Decomposing Joint Distortion for Adaptive Steganography
Recent advances on adaptive steganography imply that the security of steganography can be improved by exploiting the mutual impact of modifications between adjacent cover elements, such as pixels of images, which is called a nonadditive distortion model. In this paper, we propose a framework for non...
Ausführliche Beschreibung
Autor*in: |
Zhang, Weiming [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2017 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: IEEE transactions on circuits and systems for video technology - New York, NY : Institute of Electrical and Electronics Engineers, 1991, 27(2017), 10, Seite 2274-2280 |
---|---|
Übergeordnetes Werk: |
volume:27 ; year:2017 ; number:10 ; pages:2274-2280 |
Links: |
---|
DOI / URN: |
10.1109/TCSVT.2016.2587388 |
---|
Katalog-ID: |
OLC1998175723 |
---|
LEADER | 01000caa a2200265 4500 | ||
---|---|---|---|
001 | OLC1998175723 | ||
003 | DE-627 | ||
005 | 20230715080951.0 | ||
007 | tu | ||
008 | 171125s2017 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1109/TCSVT.2016.2587388 |2 doi | |
028 | 5 | 2 | |a PQ20171125 |
035 | |a (DE-627)OLC1998175723 | ||
035 | |a (DE-599)GBVOLC1998175723 | ||
035 | |a (PRQ)c1087-37481399a7127be623fbe0b95667218f58665c6c6e53b8fb730836a7f0360b940 | ||
035 | |a (KEY)0203241420170000027001002274decomposingjointdistortionforadaptivesteganography | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 620 |q DNB |
100 | 1 | |a Zhang, Weiming |e verfasserin |4 aut | |
245 | 1 | 0 | |a Decomposing Joint Distortion for Adaptive Steganography |
264 | 1 | |c 2017 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
520 | |a Recent advances on adaptive steganography imply that the security of steganography can be improved by exploiting the mutual impact of modifications between adjacent cover elements, such as pixels of images, which is called a nonadditive distortion model. In this paper, we propose a framework for nonadditive distortion steganography by defining joint distortion on pixel blocks. To reduce the complexity for minimizing joint distortion, we design a coding method to decompose the joint distortion (abbreviated to DeJoin) into distortion on individual pixels; thus, the message can be efficiently embedded with syndrome-trellis codes. We prove that DeJoin can approach the lower bound of joint distortion. As an example, we define joint distortion according to the principle of synchronizing modification direction and then design steganographic algorithms with DeJoin. The experimental results show that the proposed method outperforms previous nonadditive distortion steganography when resisting the state-of-the-art steganalysis. | ||
650 | 4 | |a Adaptation models | |
650 | 4 | |a Computational complexity | |
650 | 4 | |a Encoding | |
650 | 4 | |a Distortion | |
650 | 4 | |a nonadditive distortion | |
650 | 4 | |a Covert communication | |
650 | 4 | |a steganography | |
650 | 4 | |a Additives | |
650 | 4 | |a joint distortion | |
650 | 4 | |a Entropy | |
700 | 1 | |a Zhang, Zhuo |4 oth | |
700 | 1 | |a Zhang, Lili |4 oth | |
700 | 1 | |a Li, Hanyi |4 oth | |
700 | 1 | |a Yu, Nenghai |4 oth | |
773 | 0 | 8 | |i Enthalten in |t IEEE transactions on circuits and systems for video technology |d New York, NY : Institute of Electrical and Electronics Engineers, 1991 |g 27(2017), 10, Seite 2274-2280 |w (DE-627)130978469 |w (DE-600)1074294-3 |w (DE-576)025194771 |x 1051-8215 |7 nnns |
773 | 1 | 8 | |g volume:27 |g year:2017 |g number:10 |g pages:2274-2280 |
856 | 4 | 1 | |u http://dx.doi.org/10.1109/TCSVT.2016.2587388 |3 Volltext |
856 | 4 | 2 | |u http://ieeexplore.ieee.org/document/7505924 |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-TEC | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_2002 | ||
951 | |a AR | ||
952 | |d 27 |j 2017 |e 10 |h 2274-2280 |
author_variant |
w z wz |
---|---|
matchkey_str |
article:10518215:2017----::eopsnjititrinoaatv |
hierarchy_sort_str |
2017 |
publishDate |
2017 |
allfields |
10.1109/TCSVT.2016.2587388 doi PQ20171125 (DE-627)OLC1998175723 (DE-599)GBVOLC1998175723 (PRQ)c1087-37481399a7127be623fbe0b95667218f58665c6c6e53b8fb730836a7f0360b940 (KEY)0203241420170000027001002274decomposingjointdistortionforadaptivesteganography DE-627 ger DE-627 rakwb eng 620 DNB Zhang, Weiming verfasserin aut Decomposing Joint Distortion for Adaptive Steganography 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Recent advances on adaptive steganography imply that the security of steganography can be improved by exploiting the mutual impact of modifications between adjacent cover elements, such as pixels of images, which is called a nonadditive distortion model. In this paper, we propose a framework for nonadditive distortion steganography by defining joint distortion on pixel blocks. To reduce the complexity for minimizing joint distortion, we design a coding method to decompose the joint distortion (abbreviated to DeJoin) into distortion on individual pixels; thus, the message can be efficiently embedded with syndrome-trellis codes. We prove that DeJoin can approach the lower bound of joint distortion. As an example, we define joint distortion according to the principle of synchronizing modification direction and then design steganographic algorithms with DeJoin. The experimental results show that the proposed method outperforms previous nonadditive distortion steganography when resisting the state-of-the-art steganalysis. Adaptation models Computational complexity Encoding Distortion nonadditive distortion Covert communication steganography Additives joint distortion Entropy Zhang, Zhuo oth Zhang, Lili oth Li, Hanyi oth Yu, Nenghai oth Enthalten in IEEE transactions on circuits and systems for video technology New York, NY : Institute of Electrical and Electronics Engineers, 1991 27(2017), 10, Seite 2274-2280 (DE-627)130978469 (DE-600)1074294-3 (DE-576)025194771 1051-8215 nnns volume:27 year:2017 number:10 pages:2274-2280 http://dx.doi.org/10.1109/TCSVT.2016.2587388 Volltext http://ieeexplore.ieee.org/document/7505924 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC GBV_ILN_70 GBV_ILN_2002 AR 27 2017 10 2274-2280 |
spelling |
10.1109/TCSVT.2016.2587388 doi PQ20171125 (DE-627)OLC1998175723 (DE-599)GBVOLC1998175723 (PRQ)c1087-37481399a7127be623fbe0b95667218f58665c6c6e53b8fb730836a7f0360b940 (KEY)0203241420170000027001002274decomposingjointdistortionforadaptivesteganography DE-627 ger DE-627 rakwb eng 620 DNB Zhang, Weiming verfasserin aut Decomposing Joint Distortion for Adaptive Steganography 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Recent advances on adaptive steganography imply that the security of steganography can be improved by exploiting the mutual impact of modifications between adjacent cover elements, such as pixels of images, which is called a nonadditive distortion model. In this paper, we propose a framework for nonadditive distortion steganography by defining joint distortion on pixel blocks. To reduce the complexity for minimizing joint distortion, we design a coding method to decompose the joint distortion (abbreviated to DeJoin) into distortion on individual pixels; thus, the message can be efficiently embedded with syndrome-trellis codes. We prove that DeJoin can approach the lower bound of joint distortion. As an example, we define joint distortion according to the principle of synchronizing modification direction and then design steganographic algorithms with DeJoin. The experimental results show that the proposed method outperforms previous nonadditive distortion steganography when resisting the state-of-the-art steganalysis. Adaptation models Computational complexity Encoding Distortion nonadditive distortion Covert communication steganography Additives joint distortion Entropy Zhang, Zhuo oth Zhang, Lili oth Li, Hanyi oth Yu, Nenghai oth Enthalten in IEEE transactions on circuits and systems for video technology New York, NY : Institute of Electrical and Electronics Engineers, 1991 27(2017), 10, Seite 2274-2280 (DE-627)130978469 (DE-600)1074294-3 (DE-576)025194771 1051-8215 nnns volume:27 year:2017 number:10 pages:2274-2280 http://dx.doi.org/10.1109/TCSVT.2016.2587388 Volltext http://ieeexplore.ieee.org/document/7505924 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC GBV_ILN_70 GBV_ILN_2002 AR 27 2017 10 2274-2280 |
allfields_unstemmed |
10.1109/TCSVT.2016.2587388 doi PQ20171125 (DE-627)OLC1998175723 (DE-599)GBVOLC1998175723 (PRQ)c1087-37481399a7127be623fbe0b95667218f58665c6c6e53b8fb730836a7f0360b940 (KEY)0203241420170000027001002274decomposingjointdistortionforadaptivesteganography DE-627 ger DE-627 rakwb eng 620 DNB Zhang, Weiming verfasserin aut Decomposing Joint Distortion for Adaptive Steganography 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Recent advances on adaptive steganography imply that the security of steganography can be improved by exploiting the mutual impact of modifications between adjacent cover elements, such as pixels of images, which is called a nonadditive distortion model. In this paper, we propose a framework for nonadditive distortion steganography by defining joint distortion on pixel blocks. To reduce the complexity for minimizing joint distortion, we design a coding method to decompose the joint distortion (abbreviated to DeJoin) into distortion on individual pixels; thus, the message can be efficiently embedded with syndrome-trellis codes. We prove that DeJoin can approach the lower bound of joint distortion. As an example, we define joint distortion according to the principle of synchronizing modification direction and then design steganographic algorithms with DeJoin. The experimental results show that the proposed method outperforms previous nonadditive distortion steganography when resisting the state-of-the-art steganalysis. Adaptation models Computational complexity Encoding Distortion nonadditive distortion Covert communication steganography Additives joint distortion Entropy Zhang, Zhuo oth Zhang, Lili oth Li, Hanyi oth Yu, Nenghai oth Enthalten in IEEE transactions on circuits and systems for video technology New York, NY : Institute of Electrical and Electronics Engineers, 1991 27(2017), 10, Seite 2274-2280 (DE-627)130978469 (DE-600)1074294-3 (DE-576)025194771 1051-8215 nnns volume:27 year:2017 number:10 pages:2274-2280 http://dx.doi.org/10.1109/TCSVT.2016.2587388 Volltext http://ieeexplore.ieee.org/document/7505924 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC GBV_ILN_70 GBV_ILN_2002 AR 27 2017 10 2274-2280 |
allfieldsGer |
10.1109/TCSVT.2016.2587388 doi PQ20171125 (DE-627)OLC1998175723 (DE-599)GBVOLC1998175723 (PRQ)c1087-37481399a7127be623fbe0b95667218f58665c6c6e53b8fb730836a7f0360b940 (KEY)0203241420170000027001002274decomposingjointdistortionforadaptivesteganography DE-627 ger DE-627 rakwb eng 620 DNB Zhang, Weiming verfasserin aut Decomposing Joint Distortion for Adaptive Steganography 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Recent advances on adaptive steganography imply that the security of steganography can be improved by exploiting the mutual impact of modifications between adjacent cover elements, such as pixels of images, which is called a nonadditive distortion model. In this paper, we propose a framework for nonadditive distortion steganography by defining joint distortion on pixel blocks. To reduce the complexity for minimizing joint distortion, we design a coding method to decompose the joint distortion (abbreviated to DeJoin) into distortion on individual pixels; thus, the message can be efficiently embedded with syndrome-trellis codes. We prove that DeJoin can approach the lower bound of joint distortion. As an example, we define joint distortion according to the principle of synchronizing modification direction and then design steganographic algorithms with DeJoin. The experimental results show that the proposed method outperforms previous nonadditive distortion steganography when resisting the state-of-the-art steganalysis. Adaptation models Computational complexity Encoding Distortion nonadditive distortion Covert communication steganography Additives joint distortion Entropy Zhang, Zhuo oth Zhang, Lili oth Li, Hanyi oth Yu, Nenghai oth Enthalten in IEEE transactions on circuits and systems for video technology New York, NY : Institute of Electrical and Electronics Engineers, 1991 27(2017), 10, Seite 2274-2280 (DE-627)130978469 (DE-600)1074294-3 (DE-576)025194771 1051-8215 nnns volume:27 year:2017 number:10 pages:2274-2280 http://dx.doi.org/10.1109/TCSVT.2016.2587388 Volltext http://ieeexplore.ieee.org/document/7505924 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC GBV_ILN_70 GBV_ILN_2002 AR 27 2017 10 2274-2280 |
allfieldsSound |
10.1109/TCSVT.2016.2587388 doi PQ20171125 (DE-627)OLC1998175723 (DE-599)GBVOLC1998175723 (PRQ)c1087-37481399a7127be623fbe0b95667218f58665c6c6e53b8fb730836a7f0360b940 (KEY)0203241420170000027001002274decomposingjointdistortionforadaptivesteganography DE-627 ger DE-627 rakwb eng 620 DNB Zhang, Weiming verfasserin aut Decomposing Joint Distortion for Adaptive Steganography 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Recent advances on adaptive steganography imply that the security of steganography can be improved by exploiting the mutual impact of modifications between adjacent cover elements, such as pixels of images, which is called a nonadditive distortion model. In this paper, we propose a framework for nonadditive distortion steganography by defining joint distortion on pixel blocks. To reduce the complexity for minimizing joint distortion, we design a coding method to decompose the joint distortion (abbreviated to DeJoin) into distortion on individual pixels; thus, the message can be efficiently embedded with syndrome-trellis codes. We prove that DeJoin can approach the lower bound of joint distortion. As an example, we define joint distortion according to the principle of synchronizing modification direction and then design steganographic algorithms with DeJoin. The experimental results show that the proposed method outperforms previous nonadditive distortion steganography when resisting the state-of-the-art steganalysis. Adaptation models Computational complexity Encoding Distortion nonadditive distortion Covert communication steganography Additives joint distortion Entropy Zhang, Zhuo oth Zhang, Lili oth Li, Hanyi oth Yu, Nenghai oth Enthalten in IEEE transactions on circuits and systems for video technology New York, NY : Institute of Electrical and Electronics Engineers, 1991 27(2017), 10, Seite 2274-2280 (DE-627)130978469 (DE-600)1074294-3 (DE-576)025194771 1051-8215 nnns volume:27 year:2017 number:10 pages:2274-2280 http://dx.doi.org/10.1109/TCSVT.2016.2587388 Volltext http://ieeexplore.ieee.org/document/7505924 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC GBV_ILN_70 GBV_ILN_2002 AR 27 2017 10 2274-2280 |
language |
English |
source |
Enthalten in IEEE transactions on circuits and systems for video technology 27(2017), 10, Seite 2274-2280 volume:27 year:2017 number:10 pages:2274-2280 |
sourceStr |
Enthalten in IEEE transactions on circuits and systems for video technology 27(2017), 10, Seite 2274-2280 volume:27 year:2017 number:10 pages:2274-2280 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Adaptation models Computational complexity Encoding Distortion nonadditive distortion Covert communication steganography Additives joint distortion Entropy |
dewey-raw |
620 |
isfreeaccess_bool |
false |
container_title |
IEEE transactions on circuits and systems for video technology |
authorswithroles_txt_mv |
Zhang, Weiming @@aut@@ Zhang, Zhuo @@oth@@ Zhang, Lili @@oth@@ Li, Hanyi @@oth@@ Yu, Nenghai @@oth@@ |
publishDateDaySort_date |
2017-01-01T00:00:00Z |
hierarchy_top_id |
130978469 |
dewey-sort |
3620 |
id |
OLC1998175723 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">OLC1998175723</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230715080951.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">171125s2017 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/TCSVT.2016.2587388</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">PQ20171125</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1998175723</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1998175723</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PRQ)c1087-37481399a7127be623fbe0b95667218f58665c6c6e53b8fb730836a7f0360b940</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(KEY)0203241420170000027001002274decomposingjointdistortionforadaptivesteganography</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">620</subfield><subfield code="q">DNB</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zhang, Weiming</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Decomposing Joint Distortion for Adaptive Steganography</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Recent advances on adaptive steganography imply that the security of steganography can be improved by exploiting the mutual impact of modifications between adjacent cover elements, such as pixels of images, which is called a nonadditive distortion model. In this paper, we propose a framework for nonadditive distortion steganography by defining joint distortion on pixel blocks. To reduce the complexity for minimizing joint distortion, we design a coding method to decompose the joint distortion (abbreviated to DeJoin) into distortion on individual pixels; thus, the message can be efficiently embedded with syndrome-trellis codes. We prove that DeJoin can approach the lower bound of joint distortion. As an example, we define joint distortion according to the principle of synchronizing modification direction and then design steganographic algorithms with DeJoin. The experimental results show that the proposed method outperforms previous nonadditive distortion steganography when resisting the state-of-the-art steganalysis.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Adaptation models</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Encoding</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Distortion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">nonadditive distortion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Covert communication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">steganography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Additives</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">joint distortion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Entropy</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Zhuo</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Lili</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Hanyi</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yu, Nenghai</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">IEEE transactions on circuits and systems for video technology</subfield><subfield code="d">New York, NY : Institute of Electrical and Electronics Engineers, 1991</subfield><subfield code="g">27(2017), 10, Seite 2274-2280</subfield><subfield code="w">(DE-627)130978469</subfield><subfield code="w">(DE-600)1074294-3</subfield><subfield code="w">(DE-576)025194771</subfield><subfield code="x">1051-8215</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:27</subfield><subfield code="g">year:2017</subfield><subfield code="g">number:10</subfield><subfield code="g">pages:2274-2280</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://dx.doi.org/10.1109/TCSVT.2016.2587388</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://ieeexplore.ieee.org/document/7505924</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-TEC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2002</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">27</subfield><subfield code="j">2017</subfield><subfield code="e">10</subfield><subfield code="h">2274-2280</subfield></datafield></record></collection>
|
author |
Zhang, Weiming |
spellingShingle |
Zhang, Weiming ddc 620 misc Adaptation models misc Computational complexity misc Encoding misc Distortion misc nonadditive distortion misc Covert communication misc steganography misc Additives misc joint distortion misc Entropy Decomposing Joint Distortion for Adaptive Steganography |
authorStr |
Zhang, Weiming |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)130978469 |
format |
Article |
dewey-ones |
620 - Engineering & allied operations |
delete_txt_mv |
keep |
author_role |
aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1051-8215 |
topic_title |
620 DNB Decomposing Joint Distortion for Adaptive Steganography Adaptation models Computational complexity Encoding Distortion nonadditive distortion Covert communication steganography Additives joint distortion Entropy |
topic |
ddc 620 misc Adaptation models misc Computational complexity misc Encoding misc Distortion misc nonadditive distortion misc Covert communication misc steganography misc Additives misc joint distortion misc Entropy |
topic_unstemmed |
ddc 620 misc Adaptation models misc Computational complexity misc Encoding misc Distortion misc nonadditive distortion misc Covert communication misc steganography misc Additives misc joint distortion misc Entropy |
topic_browse |
ddc 620 misc Adaptation models misc Computational complexity misc Encoding misc Distortion misc nonadditive distortion misc Covert communication misc steganography misc Additives misc joint distortion misc Entropy |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
author2_variant |
z z zz l z lz h l hl n y ny |
hierarchy_parent_title |
IEEE transactions on circuits and systems for video technology |
hierarchy_parent_id |
130978469 |
dewey-tens |
620 - Engineering |
hierarchy_top_title |
IEEE transactions on circuits and systems for video technology |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)130978469 (DE-600)1074294-3 (DE-576)025194771 |
title |
Decomposing Joint Distortion for Adaptive Steganography |
ctrlnum |
(DE-627)OLC1998175723 (DE-599)GBVOLC1998175723 (PRQ)c1087-37481399a7127be623fbe0b95667218f58665c6c6e53b8fb730836a7f0360b940 (KEY)0203241420170000027001002274decomposingjointdistortionforadaptivesteganography |
title_full |
Decomposing Joint Distortion for Adaptive Steganography |
author_sort |
Zhang, Weiming |
journal |
IEEE transactions on circuits and systems for video technology |
journalStr |
IEEE transactions on circuits and systems for video technology |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
600 - Technology |
recordtype |
marc |
publishDateSort |
2017 |
contenttype_str_mv |
txt |
container_start_page |
2274 |
author_browse |
Zhang, Weiming |
container_volume |
27 |
class |
620 DNB |
format_se |
Aufsätze |
author-letter |
Zhang, Weiming |
doi_str_mv |
10.1109/TCSVT.2016.2587388 |
dewey-full |
620 |
title_sort |
decomposing joint distortion for adaptive steganography |
title_auth |
Decomposing Joint Distortion for Adaptive Steganography |
abstract |
Recent advances on adaptive steganography imply that the security of steganography can be improved by exploiting the mutual impact of modifications between adjacent cover elements, such as pixels of images, which is called a nonadditive distortion model. In this paper, we propose a framework for nonadditive distortion steganography by defining joint distortion on pixel blocks. To reduce the complexity for minimizing joint distortion, we design a coding method to decompose the joint distortion (abbreviated to DeJoin) into distortion on individual pixels; thus, the message can be efficiently embedded with syndrome-trellis codes. We prove that DeJoin can approach the lower bound of joint distortion. As an example, we define joint distortion according to the principle of synchronizing modification direction and then design steganographic algorithms with DeJoin. The experimental results show that the proposed method outperforms previous nonadditive distortion steganography when resisting the state-of-the-art steganalysis. |
abstractGer |
Recent advances on adaptive steganography imply that the security of steganography can be improved by exploiting the mutual impact of modifications between adjacent cover elements, such as pixels of images, which is called a nonadditive distortion model. In this paper, we propose a framework for nonadditive distortion steganography by defining joint distortion on pixel blocks. To reduce the complexity for minimizing joint distortion, we design a coding method to decompose the joint distortion (abbreviated to DeJoin) into distortion on individual pixels; thus, the message can be efficiently embedded with syndrome-trellis codes. We prove that DeJoin can approach the lower bound of joint distortion. As an example, we define joint distortion according to the principle of synchronizing modification direction and then design steganographic algorithms with DeJoin. The experimental results show that the proposed method outperforms previous nonadditive distortion steganography when resisting the state-of-the-art steganalysis. |
abstract_unstemmed |
Recent advances on adaptive steganography imply that the security of steganography can be improved by exploiting the mutual impact of modifications between adjacent cover elements, such as pixels of images, which is called a nonadditive distortion model. In this paper, we propose a framework for nonadditive distortion steganography by defining joint distortion on pixel blocks. To reduce the complexity for minimizing joint distortion, we design a coding method to decompose the joint distortion (abbreviated to DeJoin) into distortion on individual pixels; thus, the message can be efficiently embedded with syndrome-trellis codes. We prove that DeJoin can approach the lower bound of joint distortion. As an example, we define joint distortion according to the principle of synchronizing modification direction and then design steganographic algorithms with DeJoin. The experimental results show that the proposed method outperforms previous nonadditive distortion steganography when resisting the state-of-the-art steganalysis. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC GBV_ILN_70 GBV_ILN_2002 |
container_issue |
10 |
title_short |
Decomposing Joint Distortion for Adaptive Steganography |
url |
http://dx.doi.org/10.1109/TCSVT.2016.2587388 http://ieeexplore.ieee.org/document/7505924 |
remote_bool |
false |
author2 |
Zhang, Zhuo Zhang, Lili Li, Hanyi Yu, Nenghai |
author2Str |
Zhang, Zhuo Zhang, Lili Li, Hanyi Yu, Nenghai |
ppnlink |
130978469 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth oth oth |
doi_str |
10.1109/TCSVT.2016.2587388 |
up_date |
2024-07-04T04:27:31.519Z |
_version_ |
1803621238326689792 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">OLC1998175723</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230715080951.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">171125s2017 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/TCSVT.2016.2587388</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">PQ20171125</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1998175723</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1998175723</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PRQ)c1087-37481399a7127be623fbe0b95667218f58665c6c6e53b8fb730836a7f0360b940</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(KEY)0203241420170000027001002274decomposingjointdistortionforadaptivesteganography</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">620</subfield><subfield code="q">DNB</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zhang, Weiming</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Decomposing Joint Distortion for Adaptive Steganography</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Recent advances on adaptive steganography imply that the security of steganography can be improved by exploiting the mutual impact of modifications between adjacent cover elements, such as pixels of images, which is called a nonadditive distortion model. In this paper, we propose a framework for nonadditive distortion steganography by defining joint distortion on pixel blocks. To reduce the complexity for minimizing joint distortion, we design a coding method to decompose the joint distortion (abbreviated to DeJoin) into distortion on individual pixels; thus, the message can be efficiently embedded with syndrome-trellis codes. We prove that DeJoin can approach the lower bound of joint distortion. As an example, we define joint distortion according to the principle of synchronizing modification direction and then design steganographic algorithms with DeJoin. The experimental results show that the proposed method outperforms previous nonadditive distortion steganography when resisting the state-of-the-art steganalysis.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Adaptation models</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Encoding</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Distortion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">nonadditive distortion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Covert communication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">steganography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Additives</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">joint distortion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Entropy</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Zhuo</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Lili</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Hanyi</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yu, Nenghai</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">IEEE transactions on circuits and systems for video technology</subfield><subfield code="d">New York, NY : Institute of Electrical and Electronics Engineers, 1991</subfield><subfield code="g">27(2017), 10, Seite 2274-2280</subfield><subfield code="w">(DE-627)130978469</subfield><subfield code="w">(DE-600)1074294-3</subfield><subfield code="w">(DE-576)025194771</subfield><subfield code="x">1051-8215</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:27</subfield><subfield code="g">year:2017</subfield><subfield code="g">number:10</subfield><subfield code="g">pages:2274-2280</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://dx.doi.org/10.1109/TCSVT.2016.2587388</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://ieeexplore.ieee.org/document/7505924</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-TEC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2002</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">27</subfield><subfield code="j">2017</subfield><subfield code="e">10</subfield><subfield code="h">2274-2280</subfield></datafield></record></collection>
|
score |
7.3995686 |