2 \section{Steganography: a class of secure and robust algorithms~\cite{bcg11:ij}}
4 This section is devoted to the recall of our contribution published in The
5 Computer Journal~\cite{bcg11:ij}.
6 This article is a review of the researches presented
7 in the previous sections. Additionnaly, it investigates robustness aspects of the
9 applications in frequency domains (namely DWT and DCT embedding)
\r
10 are formalized and corresponding experiments are
\r
11 given~\cite{bcg11:ij}.
\r
12 Such a study shows the applicability of the whole approach.
\r
17 \subsection{Discovering another relevant mode}
\r
18 \label{sec:applications}
\r
19 %\input{applications}
\r
21 We can conclude from the previously summarized article
22 that we are left to provide:
24 \item an u.d. strategy-adapter that is independent
\r
26 \item an image mode $f_l$ whose iteration
\r
27 graph $\Gamma(f_l)$ is strongly connected and whose Markov
\r
28 matrix is doubly stochastic.
\r
30 We have recalled in the previous section that the $\textit{CIIS}(K,y,\alpha,l)$ strategy adapter
\r
31 has the required properties.
\r
32 In all the experiments provided in~\cite{bcg11:ij}, parameters $K$ and $\alpha$ are randomly
\r
33 chosen in $] 0, 1[$ and $] 0, 0.5[$ respectively, while the
34 number of iteration is set to $4\times lm$, where $lm$ is the number of LSCs
\r
35 that depends on the domain.
\r
37 \cite{bcg11:ij} has then used the iterative approach of Section~\ref{sec:prac} to generate image
\r
38 modes $f_l$ such that $\Gamma(f_l)$ is strongly connected, which has
39 been proposed in~\cite{bcgr11:ip} and recalled in the first part
40 of this manuscript. Among these
\r
41 maps, it is obvious to check which verifies or not the doubly
\r
42 stochastic constrain.
\r
43 We have already stated that the negation mode matches these hypotheses, so it is relevant in that context.
44 As a second example, we have considered in~\cite{bcg11:ij} the mode
\r
45 $f_l: \mathds{B}^l \rightarrow \mathds{B}^l$ s.t. its $i$-th component is
\r
52 \overline{x_i} \textrm{ if $i$ is odd} \\
\r
53 x_i \oplus x_{i-1} \textrm{ if $i$ is even.}
\r
58 Thanks to Theorem~\ref{th:stego}, we have deduced in~\cite{bcg11:ij} that its iteration graph
\r
59 $\Gamma(f_l)$ is strongly connected, and have finally proven
\r
60 that its Markov chain is doubly stochastic by induction on the length $l$.
\r
63 \subsection{dhCI in frequency domains}
64 We recall in this section the experimental protocol applied in~\cite{bcg11:ij}.
66 \subsubsection{DWT embedding}
\r
69 We have firstly explained in~\cite{bcg11:ij} how the dhCI dissimulation can be applied in
\r
70 the discrete wavelets transform domain (DWT).
\r
71 The Daubechies family of wavelets has been chosen:
\r
72 % a bitmap file of the famous Lena is converted into its Daubechies-1 DWT
\r
73 % coefficients, which are altered by chaotic iterations.
\r
74 each DWT decomposition depends on a decomposition level and a coefficient
\r
75 matrix (Figure~\ref{fig:DWTs}): $\textit{LL}$ means approximation coefficient,
\r
76 when $\textit{HH},\textit{LH},\textit{HL}$ denote respectively diagonal,
\r
77 vertical, and horizontal detail coefficients.
\r
78 For example, the DWT coefficient \textit{HH}2 is the matrix equal to the
\r
79 diagonal detail coefficient of the second level of decomposition of the image.
\r
83 \includegraphics[width=4cm]{IH/CompJ/DWTs.eps}
\r
85 \caption{Wavelets coefficients.}
\r
93 The choice of the detail level is motivated by finding
\r
94 a good compromise between robustness and invisibility.
\r
95 Choosing low or high frequencies in DWT domain leads either to a very
\r
96 fragile watermarking without robustness (especially when facing a
\r
97 JPEG2000 compression attack) or to a large degradation of the host
\r
99 In order to have a robust but discrete DWT embedding,
\r
100 the second detail level
\r
101 (\textit{i.e.}, $\textit{LH}2,\textit{HL}2,\textit{HH}2$)
\r
102 that corresponds to the middle frequencies,
\r
103 has been retained in~\cite{bcg11:ij}.
\r
108 Let us consider the Daubechies wavelet coefficients of a third
\r
109 level decomposition as represented in Figure~\ref{fig:DWTs}.
\r
110 We then have translated these float coefficients into their 32-bits values, and have
111 defines in~\cite{bcg11:ij} the significance function $u$ that associates to any index $k$ in this sequence of bits the following numbers:
\r
113 \item $u^k = -1$ if $k$ is one of the three last bits of any index of
\r
114 coefficients in $\textit{LH}2$, $\textit{HL}2$, or in $\textit{HH}2$;
\r
115 \item $u^k = 0$ if $k$ is an index of a coefficient in
\r
116 $\textit{LH}1$, $\textit{HL}1$, or in $\textit{HH}1$;
\r
117 \item $u^k = 1$ otherwise.
\r
120 According to the definition of significance of coefficients
\r
121 (Def.~\ref{def:msc,lsc}), if $(m,M)$ is $(-0.5,0.5)$, LSCs are the
\r
122 last three bits of coefficients in
\r
123 $\textit{HL}2$, $\textit{HH}2$, and $\textit{LH}2$.
\r
124 Thus, decomposition and recomposition functions are fully defined
\r
125 and dhCI dissimulation scheme can now be applied.
\r
127 Figure \ref{fig:DWT} shows the result of a
\r
128 dhCI dissimulation embedding into DWT domain.
\r
129 The original is the image 5007 of the BOSS contest~\cite{Boss10}.
\r
130 Watermark $y$ is given in Fig.~\ref{(b) Watermark}.
\r
131 From a random selection of 50 images into the database from the BOSS
\r
132 contest~\cite{Boss10}, we have applied in~\cite{bcg11:ij} the dhCI algorithm
134 defined in the previous section and with the negation mode.
\r
138 \subfigure[Original Image.]{\includegraphics[width=5cm]
\r
139 {IH/CompJ/5007.eps}\label{(a) Original 5007}}\hspace{1cm}
\r
140 \subfigure[Watermark $y$.]{\includegraphics[width=1cm]{IH/CompJ/invader.eps}\label{(b) Watermark}}\hspace{1cm}
\r
141 \subfigure[Watermarked Image.]{\includegraphics[width=5cm]{IH/CompJ/5007_bis.eps}\label{(c) Watermarked 5007}}
\r
143 \caption{Data hiding in DWT domain}
\r
148 \subsubsection{DCT embedding}
\r
151 We have then explored the discrete cosinus transform (DCT) frequency domain embedding in~\cite{bcg11:ij}, by
152 following the protocol detailed below.
154 Let us denote by $x$ the original image of size $H \times L$, and by $y$
\r
155 the hidden message, supposed here to be a binary image of size $H' \times L'$. %
\r
156 The image $x$ is transformed from the spatial
\r
157 domain to DCT domain frequency bands,
\r
158 in order to embed $y$ inside it.
\r
159 To do so, the host image is firstly divided into $8 \times 8$
\r
160 image blocks as given below:
\r
161 $$x = \bigcup_{k=1}^{H/8} \bigcup_{k'=1}^{L/8} x(k,k').$$
\r
162 Thus, for each image block,
\r
163 a DCT is performed and the coefficients in the frequency bands
\r
164 are obtained as follows:
\r
165 $x_{DCT}(m;n) = DCT(x(m;n))$.
\r
167 To define a discrete but robust scheme, only the three following coefficients of each $8 \times 8$ block in position $(m,n)$ has
168 been possibly modified in~\cite{bcg11:ij}: $x_{DCT}(m;n)_{(3,1)},$ $x_{DCT}(m;n)_{(2,2)},$ or $x_{DCT}(m;n)_{(1,3)}$.
\r
169 This choice can be reformulated as follows.
\r
170 Coefficients of each DCT matrix are re-indexed by using a southwest/northeast diagonal, such that $i_{DCT}(m,n)_1 = x_{DCT}(m;n)_{(1,1)}$, $i_{DCT}(m,n)_2 = x_{DCT}(m;n)_{(2,1)}$, $i_{DCT}(m,n)_3 = x_{DCT}(m;n)_{(1,2)}$, $i_{DCT}(m,n)_4 = x_{DCT}(m;n)_{(3,1)}$, ..., and $i_{DCT}(m,n)_{64} =$ $ x_{DCT}(m;n)_{(8,8)}$.
\r
171 So the signification function can be defined in this context by:
\r
173 \item if $k$ mod $64 \in \{1,2,3\}$ and $k\leqslant H\times L$, then $u^k=1$;
\r
174 \item else if $k$ mod $64 \in \{4, 5, 6\}$ and $k\leqslant H\times L$, then $u^k=-1$;
\r
175 \item else $u^k = 0$.
\r
177 The significance of coefficients are obtained for instance with
\r
178 $(m,M)=(-0.5,0.5)$ leading to the definitions of MSCs, LSCs, and passive coefficients.
\r
179 Thus, decomposition and recomposition functions are fully defined
180 and dhCI dissimulation scheme has then been applied in~\cite{bcg11:ij}.
\r
185 \subsection{Image quality}
\r
187 This section focuses on measuring visual quality of our steganographic method.
\r
188 Traditionally, this is achieved by quantifying the similarity
\r
189 between the modified image and its reference image.
\r
190 The Mean Squared Error (MSE) and the Peak Signal to Noise
\r
191 Ratio (PSNR) are the most widely known tools that provide such a metric.
\r
192 However, both of them do not take into account Human Visual System (HVS)
\r
194 Recent works~\cite{EAPLBC06,SheikhB06,PSECAL07,MB10} have tackled this problem
\r
195 by creating new metrics. Among them, what follows focuses on PSNR-HVS-M~\cite{PSECAL07} and BIQI~\cite{MB10}, considered as advanced visual quality metrics.
\r
196 The former efficiently combines PSNR and visual between-coefficient contrast masking of DCT basis functions based on HVS. This metric has
\r
197 been computed in~\cite{bcg11:ij}
198 by using the implementation given at~\cite{psnrhvsm11}.
\r
199 The latter allows to get a blind image quality assessment measure,
\r
200 \textit{i.e.}, without any knowledge of the source distortion.
\r
201 Its implementation is available at~\cite{biqi11}.
\r
206 \begin{tabular}{|c|c|c|c|c|}
\r
208 Embedding & \multicolumn{2}{|c|}{DWT}
\r
209 & \multicolumn{2}{|c|}{DCT} \\
\r
211 Mode & $f_l$ & neg. & $f_l$ & neg. \\
\r
213 PSNR & 42.74 & 42.76 & 52.68 & 52.41 \\
\r
215 PSNR-HVS-M & 44.28 & 43.97 & 45.30 & 44.93 \\
\r
217 BIQI & 35.35 & 32.78 & 41.59 & 47.47 \\
\r
221 \caption{Quality measures of our steganography approach~\cite{bcg11:ij}}
222 \label{table:quality}
\r
227 Results of the image quality metrics obtained in~\cite{bcg11:ij}
\r
228 are summarized in Table~\ref{table:quality}.
\r
229 In wavelet domain, the PSNR values obtained in~\cite{bcg11:ij} are comparable to other approaches
\r
230 (for instance, PSNR are 44.2 in~\cite{TCL05} and 46.5 in~\cite{DA10}),
\r
231 but a real improvement for the discrete cosine embeddings is obtained
\r
232 (PSNR is 45.17 for~\cite{CFS08}, it is always lower than 48 for~\cite{Mohanty:2008:IWB:1413862.1413865}, and always lower than 39 for~\cite{MK08}).
\r
233 Among steganography approaches that evaluate PSNR-HVS-M, results of our approach
\r
234 are convincing. Firstly, optimized method developed along~\cite{Randall11} has a PSNR-HVS-M equal to 44.5 whereas our approach, with a similar PSNR-HVS-M, should be easily improved by considering optimized mode. Next,
\r
235 another approach~\cite{Muzzarelli:2010} have higher PSNR-HVS-M, certainly, but
\r
236 this work does not address robustness evaluation whereas the study presented in~\cite{bcg11:ij} is complete.
\r
237 Finally, as far as we know, \cite{bcg11:ij} is the first one that has evaluated the BIQI metric in a
238 steganographic context.
\r
242 With all this material, we have then evaluated the robustness of our
\r
243 approach in~\cite{bcg11:ij}.
\r
247 \subsection{Robustness}
\r
248 %\input{robustness}
\r
249 Previous sections have formalized frequential domains embeddings and
\r
250 has focused on the negation and $f_l$ modes.
\r
251 In the robustness given in this continuation, {dwt}(neg),
\r
252 {dwt}(fl), {dct}(neg), and {dct}(fl)
\r
253 respectively stand for the DWT and DCT embedding
\r
254 with the negation mode and with this instantiated mode.
\r
256 For each experiment presented in~\cite{bcg11:ij}, a set of 50 images is randomly extracted
\r
257 from the database taken from the BOSS contest~\cite{Boss10}.
\r
258 Each cover is a $512\times 512$ grayscale digital image and the watermark $y$
\r
259 is given in Figure~\ref{(b) Watermark}.
\r
260 Testing the robustness of the approach is achieved in~\cite{bcg11:ij} by successively applying
\r
261 on watermarked images attacks like cropping, compression, and geometric
\r
263 Differences between
\r
264 $\hat{y}$ and $\varphi_m(z)$ have then been
\r
265 computed. Behind a given threshold rate, the image is said to be watermarked.
\r
266 Finally, discussion on metric quality of the approach given in~\cite{bcg11:ij} is recalled in
\r
267 Section~\ref{sub:roc}.
\r
271 \subsubsection{Robustness against cropping}
273 Robustness of the approach is evaluated by
\r
274 applying different percentage of cropping: from 1\% to 81\%.
\r
275 Results obtained in~\cite{bcg11:ij} are recalled in Figure~\ref{Fig:atck:dec}.
276 Figure~\ref{Fig:atq:dec:img}
\r
277 gives the cropped image
\r
278 where 36\% of the image is removed, while Figure~\ref{Fig:atq:dec:curves}
279 presents effects of such an attack.
\r
280 From this experiment, we have concluded in~\cite{bcg11:ij} that all embeddings have similar
\r
282 All the percentage differences are so far less than 50\%
\r
283 (which is the mean random error) and thus robustness is established.
\r
289 \subfigure[Cropped image]{\includegraphics[width=0.24\textwidth]
\r
290 {IH/CompJ/5007_dec_307.eps}\label{Fig:atq:dec:img}}\hspace{2cm}
\r
291 \subfigure[Cropping effects]{
\r
292 \includegraphics[width=0.5\textwidth]{IH/CompJ/atq-dec.eps}\label{Fig:atq:dec:curves}}
\r
293 \caption{Cropping results}
\r
294 \label{Fig:atck:dec}
\r
298 \subsubsection{Robustness against compression}
\r
300 Robustness against compression is addressed
\r
301 by studying both JPEG and JPEG 2000 image compressions.
\r
302 Results obtained in~\cite{bcg11:ij} are respectively presented in Fig.~\ref{Fig:atq:jpg:curves}
\r
303 and Fig.~\ref{Fig:atq:jp2:curves}.
\r
304 Without surprise, DCT embedding which is based on DCT
\r
305 (as JPEG compression algorithm is) is more
\r
306 adapted to JPEG compression than DWT embedding.
\r
307 Furthermore, we have a similar behavior for the JPEG 2000 compression algorithm, which is based on wavelet encoding: DWT embedding naturally outperforms
\r
308 DCT one in that case.
\r
313 \subfigure[JPEG effects]{
\r
314 \includegraphics[width=0.48\textwidth]{IH/CompJ/atq-jpg.eps}\label{Fig:atq:jpg:curves}}
\r
315 \subfigure[JPEG 2000 effects]{
\r
316 \includegraphics[width=0.48\textwidth]{IH/CompJ/atq-jp2.eps}\label{Fig:atq:jp2:curves}}
\r
317 \caption{Compression results}
\r
318 \label{Fig:atck:comp}
\r
323 \subsubsection{Robustness against contrast and sharpness}
\r
325 Contrast and Sharpness adjustments belong to the classical set of
\r
326 filtering image attacks.
\r
327 Results of such attacks are presented in
\r
328 Fig.~\ref{Fig:atq:fil} where
\r
329 Fig.~\ref{Fig:atq:cont:curve} and Fig.~\ref{Fig:atq:sh:curve} summarize
\r
330 effects of contrast and sharpness adjustment respectively~\cite{bcg11:ij}.
\r
335 \subfigure[Contrast effects]{
\r
336 \includegraphics[width=0.48\textwidth]{IH/CompJ/atq-contrast.eps}\label{Fig:atq:cont:curve}}
\r
337 \subfigure[Sharpness effects]{
\r
338 \includegraphics[width=0.48\textwidth]{IH/CompJ/atq-flou.eps}\label{Fig:atq:sh:curve}}
\r
339 \caption{Filtering results}
\r
340 \label{Fig:atq:fil}
\r
343 \subsubsection{Robustness against geometric transformations}
\r
345 Among geometric transformations, we have focused in~\cite{bcg11:ij} on
\r
346 rotations, \textit{i.e.}, when two opposite rotations
\r
347 of angle $\theta$ are successively applied around the center of the image.
\r
348 In these geometric transformations, angles range from 2 to 20
\r
350 Results obtained in~\cite{bcg11:ij} are summed up in Figure~\ref{Fig:atq:rot}: Fig.~\ref{Fig:atq:rot:img}
\r
351 gives the image of a rotation of 20 degrees whereas
\r
352 Fig.~\ref{Fig:atq:rot:curve} presents effects of such an attack.
\r
353 It is not a surprise that results are better for DCT embeddings: this approach
\r
354 is based on cosine as rotation is.
\r
360 \subfigure[20 degrees rotation image]{
\r
361 \includegraphics[width=0.25\textwidth]{IH/CompJ/5007_rot_10.eps}\label{Fig:atq:rot:img}}
\r
362 \subfigure[Rotation effects]{
\r
363 \includegraphics[width=0.5\textwidth]{IH/CompJ/atq-rot.eps}\label{Fig:atq:rot:curve}}
\r
365 \caption{Rotation attack results}
\r
366 \label{Fig:atq:rot}
\r
369 \subsection{Evaluation of the Embeddings}
372 We are then left to set a convenient threshold that is accurate to
\r
373 determine whether an image is watermarked or not.
\r
374 Starting from a set of 100 images selected among the Boss image panel,
\r
375 we have computed in~\cite{bcg11:ij} the following three sets:
\r
376 the one with all the watermarked images $W$,
\r
377 the one with all successively watermarked and attacked images $\textit{WA}$,
\r
378 and the one with only the attacked images $A$.
\r
379 Notice that the 100 attacks for each image
\r
380 are selected among these detailed previously.
\r
383 For each threshold $t \in \llbracket 0,55 \rrbracket$ and a given image
\r
384 $x \in \textit{WA} \cup A$,
\r
385 differences on DCT have been computed in~\cite{bcg11:ij}.
386 The image has been claimed as watermarked
\r
387 if these differences are less than the threshold.
\r
389 \item In the positive case and if $x$ really belongs to
\r
390 $\textit{WA}$ it is a True Positive (TP) case.
\r
391 \item In the negative case but if $x$ belongs to
\r
392 $\textit{WA}$, it is a False Negative (FN) case.
\r
393 \item In the positive case but if $x$ belongs to
\r
394 $\textit{A}$, it is a False Positive (FP) case.
\r
395 \item Finally, in the negative case and if $x$ belongs to
\r
396 $\textit{A}$, it is a True Negative (TN).
\r
398 The True (resp. False) Positive Rate (TPR) (resp. FPR) has thus been computed
\r
399 by dividing the number of TP (resp. FP) by 100.
\r
403 \includegraphics[width=9cm]{IH/CompJ/ROC.eps}
\r
405 \caption{ROC curves for DWT or DCT embeddings}\label{fig:roc:dwt}
\r
408 Figure~\ref{fig:roc:dwt} recalled the obtained Receiver Operating Characteristic (ROC)
\r
410 For the DWT, it shows that best results are obtained when the threshold
\r
411 is 45\% for the dedicated function (corresponding to the point (0.01, 0.88))
\r
412 and 46\% for the negation function (corresponding to (0.04, 0.85)).
\r
413 It allows to conclude that each time LSCs differences between
\r
414 a watermarked image and another given image $i'$ are less than 45\%, we can claim that
\r
415 $i'$ is an attacked version of the original watermarked content.
\r
416 For the two DCT embeddings, best results have been obtained when the threshold
\r
417 is 44\% (corresponding to the points (0.05, 0.18) and (0.05, 0.28)).
\r
419 We have thus conclude some confidence intervals for all the evaluated
420 attacks in~\cite{bcg11:ij}. The
\r
421 approach is resistant to:
\r
423 \item all the croppings where percentage is less than 85;
\r
424 \item compressions where quality ratio is greater
\r
425 than 82 with DWT embedding and
\r
426 where quality ratio is greater than 67 with DCT one;
\r
427 \item contrast when strengthening belongs to $[0.76,1.2]$
\r
428 (resp. $[0.96,1.05]$) in DWT (resp. in DCT) embedding;
\r
429 \item all the rotation attacks with DCT embedding and a rotation where
\r
430 angle is less than 13 degrees with DWT one.
\r
434 % \subsection{Conclusion}\label{sec:concl}
\r
435 % %\input{conclusion}
\r
436 % This paper has proposed a new class of secure and robust information hiding
\r
438 % It has been entirely formalized, thus allowing both its theoretical security
\r
439 % analysis, and the computation of numerous variants encompassing spatial and
\r
440 % frequency domain embedding.
\r
441 % After having presented the general algorithm with detail, we have given
\r
442 % conditions for choosing mode and strategy-adapter making the whole
\r
443 % class stego-secure or $\epsilon$-stego-secure.
\r
444 % To our knowledge, this is the first time such a result has been established.
\r
447 % Applications in frequency domains (namely DWT and DCT domains) have finally be
\r
449 % Complete experiments have allowed us
\r
450 % first to evaluate how invisible is the steganographic method (thanks to the PSNR computation) and next to verify the robustness property against attacks.
\r
451 % Furthermore, the use of ROC curves for DWT embedding have revealed very high rates
\r
452 % between True positive and False positive results.
\r
454 % In future work, our intention is to find the best image mode with respect to
\r
455 % the combination between DCT and DWT based steganography
\r
456 % algorithm. Such a combination topic has already been addressed
\r
457 % (\textit{e.g.}, in~\cite{al2007combined}), but never with objectives
\r
461 % Additionally, we will try to discover new topological properties for the dhCI
\r
462 % dissimulation schemes.
\r
463 % Consequences of these chaos properties will be drawn in the context of
\r
464 % information hiding security.
\r
465 % We will especially focus on the links between topological properties and classes
\r
466 % of attacks, such as KOA, KMA, EOA, or CMA.
\r
468 % Moreover, these algorithms will be compared to other existing ones, among other
\r
469 % things by testing whether these algorithms are chaotic or not.
\r
470 % Finally we plan to verify the robustness of our approach
\r
471 % against statistical steganalysis methods~\cite{GFH06,ChenS08,DongT08,FridrichKHG11a}.
\r