Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Information-Theoretic Limits for Steganography in Multimedia

View through CrossRef
<pre>Steganography in multimedia aims to embed secret data into an innocent multimedia cover object. The embedding introduces some distortion to the cover object and produces a corresponding stego-object. The embedding distortion is measured by a cost function that determines the probability of detection of the existence of secret embedded data. An accurate definition of the cost function and its relation to the maximum embedding rate is the keystone for the proper evaluation of a steganographic system. Additionally, the statistical distribution of multimedia sources follows the Gibbs distribution which is a complex statistical model that prohibits a thorough mathematical analysis.</pre><pre>Previous multimedia steganographic approaches either assume a relaxed statistical distribution of multimedia sources or presume a proposition on the maximum embedding rate then try to prove the correctness of the proposition. Alternatively, this paper introduces an analytical procedure for calculating the maximum embedding rate within multimedia cover objects through a constrained optimization problem that governs the relationship between the maximum embedding rate and the probability of detection by any steganographic detector. In the optimization problem, we use the KL-divergence between the statistical distributions for the cover and the stego-objects to be our cost function as it upper limits the performance of the optimal steganographic detector. To solve the optimization problem, we establish an equivalence between the Gibbs and the correlated-multivariate-quantized-Gaussian distributions for mathematical thorough analysis. The solution to our optimization problem provides an analytical form for the maximum embedding rate in terms of the WrightOmega function. Moreover, we prove that the achieved maximum embedding rate comes in agreement with the well-known square root law (SRL) of steganography. We also establish the relationship between the achieved maximum embedding rate and the experimental results obtained from several embedding and detection steganographic techniques.</pre>
Institute of Electrical and Electronics Engineers (IEEE)
Title: Information-Theoretic Limits for Steganography in Multimedia
Description:
<pre>Steganography in multimedia aims to embed secret data into an innocent multimedia cover object.
The embedding introduces some distortion to the cover object and produces a corresponding stego-object.
The embedding distortion is measured by a cost function that determines the probability of detection of the existence of secret embedded data.
An accurate definition of the cost function and its relation to the maximum embedding rate is the keystone for the proper evaluation of a steganographic system.
Additionally, the statistical distribution of multimedia sources follows the Gibbs distribution which is a complex statistical model that prohibits a thorough mathematical analysis.
</pre><pre>Previous multimedia steganographic approaches either assume a relaxed statistical distribution of multimedia sources or presume a proposition on the maximum embedding rate then try to prove the correctness of the proposition.
Alternatively, this paper introduces an analytical procedure for calculating the maximum embedding rate within multimedia cover objects through a constrained optimization problem that governs the relationship between the maximum embedding rate and the probability of detection by any steganographic detector.
In the optimization problem, we use the KL-divergence between the statistical distributions for the cover and the stego-objects to be our cost function as it upper limits the performance of the optimal steganographic detector.
To solve the optimization problem, we establish an equivalence between the Gibbs and the correlated-multivariate-quantized-Gaussian distributions for mathematical thorough analysis.
The solution to our optimization problem provides an analytical form for the maximum embedding rate in terms of the WrightOmega function.
Moreover, we prove that the achieved maximum embedding rate comes in agreement with the well-known square root law (SRL) of steganography.
We also establish the relationship between the achieved maximum embedding rate and the experimental results obtained from several embedding and detection steganographic techniques.
</pre>.

Related Results

Multimedia Representation
Multimedia Representation
In recent years, the rapid expansion of multimedia applications, partly due to the exponential growth of the Internet, has proliferated over the daily life of computer users (Yang ...
Multimedia Information Retrieval at a Crossroad
Multimedia Information Retrieval at a Crossroad
From late 1990s to early 2000s, the availability of powerful computing capability, large storage devices, high-speed networking, and especially the advent of the Internet, led to a...
Enhancing Security through Advanced Image Steganography Techniques
Enhancing Security through Advanced Image Steganography Techniques
The project aims to explore various types of steganography techniques, with a focus on image steganography, where information is concealed within images. This involves decrypting t...
Proposed Algorithm Using Image in Multi Level Text Steganography
Proposed Algorithm Using Image in Multi Level Text Steganography
The newly emerging technologies enable us to deliver and share the information in the form of multimedia. However, the major issue is security without disturbing the personal data....
Construct a Teaching System Combining Image Linguistics and Multimedia Technology
Construct a Teaching System Combining Image Linguistics and Multimedia Technology
At present, the research on the theoretical system of multimedia image linguistics in my country is very limited. In order to further improve and develop the theoretical system of ...
Reversible Image Steganography: A Review of Existing GAN-based Models
Reversible Image Steganography: A Review of Existing GAN-based Models
Image steganography is the method of concealing information, which can be text, image, or video, under a cover image in a way that it is invisible to the human eyes. Payload capaci...
Multimedia Encryption
Multimedia Encryption
Multimedia technology becomes more and more popular in today’s digitized and networked world. Many multimedia-based services, such as pay-TV, remote video conferencing, medical ima...
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Signaling in Next Generation IP-based networks heavily relies in the family of multimedia signaling protocols defined by IETF. Two of these signaling protocols are RTSP and SIP, wh...

Back to Top