Fuzzy Relative Entropy Security Measures for Image Steganographic System
OUYANG Chun-juan1,2, LI Xia1,2, LI Bin1,2
1. College of Information Engineering, Shenzhen University, Shenzhen, Guangdong 518060, China;
2. Shenzhen Key Laboratory of Modern Communications and Information Processing, Shenzhen, Guangdong 518060, China
Abstract:Fuzzy relative entropy is capable of measuring the difference between two fuzzy sets.According to the indeterminacy of steganography communication,a fuzzy empirical matrix for n-th order Markov model is defined.New security measures in terms of fuzzy relative entropy and weighted fuzzy relative entropy are introduced for steganographic system.These new security measures are proved to be nonnegative,symmetric and uniform.Furthermore,some existing security measures under a deterministic data statistical distribution model can be derived from the proposed security measures.Simulation results show the new security measures have better evaluating ability than the existing deterministic security measures under the same modeling condition.In addition,the higher the order of the Markov model,the better the measuring ability of the proposed security measures.The proposed security measures may also provide more insights for designs of secure steganographic algorithms.
[1] 王朔中,张新鹏,张卫明.以数字图像为载体的隐写分析研究进展[J].计算机学报,2009,32(7):1247-1263. Wang Shuo-Zhong,Zhang Xin-Peng,Zhang Wei-Ming.Recent advances in image-based steganalysis research [J].Chinese Journal of Computers,2009,32(7):1247-1263.(in Chinese)[2] Ross Anderson.Why information security is hard—an economic perspective.Proceedings of 17th Annual Computer Security Applications Conference.Washington,DC:IEEE Press,2001.39-40.[3] 张良.一种基于幅度预测的隐写分析方法[J].电子学报,2010,38(11):2704-2707. ZHANG Liang.A Steganalysis scheme using magnitude prediction [J].Acta Electronica Sinica,2010,38(11):2704-2707.(in Chinese)[4] 毛家发,钮心忻,杨义先,时书剑.基于JPEG净图定量描述的隐写分析方法[J].电子学报,2011,39(8):1907-1912. Mao Jia-fa,Niu Xin-xin,YANGYi-xian,Shi Shu-jia.Steganalysis method based on JPEG cover image quantitative describing [J].Acta Electronica Sinica,2011,39(8):1907-1912.(in Chinese)[5] Cachin C.An information-theoretic model for Steganography [J].Information and Computation,2004,192(1):41-56.[6] Sullivan K,Madhow U,Chandrasekaran S,et al.Steganalysis for Markov cover data with applications to images [J].IEEE Transactions on Information Forensics and Security,2006,1(2):275-287.[7] 张湛,刘光杰,王俊文等.基于图像高阶Markov链模型的扩频隐写分析[J].电子学报,2010,38(11):2578-2584. Zhang Zhan,Liu Guangjie,Wang Junwen,et al.Steganalysis of spread spectrum image steganography based on high-order Markov chain model [J].Acta Electronica Sinica,2010,38(11):2578-2584.(in Chinese)[8] 张湛,瞿芳,刘光杰等.基于高阶Markov链模型的数字图像隐写安全性评估方法[J].信息与控制,2010,39(4):455-461. Zhang Zhan,Qu Fang,Liu Guangjie,et al.A novel security evaluation method for digital image steganography based on high-order Markov chain model [J].Information and Control,2010,39(4):455-461.(in Chinese)[9] Pevn ý T,J Fridrich.Benchmarking for steganography.Proceedings of the 10th Information Hiding International Workshop.Berlin:Springer Verlag,2008.251-267.[10] 王维琼.模糊信息度量的拓展及应用.西北大学,2005.7-10. Wang Weiqiong.Expansion and application of the fuzzy information measure.Northwest University,2005.7-10.(in Chinese)[11] Xie Weixin,Bedrosian S D.Information measure for fuzzy sets [J].IEEE Transactions on System,Man and Cybernetics,1984,14(1):151-156.[12] 胡为,胡静涛.加权模糊相对熵在电机转子故障模糊识别中的应用[J].信息与控制,2009,38(3):326-329. Hu Wei,Hu Jingtao.Application of weighted fuzzy relative entropy to fuzzy recognition of motor rotor fault [J].Information and Control,2009,38(3):326-329.(in Chinese)[13] Sharp T.An implementation of key-based digital signal steganography [J].Proceedings of Information Hiding Workshop,2001,2137:13-26.[14] 戴跃伟,刘光杰,叶曙光.基于Hilbert填充曲线的自适应隐写[J].电子学报,2008,36(12A):35-38. Dai Yuewei,Liu Guangjie,Ye Shuguang.Adaptive steganography based on Hilbert filling curve [J].Acta Electronica Sinica,2008,36(12A):35-38.(in Chinese)[15] United States Department of Agriculture,Natural resources conservation service photo gallery. http://photo gallery.nrcs.usda.gov,2002.[16] BOWS-2 database of 10,000 watermarked images.http://bows2.gipsa-lab.inpg.fr/BOWS2Image DataBase.tgz.2008.[17] Xuan G,Shi Y,Gao J,et al.Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions [J].Computer Science,2005,3727:262-265.