cover data only introduces MEE in the range of 0 to -±(2k-1)2i-k, moreover, its flexible bit location enhances the embedded security as security increases as embedding location increases. As the proposed embedding algorithm can embed multi-bit logo/secret data into any adjoining bits of cover data and has large embedding capacity and high embedding quality, this method was applied to develop image steganography systems. Finally, anti-forensics of the proposed steganography systems are demonstrated using the visual attack and the statistical attack of Chi-square analysis.
Keywords :
computer forensics; embedded systems; image coding; statistical analysis; steganography; Chi-square analysis; anti-forensic steganography; embedded security; embedding capacity; flexible bit location; image quality; image steganography system; least-significant bit; minimum embedding error; multibit adaptive embedding algorithm; multibit logo data; multibit minimum error replacement method; secret data; statistical attack; visual attack; Algorithm design and analysis; Analytical models; Flowcharts; Hardware; Security; Software; Software algorithms; anti-forensics; flexible bit location; minimum-error replacement; multi-bit embedding; steganographgy;
Conference_Titel :
Biometrics and Security Technologies (ISBAST), 2012 International Symposium on
Conference_Location :
Taipei
Print_ISBN :
978-1-4673-0917-2
DOI :
10.1109/ISBAST.2012.29