Next Article in Journal
A Secure and Efficient White-Box Implementation of SM4
Previous Article in Journal
Transpiling Quantum Assembly Language Circuits to a Qudit Form
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Model and Quantitative Framework for Evaluating Iterative Steganography

Institute of Computer and Information Systems, Faculty of Cybernetics, Military University of Technology, 00-908 Warszawa, Poland
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(12), 1130; https://doi.org/10.3390/e26121130
Submission received: 16 November 2024 / Revised: 11 December 2024 / Accepted: 19 December 2024 / Published: 23 December 2024
(This article belongs to the Section Signal and Data Analysis)

Abstract

:
This study presents a detailed characterization of iterative steganography, a unique class of information-hiding techniques, and proposes a formal mathematical model for their description. A novel quantitative measure, the Incremental Information Function (IIF), is introduced to evaluate the process of information gain in iterative steganographic methods. The IIF offers a comprehensive framework for analyzing the step-by-step process of embedding information into a cover medium, focusing on the cumulative effects of each iteration in the encoding and decoding cycles. The practical application and efficacy of the proposed method are demonstrated using detailed case studies in video steganography. These examples highlight the utility of the IIF in delineating the properties and characteristics of iterative steganographic techniques. The findings reveal that the IIF effectively captures the incremental nature of information embedding and serves as a valuable tool for assessing the robustness and capacity of steganographic systems. This research provides significant insights into the field of information hiding, particularly in the development and evaluation of advanced steganographic methods. The IIF emerges as an innovative and practical analytical tool for researchers, offering a quantitative approach to understanding and optimizing iterative steganographic techniques.

1. Introduction

Steganography is recognized as a well-established field of study [1] situated within the broader framework of information theory [2]. The primary focus of this discipline is the development and analysis of methods and techniques for concealing information within overt covers so that third parties remain unaware of the existence of the hidden data [3].

1.1. Steganography

A wide range of steganographic techniques has been extensively documented in the literature [4]. The primary goal of these methods is to encode information within a digital cover medium, producing a steganogram that closely resembles the original cover. This resemblance is intended to make the detection of embedded messages highly challenging or practically infeasible [5]. The choice of a suitable steganographic technique depends on several factors [6], including the type of the cover medium, which may consist of text files, digital images, audio streams, video sequences, or network transmissions. Moreover, the selection is influenced by specific requirements regarding the desired properties of the steganographic method, such as capacity, robustness, and undetectability [7].
In recent years, one of the most actively investigated directions in research on steganographic techniques has been the domain of machine learning, including the use of neural networks. One of the latest examples of a novel approach advancing steganographic techniques can be found in the paper [8], which introduces an innovative invisible and robust watermarking model for digital images. It employs hierarchical residual fusion and multi-scale convolution techniques to embed imperceptible yet resilient watermarks. The proposed neural network-based approach aims to balance image quality preservation with watermark durability against various image manipulations, likely demonstrating improved PSNR, SSIM, and resistance to common image transformations. Another example can be found in [9]. This paper introduces a novel dual color image watermarking scheme utilizing quaternion fractional-order orthogonal Fourier–Mellin moments and least square support vector regression for geometric correction. The method employs advanced techniques including 3D sine map encryption, lifting wavelet transform, and quaternion discrete Fourier transform to enhance security and robustness. Experimental results demonstrate high imperceptibility and strong robustness against various attacks, representing a significant advancement in color image watermarking and copyright protection.
Although the various approaches found in the literature are highly valuable in multiple respects and advance the field of steganography in several promising directions, the literature lacks any references directly addressing the core topic of our work, i.e., the formalization and quantification of the fundamental properties of iterative steganography.
We utilize three fundamental metrics to define the core properties of steganographic techniques. These metrics are often interdependent and involve trade-offs in steganographic system design. Achieving the optimal balance between these properties depends on the specific application requirements and the anticipated threats to the steganographic communication channel:
  • Undetectability: this metric evaluates a steganographic technique’s ability to conceal information within a steganogram so that its presence remains imperceptible to both human perception and statistical detection methods [10]. High undetectability signifies that the alterations introduced into the cover medium are minimally noticeable and resistant to detection [11],
  • Capacity: this metric measures the amount of information that can be embedded within a digital cover medium without causing noticeable degradation in its quality. Capacity depends on the characteristics of the cover medium and the chosen steganographic technique. While higher capacity enables greater information concealment, it may reduce undetectability by increasing the likelihood of detection [12],
  • Robustness: this metric assesses a steganographic technique’s resilience in preserving embedded information when subjected to various disruptions or transformations, such as compression, format conversion, filtering, rotation, or scaling. Higher robustness ensures that the embedded message is more likely to remain intact or that a larger portion of the original information is retained after such modifications [13].
A typical steganographic method is characterized by two core functions: an encoding function, which embeds the message within the cover medium, and a decoding function, which retrieves the embedded message from the steganogram:
  • Encoding function—maps a given cover object and a message to a steganogram. The encoding process embeds the message within the cover medium while minimizing perceptible alterations to the cover medium,
  • Decoding function—extracts the embedded message from a steganogram. It is designed to accurately retrieve the message without requiring access to the original cover object. Notably, the decoding function can also be considered as an integral part of the steganalysis process, as it helps verify the presence and content of hidden information [14].
The performance of these functions is assessed based on their ability to preserve the cover medium’s integrity, maximize the capacity for concealed information, and withstand detection by steganalysis techniques. Designing these functions often requires managing significant trade-offs between undetectability, capacity, and robustness, which are crucial for the effectiveness of steganographic methods.

1.2. Iterative Steganography

Iterative steganography is a unique approach to information hiding, distinct from traditional techniques that encode data within a single, complete unit, such as individual images [15] or text documents [16]. This method is designed for covers with an inherent iterative structure, consisting of multiple repeated elements over time. In iterative steganography, information is encoded incrementally, leveraging the cover’s natural division into homogeneous segments. The full retrieval of the hidden message is only possible after multiple iterations.
Prominent examples of iterative steganography include video steganography [17], where individual video frames naturally serve as iterations for encoding information, and network steganography [18], which utilizes repeated network packet calls as iterations in the steganographic process.
A key feature of iterative steganography is its temporal dimension, which organizes consecutive iterations over time. Any repetitive phenomenon with intervals of information transmission can serve as an effective cover for iterative steganography.
In steganographic methods based on iterative algorithms, each iteration involves two counteracting processes:
  • Information increment: arising from the decoding of data embedded within the steganogram,
  • Information degradation: caused by transformations or interference affecting the steganogram.
The successful retrieval of hidden information depends on the rate of information gain surpassing the rate of degradation, and the decoded information reaching a critical threshold necessary for complete message recovery.
This study seeks to develop a formal method for quantifying the balance between information gain and loss in each iteration of iterative steganographic techniques. The aim is to determine whether the incremental accumulation of information over successive decoding iterations provides meaningful insights into the characteristics and performance of these methods. By introducing the Incremental Information Function (IIF), this research establishes a comprehensive framework for analyzing information increments in iterative steganographic processes. In contrast to traditional steganography, which focuses on single instance encoding, iterative methods require a distinct approach to understanding how information is progressively embedded and extracted over multiple iterations. Practical examples are presented to illustrate the applicability of the proposed method, providing a robust tool for evaluating and optimizing the efficiency, robustness, and capacity of iterative steganographic systems.

2. A Model for Iterative Steganography

For this study, a single iteration is defined as a binary vector that is characteristic of specific type of iterative cover. For instance, in video files, this might correspond to a single video frame; for audio files, it could be a time frame used for calculating Fast Fourier Transform (FFT) frequency components; and for network transmissions, it may represent a data packet from a specific network protocol along with associated timing parameters. Depending on the context and type of cover, individual bits within a single iteration can hold varying significance and semantic interpretation. The core assumption of iterative steganography is that, for a specific type of iterative cover, all iterations are homogeneous—identical in their structure, properties, and characteristics critical to the steganographic encoding and decoding algorithms.

2.1. Iterative Cover

The iterative cover  c i is defined as an i -element vector (refer to Equation (1)).
c i = c 1 ,   c 2 , . . . , c i
where c i —the i -th iteration of the c i , corresponding to the i -th encoding step.
An iterative cover can be regarded as a vector of iteration, constructed by sequentially appending each iteration in order, from the first to the last (refer to Equation (2)).
i 1 . . . Z c i = c 1 ,                                                     i = 1 c i 1 c i ,               i 2 . . . Z i 1 . . . Z c i I ,             I = 0,1 * i 1 . . . Z c i C ,                 C = I * Z N
where
  • Z —the number of iterations, equivalent to the number of encoding steps;
  • I —the set of all iterations, defined as the set of all possible finite binary vectors;
  • C —the set of all iterative covers.

2.2. Message

The message, m , is defined as a vector of L bits (refer to Equation (3)).
m = m 1 ,   m 2 ,   ,   m k , . . . , m L k 1 . . . Z m k 0 ,   1 L N ,   m M , M = 0 ,   1 *
where
  • L —the number of bits in the message, m (message length);
  • m k —the k -th bit of the message, m ;
  • M —the set of all messages.
Let us define m 1 as the number of 1’s in message m (refer to Equation (4)).
m 1 = k = 1 L 1 m k = 1
Let us define m 0 as the number of 0’s in message m (refer to Equation (5)).
m 0 = k = 1 L 1 m k = 0
m 0 + m 1 = L

2.3. Iterative Steganogram

The iterative steganogram, s i , is defined analogously to the iterative cover, c i , as an i -element vector (refer to Equation (6)).
s i = s 1 ,   s 2 , . . . , s i
where s i —the i -th iteration of the s i , corresponding to the i -th decoding step.
An iterative steganogram can be regarded as a vector, constructed by sequentially appending each iteration in order, from the first to the last (refer to Equation (7)).
i 1 . . . Z s i = s 1 ,                                                     i = 1 s i 1 s i ,               i 2 . . . Z i 1 . . . Z s i I i 1 . . . Z s i S , S = I * Z N
where
  • Z —the number of iterations, equivalent to the number of decoding steps;
  • S —the set of all iterative steganograms.

2.4. Coding Indices

From the set of all possible indices of the iterative cover and the iterative steganogram, we select a subset, referred to as the coding indices (refer to Equation (8)).
Ι 2 . . . Z Ι 2 2 . . . Z
where Ι —the set of coding indices.

2.5. Encoding and Decoding Iterations

From the set of all iterations in the cover and the set of all iterations in the steganogram, we select subsets using coding indices, referred to as the encoding and decoding iterations (refer to Equations (9) and (10)).
c I = c i : i I
s I = s i : i I
where
  • c I —the encoding iterations, represented as a subset of all cover iterations and selected using the coding indices, I ;
  • s I —the decoding iterations, represented as a subset of all steganogram iterations and selected using the coding indices, I .

2.6. Encoding Function

We assume that in each iteration, the entire message, m , is encoded. However, it is also possible to consider scenarios where the message, m , is divided into disjoint parts, with each part treated as a separated message subjected to independent encoding.
First, we define the encoding function, f , which encodes the message, m , in the i -th iteration of the cover (refer to Equation (11)).
f : I × M I
i 1 . . . Z s i : = f c i , m
where m —the message to be encoded in the i -th iteration.
The iterative encoding function, f , is defined as the function that encodes the message, m , in the cover (refer to Equation (12)).
f : C × M S
i 1 . . . Z s i : = f c i , m
where
  • c i —the cover composed of i iterations;
  • s i —the steganogram created by the function f through encoding the message m into the cover c i .
An iterative steganogram can be regarded as a vector formed by sequentially appending the values of f calculated for consecutive iterations (refer to Equation (13)).
i 1 . . . Z f c i , m = c 1 ,                                                                                       i = 1 f c i 1 , m c i ,                                             i I f c i 1 , m f c i , m ,                     i I

2.7. Decoding Function

The iterative decoding function, f 1 , is defined as the function that maps a decoded message, m 1 , to a given steganogram, s i (refer to Equation (14)).
The decoding function produces the decoded message, m 1 , which, like the original message, m , is a binary vector from the set {0, 1}.
The purpose of the decoding function is to recover the information encoded in the steganogram, s i . If the decoded message, m 1 , matches to the original message, m , the goal is fully achieved. However, if m m 1 , the ability to accurately interpret the information from the decoded message depends primarily on two factors: (1) the amount of preserved information in the message, m 1 , which can be evaluated, for example, using a distance measure between the decoded and the original message; and (2) the properties of the steganographic technique employed, including the degree of redundancy incorporated during the encoding process.
f 1 : S M
m 1 : = f 1 s i m 1 M
where m 1 —the message decoded by the function f 1 from the steganogram s i .

3. The Proposed Method

3.1. IIF (Incremental Information Function)

The definition of the Incremental Information Function (IIF) is inspired by the concept of the Bit Error Rate (BER), which measures the ratio of incorrectly encoded bits to the total number of encoded bits in a message [19]. A lower BER indicates less information loss in the encoded message and higher robustness. In contrast, for the IIF, a higher function value signifies a greater amount of information decoded from the steganogram. The details of the relationship between the IIF and the BER are described in Section 3.5.
First, we define the auxiliary function I I F o r i g , d e c (refer to Equation (15)), which assigns to a given steganogram, s i , and message, m , the relative number of occurrences of decoded bits with the value d e c that had the value o r i g in the original message, m .
I I F o r i g , d e c : S × M R +
o r i g 0,1 d e c 0,1 i 1 . . . Z I I F o r i g , d e c s i ,   m = k = 1 L 1 m k = o r i g f 1 s i k = d e c / m o r i g i 1 . . . Z o r i g 0,1 d e c 0,1 I I F o r i g , d e c s i ,   m = 1
where
  • o r i g —the value of a bit in the original message m ;
  • d e c —the value of a bit in the decoded message m 1 ;
  • m ( o r i g ) —the number of o r i g -bites in the message m (either m ( 0 ) or m ( 1 ) ) ;
  • f 1 —the decoding function;
  • m —the message encoded by function f into the cover c i .
The I I F function (refer to Equation (16)) is defined as a weighted sum of the functions I I F 0,0 and I I F 1,1 , where the weights are proportional to the number of bits with values 0 and 1 in the original message, m . This represents the proportion of correctly decoded bits in the message, m 1 .
I I F : S × M 0,1
i 1 . . . Z I I F s i ,   m = I I F 0,0 s i ,   m · m 0 L + I I F 1,1 s i ,   m · m ( 1 ) L = k = 1 L 1 m k = f 1 s i k / L
where
  • m —the message decoded by the function f 1 from the steganogram, s i ;
  • m ( 0 ) —the number of 0’s in the message, m ;
  • m ( 1 ) —the number of 1’s in the message, m .
In Equation (16), which defines the IIF, it is also possible to apply different weights, particularly in scenarios where the steganographic method processes 0’s and 1’s differently. For instance, in a hypothetical case where 0’s are significantly less important than 1’s, the weight for I I F 0,0 might not be proportional to m 0 but could instead be, for example, one-tenth of the weight for the I I F 1,1 . Additionally, in some specific steganographic techniques, the values of the I I F 0,1 and the I I F 1,0 can be incorporated into the definition of the I I F function as “penalties” for errors in training the decoding algorithm. It should be noted that the I I F 0,1 = 1 I I F 0,0 and I I F 1,0 = 1 I I F 1,1 .

3.2. Properties of the IIF

The behavior of the Incremental Information Function (IIF) depends on the specific implementation of the encoding and decoding functions. Based on conducted experiments, this behavior appears to be more significantly influenced by the form of the decoding function, which relies on critical assumptions from the initial iterations—for instance, regarding the initial bit values of the decoded message. Subsequent iterations contribute additional increments of information, progressively building the overall data and ultimately determining whether the entire message is successfully decoded.
Drawing on the adopted definition and the nature of the IIF, the following key characteristics can be emphasized:
  • Range of values: the values of the IIF are contained within the closed interval [0, 1], with values between approximately 0.5 and 1 being of particular importance. Smaller values of the IIF indicate a higher presence of noise, while larger values reflect a greater degree of encoded information.
  • Monotonicity: for a properly functioning steganographic technique, featuring a well-defined encoding and decoding algorithm, the IIF is expected to remain non-decreasing, except for rare, isolated cases where the iterative steganogram exhibits non-uniformity, resulting in temporary disruptions to monotonicity. Each successive iteration of the decoding algorithm should either increase the amount of information in the decoded message, or at worst, maintain it without any decrease.
  • Asymptotic behavior: the IIF demonstrates asymptotic tendencies, approaching the maximum achievable level of information that can be decoded from a given steganogram, subject to specified noise conditions and the parameter settings of the encoding algorithm. In most cases, this value will not reach 1, which would represent the complete decoding of all information encoded in the original steganogram. However, it is expected to represent a sufficiently significant portion of the encoded information, enabling the recipient to decode the message content.

3.3. Characteristic Values

The characteristic value, c h I I F s , is defined as the smallest value of the I I F function at which the information extracted from the steganogram, s , is sufficient to decode the message, m . The level of c h I I F s serves as a defining feature that strongly characterizes a specific steganographic technique.
Conversely, the characteristic value, c h I t e r a t i o n s , is defined as the first iteration at which the I I F function attains the characteristic value, c h I I F s (refer to Equation (17)).
c h I I F s = I I F ( s c h I t e r a t i o n s ,   m )
where
  • s —the steganogram created by encoding the message, m ;
  • m —the message that is encoded into the steganogram, s ;
  • c h I I F s —the minimum value of the I I F required to successfully decode the message, m , from the steganogram, s ,
  • c h I t e r a t i o n s —the first iteration at which the I I F reaches the value of c h I I F s .
The characteristic value, c h I I F s , serves as an indicator of the robustness of a given steganographic technique and the steganogram, s , itself. A lower value of c h I I F s implies that less decoded information is required to reveal the hidden message, allowing for greater tolerance to distortions or transformations in the steganogram.
Conversely, the characteristic value, c h I t e r a t i o n s , serves as an indicator of the steganogram’s capacity. A lower c h I t e r a t i o n s value indicates that the hidden message is decoded faster, requiring fewer iterations. For iterative steganography, this translates to higher capacity, reflecting the ability to encode and decode more bits of information in less time. In the context of capacity, iterative steganography differs significantly from classical, non-iterative steganography. For unitary objects, capacity can be understood as a measure of the amount of information that can be encoded in a single instance, relative to the total information capacity of the individual steganogram. In iterative steganography, where the primary paradigm involves incremental changes in information during each iteration, capacity is instead understood as the amount of information that can be obtained per unit of time or per individual iteration. This distinction highlights why c h I t e r a t i o n s serves as an effective indicator of information capacity in iterative steganography.

3.4. IIF Value Matrix

For each iteration of the decoding algorithm, a matrix is constructed (refer to Table 1) to present the results of the function I I F o r i g , d e c corresponding to that iteration.

3.5. IIF and BER Indicator

In the context of steganography, the Bit Error Rate (BER) is a metric used to evaluate the accuracy of message retrieval from a steganogram. It quantifies the proportion of bits incorrectly decoded compared to the total number of bits in the original hidden message. For traditional, non-iterative steganography, the BER is calculated directly as the ratio of erroneous bits in the decoded message to the total number of bits in the original message. The BER does not distinguish between errors in decoding 0s and 1s, treating them equally and assigning the same weight to all errors in its formula. Using the defined functions I I F 0,1 and I I F 1,0 , the BER can be represented mathematically, as shown in Equation (18).
Z N i 1 . . . Z B E R s i ,   m = I I F 0,1 s Z ,   m + I I F 1,0 s Z ,   m · Z L
where
  • B E R s i ,   m —the BER calculated for the iteration, s i , and the message, m ;
  • s Z —the complete steganogram containing all Z iterations.

4. Results

4.1. Research Experiments

To investigate the Incremental Information Function ( I I F ) , this study conducted experiments using video steganography as an example of an iterative steganography. A simple LSB (Least Significant Bit) [13] technique was employed to encode a two-dimensional black and white image in the spatial domain. The details of the method are as follows:
  • The covers consist of video files treated as sequences of consecutive frames, each being an image;
  • Successive iterations in which the message is encoded occur every third frame of the video files;
  • The message is encoded using a steganographic method operating in the spatial domain, modifying the color values of the pixels in the video frames;
  • The decoding function assumes that, from the first iteration, all bits of the message are initialized to zero. Subsequent iterations incrementally build information by setting 1’s and clearing 0’s in the message;
  • The message is encoded in the form of a version 1 QR code with error correction level H, enabling the encoding of up to 72 bits in a 21 × 21 module matrix with error correction up to 30% [20], facilitating the use of automatic tools for reading the decoding message.
The steganography technique employed in the experiments encodes the subsequent bits of the message as follows:
  • Each video frame is divided into pixel blocks, with the total number corresponding to the length of the message, and each block represents a single bit of the message.
  • For consecutive pairs of video frames, the difference in color values between corresponding pixels is calculated;
  • Encoding a bit value of 1 in a pixel block involves increasing the value of the R (red) color channel and the B (blue) color channel while simultaneously decreasing the value of the G (green) channel. Conversely, encoding a bit value of 0 involves increasing the G (green) color channel value while decreasing the R (red) and B (blue) color channel values;
  • The technique adaptively selects pairs of pixels for encoding, focusing on those with minimal initial color differences between frames to maintain imperceptibility, particularly pixels where the color difference between consecutive video frames is zero;
  • The values of the respective color channels are modified based on a parameter of the encoding algorithm, called the encoding level, which ranges from 1 to 5. At level 1, the adjustment affects only the least significant bit (00000001b), while at level 5, it modifies the three least significant bits (00000101b).

4.2. Example 1

For the first experiment, video steganogram No. 1. was selected. As a result of the decoding function’s operation, successive values of the functions I I F 0,0 , I I F 0,1 , I I F 1,0 , I I F 1,1 , and I I F were calculated. The plots of these functions are presented in Figure 1.
Figure 1 highlights, with a blue vertical line, the characteristic values, c h I I F s and c h I t e r a t i o n s , which indicate the minimum threshold at which the information gain becomes sufficient for accurately decoding the hidden message.

4.3. Example 2

For experiment No. 2, video steganogram No. 2 was selected. This steganogram was encoded using five different encoding levels, each corresponding to a varying degree of alteration to the original cover. A higher encoding level result in greater the modification to the cover, leading to increased information capacity—the amount of information that can be encoded in the steganogram—but also reduced imperceptibility, resulting in a more noticeable difference between the steganogram and the original cover.
Table 2 illustrates the process of incremental information gain in the decoded message over the first ten iterations for video steganogram No. 2, encoded at five different encoding levels. With each decoding iteration, as the amount of information extracted from the steganogram increases, the QR code representing the message becomes progressively clearer. This corresponds to an increase in the value of the I I F function, which, after a specific number of iterations, reaches the characteristic value, c h I I F s , enabling the message to be fully decoded. Each cell in the table contains a black and white image of a QR code representing the decoded message, along with the corresponding I I F value for that iteration of the decoded steganogram.
Table 2 clearly demonstrates a positive correlation between the I I F and the amount of information decoded from the steganogram: the higher the I I F value, the more information can be extracted. Cells highlighted in yellow mark iterations where the amount of decoded information allowed automatic recognition of the QR code content, facilitating retrieval of the encoded message. The first yellow-highlighted cell for each encoding level determines the characteristic value, c h I I F s .
Figure 2, which corresponds to the results presented in Table 2, shows the plots of the I I F across the full range of decoded iterations for video steganogram No. 2, encoded at five different encoding levels. The I I F plots highlight the points where for each steganogram, the I I F attains the characteristic value, c h I I F s , and indicates the characteristic value, c h I t e r a t i o n s , representing the iteration at which c h I I F s is reached.
Figure 2 shows the graphs of five I I F functions corresponding to five versions of a steganogram No. 2, each encoded at different encoding levels. These levels range from encoding level 1, depicted in the lightest color and representing the minimal changes introduced to the steganogram by the encoding function, to encoding level 5, depicted in the darkest color and corresponding to the highest level of changes applied. Lower encoding levels result in higher undetectability of the steganogram but come at the cost of reduced resistance to distortions and noise in the information transmitted between consecutive video frames—iterations of the iterative video steganogram.

4.4. Discussion

The results of first experiment, shown in Figure 1, include the plots of the functions I I F 0,0 , I I F 0,1 , I I F 1,0 , I I F 1,1 , and the overall I I F function for video steganogram No. 1. Analyzing the plots yields the following observations:
  • for video steganogram No. 1, the message was successfully decoded at the 18th iteration ( c h I t e r a t i o n s = 18) with an I I F value of c h I I F s   = 0.828;
  • the functions I I F 0,0 , I I F 1,1 and the overall I I F function asymptotically converge to a maximum value close to 1.0;
  • the values of I I F 0,1 and I I F 1,0 carry no significant information, in this example, as they are complementary to the values of I I F 0,0 and I I F 1,1 ;
  • the initial value of I I F 0,0 is notably high due to a property of the decoding function, which assumes that all information bits are initialized to zero at the start of the algorithm.
The results of the second experiment, presented in Figure 2 and Table 2, show that, within the range of studied iterations, information was successfully decoded for the three highest encoding levels of video steganogram No. 2, while for the two lowest encoding levels, the I I F values remained at noise levels.
Based on the experiments, two characteristic regions of I I F values were identified: the noise region and the decoding region. The noise region corresponds to I I F values in the range of 0.5–0.7. The decoding region corresponds to I I F values in the range of 0.7–1.0, and it is within this range that the characteristic value c h I I F s is found, depending on the steganographic technique used, particularly on the implementation of the decoding algorithm.
As described earlier, the properties of the I I F indicate that, in cases where hidden information can be decoded from the steganogram, the I I F increases and asymptotically approaches the maximum value specific to the steganogram. The rate of increase in the I I F is directly correlated with the encoding level, as higher encoding levels result in a greater information increment per iteration. However, if the information gain in successive iterations does not exceed the information loss associated with transitioning between iterations (e.g., due to inter-frame compression mechanisms used by video codecs), the I I F will remain static, and its values will stay within the noise region.

5. Conclusions

This study presents a detailed characterization and modeling framework for a class of iterative steganographic techniques. It introduces a novel method for quantifying and evaluating the performance of these techniques using the Incremental Information Function (IIF). Through a case study employing a selected video steganography method, the research illustrates the application of the IIF to analyzing the properties of iterative steganographic techniques, including the measurement of robustness and capacity by determining characteristic IIF values. This approach offers a fresh perspective on the information dynamics within iterative steganographic systems, with the potential to advance both the implementation of steganography and the effectiveness of steganalysis.
The study achieves its primary objective by developing a formal method for quantifying and analyzing information increments in iterative steganographic systems. It introduces an effective framework for assessing the efficiency and robustness of these techniques, supported by practical examples that illustrate its application to elucidate the properties of the studied steganographic methods. This advancement lays the foundation for further research and development in the field of steganography, offering a systematic and robust analytical tool to evaluate and enhance the performance of iterative techniques.

5.1. Theoretical Contributions

This work introduces:
  • a formal mathematical model for characterizing a class of iterative steganographic methods;
  • a novel quantitative method for evaluating the performance of iterative steganographic techniques, based on the proposed Incremental Information Function (IIF);
  • the application of characteristic IIF values to quantify robustness and capacity metrics in iterative steganographic systems.
These contributions provide an effective framework for analyzing and optimizing iterative steganographic techniques, enhancing the theoretical foundations of this field and facilitating more precise evaluation of steganographic performance.

5.2. Practical Implications

The findings of this study demonstrate that the proposed method, based on the Incremental Information Function (IIF) and the analysis of its characteristic values, constitutes an effective analytical tool for investigating the properties of iterative steganographic techniques. This approach enables quantitative assessment of key performance metrics, including the robustness and capacity of iterative steganograms. The IIF-based method provides a systematic framework for evaluating and comparing different iterative steganographic algorithms, with the potential to optimize steganographic systems and improve the effectiveness of steganalysis techniques.

5.3. Future Research

The following avenues for further investigation are proposed:
  • extension of IIF application: explore the utilization of the Incremental Information Function (IIF) in diverse iterative steganography methods beyond video steganography, such as network steganography protocols;
  • universal IIF characteristics: examine the potential existence of universal characteristic values (chIIF) of the IIF that may describe and differentiate various iterative steganography techniques, including multiple video steganography methods;
  • IIF in steganalysis: investigate the potential applications of IIF properties in steganalysis processes for the detection and analysis of steganographic content, potentially enhancing the efficacy of current steganalysis techniques.
These proposed research directions aim to expand the applicability and deepen the understanding of the IIF methodology in the broader context of steganography and steganalysis.

Author Contributions

Conceptualization, M.P.; Methodology, M.P.; Software, M.P.; Validation, R.W.; Writing—original draft, M.P.; Visualization, M.P.; Supervision, R.W.; Funding acquisition, R.W. All authors have read and agreed to the published version of the manuscript.

Funding

The work was partially financed by the Military University of Technology in Warsaw, Poland as part of the project No. UGB 22-701.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Kahn, D. The Codebreakers: The Story of Secret Writing; Macmillan: New York, NY, USA, 1967; ISBN 978-0025604605. [Google Scholar]
  2. Shannon, C. A Mathematical Theory of Communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef]
  3. Johnson, N.; Jajodia, S. Exploring Steganography: Seeing the Unseen. IEEE Comput. 1998, 31, 26–34. [Google Scholar] [CrossRef]
  4. Johnson, N.; Duric, Z.; Jajodia, S. Information Hiding: Steganography and Watermarking—Attacks and Countermeasures; Springer: Boston, MA, USA, 2001; ISBN 978-0-7923-7204-2. [Google Scholar] [CrossRef]
  5. Petitcolas, F.; Anderson, R.; Kuhn, M. Information hiding—A survey. Proc. IEEE 1999, 87, 1062–1078. [Google Scholar] [CrossRef]
  6. Fridrich, J. Steganography in Digital Media: Principles, Algorithms, and Applications; Cambridge University Press: Cambridge, UK, 2009. [Google Scholar] [CrossRef]
  7. Sencar, H.; Ramkumar, M.; Akansu, A. Data Hiding Fundamentals and Applications; Elsevier Academic Press: Burlington, ON, USA, 2004; ISBN 9780120471447. [Google Scholar] [CrossRef]
  8. Zou, J.Z.; Chen, M.X.; Gong, L.H. Invisible and robust watermarking model based on hierarchical residual fusion multi-scale convolution. Neurocomputing 2025, 614, 128834. [Google Scholar] [CrossRef]
  9. Gong, L.H.; Luo, H.X. Dual color images watermarking scheme with geometric correction based on quaternion FrOOFMMs and LS-SVR. Opt. Laser Technol. 2023, 167, 109665. [Google Scholar] [CrossRef]
  10. Huynh-Thu, Q.; Ghanbari, M. Scope of validity of PSNR in image/video quality assessment. Electron. Lett. 2008, 44, 800–801. [Google Scholar] [CrossRef]
  11. Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [PubMed]
  12. Cox, I.; Miller, M.; Kalker, T. Digital Watermarking and Steganography; Morgan Kaufmann Publishers: Burlington, ON, USA, 2007; ISBN 0123725852. [Google Scholar]
  13. Anderson, R.; Petitcolas, F. On the limits of steganography. IEEE J. Sel. Areas Commun. 1998, 16, 474–481. [Google Scholar] [CrossRef]
  14. Kadhim, I.J.; Premaratne, P.; Vial, P.J.; Halloran, B. Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. Neurocomputing 2019, 335, 299–326. [Google Scholar] [CrossRef]
  15. Chan, C.; Cheng, L. Hiding data in images by simple LSB substitution. Pattern Recognit. 2004, 37, 469–474. [Google Scholar] [CrossRef]
  16. Bennett, K. Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text; CERIAS Tech Report 2004-13; Purdue University: West Lafayette, IN, USA, 2004; Available online: https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/2004-13.pdf (accessed on 16 November 2024).
  17. Kunhoth, J.; Subramanian, N.; Al-Maadeed, S.; Bouridane, A. Video steganography: Recent advances and challenges. Multimed. Tools Appl. 2023, 82, 11817–11868. [Google Scholar] [CrossRef]
  18. Lubacz, J.; Mazurczyk, W.; Szczypiorski, K. Principles and Overview of Network Steganography. IEEE Commun. Mag. 2012, 52, 225–229. [Google Scholar] [CrossRef]
  19. Katzenbeisser, S.; Petitcolas, F. Information Hiding Techniques for Steganography and Digital Watermarking; Artech House: Norwood, MA, USA, 2000; ISBN 978-1-58053-035-4. [Google Scholar]
  20. DensoWave. QR Code. Available online: https://www.qrcode.com (accessed on 16 November 2024).
Figure 1. Plots of the functions IIF(0,0), IIF(1,1), IIF(0,1), IIF(1,0), and IIF for video steganogram No. 1.
Figure 1. Plots of the functions IIF(0,0), IIF(1,1), IIF(0,1), IIF(1,0), and IIF for video steganogram No. 1.
Entropy 26 01130 g001
Figure 2. Plots of the IIF for video steganogram No. 2 encoded with 5 levels of encoding.
Figure 2. Plots of the IIF for video steganogram No. 2 encoded with 5 levels of encoding.
Entropy 26 01130 g002
Table 1. Values of I I F o r i g , d e c for i -th iteration of decoding algorithm.
Table 1. Values of I I F o r i g , d e c for i -th iteration of decoding algorithm.
Values of Bits in the Original Message  m
01
Values of Bits in the Decoded Message  m 1 0 I I F 0,0 I I F 1,0
1 I I F 0,1 I I F 1,1
Table 2. Incremental increase in information in the initial iterations for video steganogram No. 2.
Table 2. Incremental increase in information in the initial iterations for video steganogram No. 2.
IterationLevel 1Level 2Level 3Level 4Level 5
1Entropy 26 01130 i001Entropy 26 01130 i002Entropy 26 01130 i003Entropy 26 01130 i004Entropy 26 01130 i005
IIF = 0.636IIF = 0.672IIF = 0.716IIF = 0.772IIF = 0.802
2Entropy 26 01130 i006Entropy 26 01130 i007Entropy 26 01130 i008Entropy 26 01130 i009Entropy 26 01130 i010
IIF = 0.627IIF = 0.669IIF = 0.727IIF = 0.796IIF = 0.838
3Entropy 26 01130 i011Entropy 26 01130 i012Entropy 26 01130 i013Entropy 26 01130 i014Entropy 26 01130 i015
IIF = 0.617IIF = 0.667IIF = 0.735IIF = 0.812IIF = 0.858
4Entropy 26 01130 i016Entropy 26 01130 i017Entropy 26 01130 i018Entropy 26 01130 i019Entropy 26 01130 i020
IIF = 0.607IIF = 0.662IIF = 0.740IIF = 0.821IIF = 0.871
5Entropy 26 01130 i021Entropy 26 01130 i022Entropy 26 01130 i023Entropy 26 01130 i024Entropy 26 01130 i025
IIF = 0.598IIF = 0.661IIF = 0.750IIF = 0.840IIF = 0.890
6Entropy 26 01130 i026Entropy 26 01130 i027Entropy 26 01130 i028Entropy 26 01130 i029Entropy 26 01130 i030
IIF = 0.592IIF = 0.659IIF = 0.753IIF = 0.845IIF = 0.895
7Entropy 26 01130 i031Entropy 26 01130 i032Entropy 26 01130 i033Entropy 26 01130 i034Entropy 26 01130 i035
IIF = 0.593IIF = 0.664IIF = 0.760IIF = 0.852IIF = 0.901
8Entropy 26 01130 i036Entropy 26 01130 i037Entropy 26 01130 i038Entropy 26 01130 i039Entropy 26 01130 i040
IIF = 0.585IIF = 0.661IIF = 0.760IIF = 0.854IIF = 0.903
9Entropy 26 01130 i041Entropy 26 01130 i042Entropy 26 01130 i043Entropy 26 01130 i044Entropy 26 01130 i045
IIF = 0.587IIF = 0.664IIF = 0.769IIF = 0.864IIF = 0.909
10Entropy 26 01130 i046Entropy 26 01130 i047Entropy 26 01130 i048Entropy 26 01130 i049Entropy 26 01130 i050
IIF = 0.587IIF = 0.669IIF = 0.777IIF = 0.873IIF = 0.919
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Pery, M.; Waszkowski, R. A Model and Quantitative Framework for Evaluating Iterative Steganography. Entropy 2024, 26, 1130. https://doi.org/10.3390/e26121130

AMA Style

Pery M, Waszkowski R. A Model and Quantitative Framework for Evaluating Iterative Steganography. Entropy. 2024; 26(12):1130. https://doi.org/10.3390/e26121130

Chicago/Turabian Style

Pery, Marcin, and Robert Waszkowski. 2024. "A Model and Quantitative Framework for Evaluating Iterative Steganography" Entropy 26, no. 12: 1130. https://doi.org/10.3390/e26121130

APA Style

Pery, M., & Waszkowski, R. (2024). A Model and Quantitative Framework for Evaluating Iterative Steganography. Entropy, 26(12), 1130. https://doi.org/10.3390/e26121130

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop