Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Information-Theoretic Limits for Steganography in Multimedia

View through CrossRef
Steganography in multimedia aims to embed secret data into an innocent multimedia cover object. The embedding introduces some distortion to the cover object and produces a corresponding stego-object. The embedding distortion is measured by a cost function that determines the probability of detection of the existence of secret embedded data. An accurate definition of the cost function and its relation to the maximum embedding rate is the keystone for the proper evaluation of a steganographic system. Additionally, the statistical distribution of multimedia sources follows the Gibbs distribution which is a complex statistical model that prohibits a thorough mathematical analysis. Previous multimedia steganographic approaches either assume a relaxed statistical distribution of multimedia sources or presume a proposition on the maximum embedding rate then try to prove the correctness of the proposition. Alternatively, this paper introduces an analytical procedure for calculating the maximum embedding rate within multimedia cover objects through a constrained optimization problem that governs the relationship between the maximum embedding rate and the probability of detection by any steganographic detector. In the optimization problem, we use the KL-divergence between the statistical distributions for the cover and the stego-objects to be our cost function as it upper limits the performance of the optimal steganographic detector. To solve the optimization problem, we establish an equivalence between the Gibbs and the correlated-multivariate-quantized-Gaussian distributions for mathematical thorough analysis. The solution to our optimization problem provides an analytical form for the maximum embedding rate in terms of the WrightOmega function. Moreover, we prove that the achieved maximum embedding rate comes in agreement with the well-known square root law (SRL) of steganography. We also establish the relationship between the achieved maximum embedding rate and the experimental results obtained from several embedding and detection steganographic techniques.
Institute of Electrical and Electronics Engineers (IEEE)
Title: Information-Theoretic Limits for Steganography in Multimedia
Description:
Steganography in multimedia aims to embed secret data into an innocent multimedia cover object.
The embedding introduces some distortion to the cover object and produces a corresponding stego-object.
The embedding distortion is measured by a cost function that determines the probability of detection of the existence of secret embedded data.
An accurate definition of the cost function and its relation to the maximum embedding rate is the keystone for the proper evaluation of a steganographic system.
Additionally, the statistical distribution of multimedia sources follows the Gibbs distribution which is a complex statistical model that prohibits a thorough mathematical analysis.
Previous multimedia steganographic approaches either assume a relaxed statistical distribution of multimedia sources or presume a proposition on the maximum embedding rate then try to prove the correctness of the proposition.
Alternatively, this paper introduces an analytical procedure for calculating the maximum embedding rate within multimedia cover objects through a constrained optimization problem that governs the relationship between the maximum embedding rate and the probability of detection by any steganographic detector.
In the optimization problem, we use the KL-divergence between the statistical distributions for the cover and the stego-objects to be our cost function as it upper limits the performance of the optimal steganographic detector.
To solve the optimization problem, we establish an equivalence between the Gibbs and the correlated-multivariate-quantized-Gaussian distributions for mathematical thorough analysis.
The solution to our optimization problem provides an analytical form for the maximum embedding rate in terms of the WrightOmega function.
Moreover, we prove that the achieved maximum embedding rate comes in agreement with the well-known square root law (SRL) of steganography.
We also establish the relationship between the achieved maximum embedding rate and the experimental results obtained from several embedding and detection steganographic techniques.

Related Results

A Generic Taxonomy for Steganography Methods
A Generic Taxonomy for Steganography Methods
A unified understanding of terms and their applicability is essential for every scientific discipline: steganography is no exception. Being divided into several domains (for instan...
A Generic Taxonomy for Steganography Methods
A Generic Taxonomy for Steganography Methods
<p>A unified understanding of terms and their applicability is essential for every scientific discipline: steganography is no exception. Being divided into several domains (f...
A Generic Taxonomy for Steganography Methods
A Generic Taxonomy for Steganography Methods
A unified understanding of terms and their applicability is essential for every scientific discipline: steganography is no exception. Being divided into several domains (for instan...
Multimedia Representation
Multimedia Representation
In recent years, the rapid expansion of multimedia applications, partly due to the exponential growth of the Internet, has proliferated over the daily life of computer users (Yang ...
Implementasi Multimedia Software Engineering Methodology Pada Pembuatan Perangkat Promosi Wisata
Implementasi Multimedia Software Engineering Methodology Pada Pembuatan Perangkat Promosi Wisata
Abstract—Artikel ini membahas tentang perbedaan antara multimedia interaktif dan non-interaktif. Multimedia non-interaktif ditampilkan dalam format linier dan pengguna tidak dapat ...
Forensic analysis of video steganography tools
Forensic analysis of video steganography tools
Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital stega...
Multimedia Information Retrieval at a Crossroad
Multimedia Information Retrieval at a Crossroad
From late 1990s to early 2000s, the availability of powerful computing capability, large storage devices, high-speed networking, and especially the advent of the Internet, led to a...
Enhancing Security through Advanced Image Steganography Techniques
Enhancing Security through Advanced Image Steganography Techniques
The project aims to explore various types of steganography techniques, with a focus on image steganography, where information is concealed within images. This involves decrypting t...

Back to Top