A Model and Quantitative Framework for Evaluating Iterative Steganography
Abstract
:1. Introduction
1.1. Steganography
- Undetectability: this metric evaluates a steganographic technique’s ability to conceal information within a steganogram so that its presence remains imperceptible to both human perception and statistical detection methods [10]. High undetectability signifies that the alterations introduced into the cover medium are minimally noticeable and resistant to detection [11],
- Capacity: this metric measures the amount of information that can be embedded within a digital cover medium without causing noticeable degradation in its quality. Capacity depends on the characteristics of the cover medium and the chosen steganographic technique. While higher capacity enables greater information concealment, it may reduce undetectability by increasing the likelihood of detection [12],
- Robustness: this metric assesses a steganographic technique’s resilience in preserving embedded information when subjected to various disruptions or transformations, such as compression, format conversion, filtering, rotation, or scaling. Higher robustness ensures that the embedded message is more likely to remain intact or that a larger portion of the original information is retained after such modifications [13].
- Encoding function—maps a given cover object and a message to a steganogram. The encoding process embeds the message within the cover medium while minimizing perceptible alterations to the cover medium,
- Decoding function—extracts the embedded message from a steganogram. It is designed to accurately retrieve the message without requiring access to the original cover object. Notably, the decoding function can also be considered as an integral part of the steganalysis process, as it helps verify the presence and content of hidden information [14].
1.2. Iterative Steganography
- Information increment: arising from the decoding of data embedded within the steganogram,
- Information degradation: caused by transformations or interference affecting the steganogram.
2. A Model for Iterative Steganography
2.1. Iterative Cover
- —the number of iterations, equivalent to the number of encoding steps;
- —the set of all iterations, defined as the set of all possible finite binary vectors;
- —the set of all iterative covers.
2.2. Message
- —the number of bits in the message, (message length);
- —the -th bit of the message, ;
- —the set of all messages.
2.3. Iterative Steganogram
- —the number of iterations, equivalent to the number of decoding steps;
- —the set of all iterative steganograms.
2.4. Coding Indices
2.5. Encoding and Decoding Iterations
- —the encoding iterations, represented as a subset of all cover iterations and selected using the coding indices, ;
- —the decoding iterations, represented as a subset of all steganogram iterations and selected using the coding indices, .
2.6. Encoding Function
- —the cover composed of iterations;
- —the steganogram created by the function through encoding the message into the cover .
2.7. Decoding Function
3. The Proposed Method
3.1. IIF (Incremental Information Function)
- —the value of a bit in the original message ;
- —the value of a bit in the decoded message ;
- —the number of -bites in the message (either or ;
- —the decoding function;
- —the message encoded by function into the cover .
- —the message decoded by the function from the steganogram, ;
- —the number of 0’s in the message, ;
- —the number of 1’s in the message, .
3.2. Properties of the IIF
- Range of values: the values of the IIF are contained within the closed interval [0, 1], with values between approximately 0.5 and 1 being of particular importance. Smaller values of the IIF indicate a higher presence of noise, while larger values reflect a greater degree of encoded information.
- Monotonicity: for a properly functioning steganographic technique, featuring a well-defined encoding and decoding algorithm, the IIF is expected to remain non-decreasing, except for rare, isolated cases where the iterative steganogram exhibits non-uniformity, resulting in temporary disruptions to monotonicity. Each successive iteration of the decoding algorithm should either increase the amount of information in the decoded message, or at worst, maintain it without any decrease.
- Asymptotic behavior: the IIF demonstrates asymptotic tendencies, approaching the maximum achievable level of information that can be decoded from a given steganogram, subject to specified noise conditions and the parameter settings of the encoding algorithm. In most cases, this value will not reach 1, which would represent the complete decoding of all information encoded in the original steganogram. However, it is expected to represent a sufficiently significant portion of the encoded information, enabling the recipient to decode the message content.
3.3. Characteristic Values
- —the steganogram created by encoding the message, ;
- —the message that is encoded into the steganogram, ;
- —the minimum value of the required to successfully decode the message, , from the steganogram, ,
- —the first iteration at which the reaches the value of .
3.4. IIF Value Matrix
3.5. IIF and BER Indicator
- —the BER calculated for the iteration, , and the message, ;
- —the complete steganogram containing all iterations.
4. Results
4.1. Research Experiments
- The covers consist of video files treated as sequences of consecutive frames, each being an image;
- Successive iterations in which the message is encoded occur every third frame of the video files;
- The message is encoded using a steganographic method operating in the spatial domain, modifying the color values of the pixels in the video frames;
- The decoding function assumes that, from the first iteration, all bits of the message are initialized to zero. Subsequent iterations incrementally build information by setting 1’s and clearing 0’s in the message;
- The message is encoded in the form of a version 1 QR code with error correction level H, enabling the encoding of up to 72 bits in a 21 × 21 module matrix with error correction up to 30% [20], facilitating the use of automatic tools for reading the decoding message.
- Each video frame is divided into pixel blocks, with the total number corresponding to the length of the message, and each block represents a single bit of the message.
- For consecutive pairs of video frames, the difference in color values between corresponding pixels is calculated;
- Encoding a bit value of 1 in a pixel block involves increasing the value of the R (red) color channel and the B (blue) color channel while simultaneously decreasing the value of the G (green) channel. Conversely, encoding a bit value of 0 involves increasing the G (green) color channel value while decreasing the R (red) and B (blue) color channel values;
- The technique adaptively selects pairs of pixels for encoding, focusing on those with minimal initial color differences between frames to maintain imperceptibility, particularly pixels where the color difference between consecutive video frames is zero;
- The values of the respective color channels are modified based on a parameter of the encoding algorithm, called the encoding level, which ranges from 1 to 5. At level 1, the adjustment affects only the least significant bit (00000001b), while at level 5, it modifies the three least significant bits (00000101b).
4.2. Example 1
4.3. Example 2
4.4. Discussion
- for video steganogram No. 1, the message was successfully decoded at the 18th iteration ( = 18) with an value of = 0.828;
- the functions , and the overall function asymptotically converge to a maximum value close to 1.0;
- the values of and carry no significant information, in this example, as they are complementary to the values of and ;
- the initial value of is notably high due to a property of the decoding function, which assumes that all information bits are initialized to zero at the start of the algorithm.
5. Conclusions
5.1. Theoretical Contributions
- a formal mathematical model for characterizing a class of iterative steganographic methods;
- a novel quantitative method for evaluating the performance of iterative steganographic techniques, based on the proposed Incremental Information Function (IIF);
- the application of characteristic IIF values to quantify robustness and capacity metrics in iterative steganographic systems.
5.2. Practical Implications
5.3. Future Research
- extension of IIF application: explore the utilization of the Incremental Information Function (IIF) in diverse iterative steganography methods beyond video steganography, such as network steganography protocols;
- universal IIF characteristics: examine the potential existence of universal characteristic values (chIIF) of the IIF that may describe and differentiate various iterative steganography techniques, including multiple video steganography methods;
- IIF in steganalysis: investigate the potential applications of IIF properties in steganalysis processes for the detection and analysis of steganographic content, potentially enhancing the efficacy of current steganalysis techniques.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Kahn, D. The Codebreakers: The Story of Secret Writing; Macmillan: New York, NY, USA, 1967; ISBN 978-0025604605. [Google Scholar]
- Shannon, C. A Mathematical Theory of Communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef]
- Johnson, N.; Jajodia, S. Exploring Steganography: Seeing the Unseen. IEEE Comput. 1998, 31, 26–34. [Google Scholar] [CrossRef]
- Johnson, N.; Duric, Z.; Jajodia, S. Information Hiding: Steganography and Watermarking—Attacks and Countermeasures; Springer: Boston, MA, USA, 2001; ISBN 978-0-7923-7204-2. [Google Scholar] [CrossRef]
- Petitcolas, F.; Anderson, R.; Kuhn, M. Information hiding—A survey. Proc. IEEE 1999, 87, 1062–1078. [Google Scholar] [CrossRef]
- Fridrich, J. Steganography in Digital Media: Principles, Algorithms, and Applications; Cambridge University Press: Cambridge, UK, 2009. [Google Scholar] [CrossRef]
- Sencar, H.; Ramkumar, M.; Akansu, A. Data Hiding Fundamentals and Applications; Elsevier Academic Press: Burlington, ON, USA, 2004; ISBN 9780120471447. [Google Scholar] [CrossRef]
- Zou, J.Z.; Chen, M.X.; Gong, L.H. Invisible and robust watermarking model based on hierarchical residual fusion multi-scale convolution. Neurocomputing 2025, 614, 128834. [Google Scholar] [CrossRef]
- Gong, L.H.; Luo, H.X. Dual color images watermarking scheme with geometric correction based on quaternion FrOOFMMs and LS-SVR. Opt. Laser Technol. 2023, 167, 109665. [Google Scholar] [CrossRef]
- Huynh-Thu, Q.; Ghanbari, M. Scope of validity of PSNR in image/video quality assessment. Electron. Lett. 2008, 44, 800–801. [Google Scholar] [CrossRef]
- Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [PubMed]
- Cox, I.; Miller, M.; Kalker, T. Digital Watermarking and Steganography; Morgan Kaufmann Publishers: Burlington, ON, USA, 2007; ISBN 0123725852. [Google Scholar]
- Anderson, R.; Petitcolas, F. On the limits of steganography. IEEE J. Sel. Areas Commun. 1998, 16, 474–481. [Google Scholar] [CrossRef]
- Kadhim, I.J.; Premaratne, P.; Vial, P.J.; Halloran, B. Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. Neurocomputing 2019, 335, 299–326. [Google Scholar] [CrossRef]
- Chan, C.; Cheng, L. Hiding data in images by simple LSB substitution. Pattern Recognit. 2004, 37, 469–474. [Google Scholar] [CrossRef]
- Bennett, K. Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text; CERIAS Tech Report 2004-13; Purdue University: West Lafayette, IN, USA, 2004; Available online: https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/2004-13.pdf (accessed on 16 November 2024).
- Kunhoth, J.; Subramanian, N.; Al-Maadeed, S.; Bouridane, A. Video steganography: Recent advances and challenges. Multimed. Tools Appl. 2023, 82, 11817–11868. [Google Scholar] [CrossRef]
- Lubacz, J.; Mazurczyk, W.; Szczypiorski, K. Principles and Overview of Network Steganography. IEEE Commun. Mag. 2012, 52, 225–229. [Google Scholar] [CrossRef]
- Katzenbeisser, S.; Petitcolas, F. Information Hiding Techniques for Steganography and Digital Watermarking; Artech House: Norwood, MA, USA, 2000; ISBN 978-1-58053-035-4. [Google Scholar]
- DensoWave. QR Code. Available online: https://www.qrcode.com (accessed on 16 November 2024).
Values of Bits in the Original Message | |||
0 | 1 | ||
Values of Bits in the Decoded Message | 0 | ||
1 |
Iteration | Level 1 | Level 2 | Level 3 | Level 4 | Level 5 |
---|---|---|---|---|---|
1 | |||||
IIF = 0.636 | IIF = 0.672 | IIF = 0.716 | IIF = 0.772 | IIF = 0.802 | |
2 | |||||
IIF = 0.627 | IIF = 0.669 | IIF = 0.727 | IIF = 0.796 | IIF = 0.838 | |
3 | |||||
IIF = 0.617 | IIF = 0.667 | IIF = 0.735 | IIF = 0.812 | IIF = 0.858 | |
4 | |||||
IIF = 0.607 | IIF = 0.662 | IIF = 0.740 | IIF = 0.821 | IIF = 0.871 | |
5 | |||||
IIF = 0.598 | IIF = 0.661 | IIF = 0.750 | IIF = 0.840 | IIF = 0.890 | |
6 | |||||
IIF = 0.592 | IIF = 0.659 | IIF = 0.753 | IIF = 0.845 | IIF = 0.895 | |
7 | |||||
IIF = 0.593 | IIF = 0.664 | IIF = 0.760 | IIF = 0.852 | IIF = 0.901 | |
8 | |||||
IIF = 0.585 | IIF = 0.661 | IIF = 0.760 | IIF = 0.854 | IIF = 0.903 | |
9 | |||||
IIF = 0.587 | IIF = 0.664 | IIF = 0.769 | IIF = 0.864 | IIF = 0.909 | |
10 | |||||
IIF = 0.587 | IIF = 0.669 | IIF = 0.777 | IIF = 0.873 | IIF = 0.919 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pery, M.; Waszkowski, R. A Model and Quantitative Framework for Evaluating Iterative Steganography. Entropy 2024, 26, 1130. https://doi.org/10.3390/e26121130
Pery M, Waszkowski R. A Model and Quantitative Framework for Evaluating Iterative Steganography. Entropy. 2024; 26(12):1130. https://doi.org/10.3390/e26121130
Chicago/Turabian StylePery, Marcin, and Robert Waszkowski. 2024. "A Model and Quantitative Framework for Evaluating Iterative Steganography" Entropy 26, no. 12: 1130. https://doi.org/10.3390/e26121130
APA StylePery, M., & Waszkowski, R. (2024). A Model and Quantitative Framework for Evaluating Iterative Steganography. Entropy, 26(12), 1130. https://doi.org/10.3390/e26121130