طراحی یک الگوریتم نهان نگاری تصویر ترکیبی بر مبنای نظریه ی بازی ها

نوع مقاله : مقاله پژوهشی

نویسنده

دانشگاه جامع امام حسین(ع)

چکیده

روش­های نهان­نگاری تطبیقی با استفاده از یک معیار تطبیق، به­صورت ترتیبی یا تصادفی به مخفی­سازی پیام در تصویر می­پردازند. هدف از امنیت، کاهش احتمال تشخیص وجود پیام است. در این مقاله، نخست با استفاده از نظریه­ی بازی­ها، نشان داده می­شود، که الگوریتم نهان­نگاری تطبیقی همراه با یک روند شبه­تصادفی، که الگوریتم نهان‌نگاری ترکیبی نامیده می‌شود، نسبت به الگوریتم نهان‌نگاری تطبیقی محض از امنیت بالاتری برخوردار است. سپس این مطلب در عمل با طراحی الگوریتم­هایی  مبتنی بر آنتروپی و عملگر  ، برای 5000 تصویر طبیعی نشان داده می­شود. مقایسه دو الگوریتم طراحی‌شده، توسط یکی از الگوریتم­های معروف نهان­کاوی یعنی SRM ،  نشان از حدود 1.5% برتری امنیتی روش تطبیقی ترکیبی در مقایسه با روش تطبیقی محض دارد.

کلیدواژه‌ها


عنوان مقاله [English]

Designing a combinatorial Image Steganography algorithm based on game theory

نویسنده [English]

  • M. A. Shamalizade Baei
Department of Basic Science, Imam Khamenei Complex University, Imam Hossain University, Gilan, Iran
چکیده [English]

Adaptive steganography methods using an adaptive criterion, sequentially or randomly, hide a message in an image. The aim of security is to reduce the probability of detecting the existence of a message. In this article, first by using game theory it is illustrated that adaptive steganography algorithms with a simulation along with a quasi-random process, named as combinatorial image steganography algorithms have higher security compared to the pure adaptive steganography algorithms. Then, this matter is shown practically by designing patterns based on entropy and the  operator for 5000 natural images. The comparison of two designed algorithms, using SRM which is one of the most famous steganography algorithms, shows about 1.5% security superiority of the combinatory method compared to the purely adaptive method.

کلیدواژه‌ها [English]

  • Pure Adaptive steganography
  • Combinatory steganography
  • Security
  • Game Theory
[1]                 I. Cox, M. Miller, J. Bloom, J. Fridrich, and T.Kalker, “Digital Watermarking and Steganography,” Second edn. Morgan Kaufmann, Burlington, 2007.##
[2]                 R. Bohem, “Advanced Statistical Steganalysis,” Springer-Verlag Berlin Heidelberg, 2010.##
[3]                 F. Cayre and P. Bas, “Kerckhoffs–based embedding security classes for WOA data hiding,” IEEE Transactions on Information Forensics and Security 3, pp. 1–15, 2008.##
[4]                 D. C. Wu and W. H. Tsai, “A Steganographic Method for Images by Pixelvalue Differencing,” Pattern Recognition Letters, vol. 24, pp. 1613–1626, 2003.##
[5]                 X. Zhang and S.Wang, “Vulnerability of       Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security,” Pattern Recogn. Lett., vol. 25, no. 3, pp. 331–339, 2004.##
[6]                 C-H. Yang, C-Y. Weng, S-J. Wang, and H-M. Sun, “Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 488–497, 2008.##
[7]                 L. Bin, He. Junhui, H. Jiwu, and Q. S. Yun, “A Survey on Image Steganography and Steganalysis,” Ubiquitous International Journal of Information Hiding and Multimedia Signal Processing, vol. 2, pp. 2073-4212, 2011.##
[8]                 J. Mielikainen, “LSB matching revisited,” IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.##
[9]                 W. Luo, F. Huang, and J. Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp.    201–214, 2010.##
[10]              F. Huang, Y. Zhong, and J.Huang, “Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching   Revisited Algorithm,” Springer-Verlag Berlin Heidelberg, pp. 19–31, 2014.##
[11]              H. Al-Dmour and A. Al-Ani, “A Steganography Embedding Method Based on Edge Identification and XOR Coding,” Elsevier, Sience direct, vol. 46, pp. 293-306, 2016.##
[12]              M. Ettinger, “Steganalysis and game equilibria,” In Aucsmith, D., ed.: Information Hiding, vol. 1525 of Lecture Notes in Computer Science, pp. 319– 328, 1998.##
[13]              S. Pascal, L. Aron, J. Benjamin, G. Jens, and B. Rainer, “A game-theoretic analysis of content-adaptive steganography with independent embedding,” In  EUSIPCO. IEEE, 2013.##
[14]              S. Pascal and B. Rainer, “A game-theoretic approach to content-adaptive steganography,” In: Ghosal, D., Kirchner, M. (eds.) Information Hiding. LNCS, 2012.##
[15]              J. Benjamin, S. Pascal, and B. Rainer, “ Where to hide the bits?,” In GameSec, vol. 7638 of LNCS, pp.  1–17, 2012.##
[16]               T.  Mekala and N. Mahendran, “Improved Security in Adaptive Steganography Using Game Theory,” vol.118, no. 8, pp. 111-116, 2018.##
[17]              T. Pun, “A new method for gray-level picture thresholding  using the entropy of the histogram,” Signal Processing, vol. 2, pp. 223-237, 1980.##
[18] GU. Guanghua, Yao Zhao, and Zhu Zhenfeng, “Integrated Image Representation Based Natural Scene Classification,” Elsevier, Expert Systems with   Applications, vol. 38, pp. 11273–11279, 2011.##
[19]   M. A. Shamalizadeh Baei, & et.al., “Designing an Image Steganography Algorithm Based on Entropy and ELSB2,” Advanced Defence Sci. & Tech., vol. 2, pp.       39-50, 2018. (In Persian)##