3 \section{Further Investigations of the dhCI Class}
5 We have recalled at the beginning of this chapter that
6 chaotic iterations can be applied on the least significant
7 coefficients of a medium, either in spatial or in frequency domain, in order to watermark it.
8 The general process has been denoted by dhCI in our thesis, while
9 its particular instantiation with the negation function has been
10 later called $\mathcal{CIW}_1$ (remark that $\mathcal{CIS}_2$ and
11 $\mathcal{DI}_3$ processes do not belong, stricto sensu, to
12 the dhCI class). Since our thesis defense,
13 the dhCI class has been investigated more largely, by discovering
14 new iteration functions and evaluating both its security and
15 robustness. Results of such questioning are summarized thereafter.
18 \subsection{Introduction}
21 The study of the dhCI class has been deepened in~\cite{bcg11b:ip} for its
22 theoretical aspects and in~\cite{bcg11:ij} for practical ones.
24 As for the $\mathcal{CIW}_1$ scheme, the work around the dhCI
25 class focuses on non-blind binary information hiding scheme:
26 the original host is required to extract the binary hidden
27 information. This context is indeed not
28 as restrictive as it could primarily appear.
29 Firstly, it allows to prove
30 the authenticity of a document sent through the Internet
31 (the original document is stored whereas the stego content is sent).
32 Secondly, Alice and Bob can establish an hidden channel into a
34 (Alice and Bob both have the same movie, and Alice hide information into
35 the frame number $k$ iff the binary digit
36 number $k$ of its hidden message is 1).
37 Thirdly, based on a similar idea, a same
38 given image can be marked several times by using various secret parameters
39 owned both by Alice and Bob. Thus more than one bit can be embedded into a given
40 image by using dhCI dissimulation. Lastly, non-blind watermarking is
41 useful in network's anonymity and intrusion detection \cite{Houmansadr09}, and
42 to protect digital data sending through the Internet \cite{P1150442004}.
44 Before~\cite{bcg11b:ip}, stego-security~\cite{Cayre2008} and topological security
46 on the spread spectrum watermarking~\cite{Cox97securespread,HuangFang},
47 and on the $\mathcal{CIW}_1$ algorithm, which is notably an instance of the
48 dhCI method, but which restricts itself to the negation mode (security proofs
49 of $\mathcal{CIS}_2$ and $\mathcal{DI}_3$ have occurred later).
50 We argued in~\cite{bcg11b:ip} that dhCI with other functions can
51 provide algorithms as secure as the $\mathcal{CIW}_1$ one.
52 This work has then generalized the algorithm recalled in Section~\ref{sec:ciw1} and formalized all
53 its stages, independently from the iteration mode. Due to this formalization, it has then been
54 possible to address the proofs of the two
55 security properties for a larger class of iteration modes in~\cite{bcg11b:ip}.
59 Computer Journal~\cite{bcg11:ij}, a review of the researches on the dhCI class has been presented.
60 Additionally, this article has investigated robustness aspects of the
61 process: applications in frequency domains (namely DWT and DCT embedding)
62 have been formalized and corresponding experiments have been
63 given~\cite{bcg11:ij}. Such a study shows the applicability of the whole approach.
67 \subsection{Formalization of steganographic methods}
68 \label{sec:formalization}
71 The data hiding scheme presented in previous works does not constrain media to have
72 a constant size. It is indeed sufficient to provide a function and a strategy
73 that may be parametrized with the size of the elements to modify.
74 Parametrized strategies have already been introduced in a previous
75 section, leading to the notion of \emph{strategy-adapter}.
76 The \emph{mode} notion defined below achieves the same goal
77 but for the iteration function~\cite{bcg11b:ip}.% (until now, only the negation function
82 A map $f$, which associates to any $n \in \mathds{N}$ an application
83 $f_n : \mathds{B}^n \rightarrow \mathds{B}^n$, is called a \emph{mode}.
86 For instance, the \emph{negation mode} is defined by the map that
87 assigns to every integer $n \in \mathds{N}^*$ the function
88 ${\neg}_n:\mathds{B}^n \to \mathds{B}^n,
89 {\neg}_n(x_1, \hdots, x_n) \mapsto (\overline{x_1}, \hdots, \overline{x_n})$.
92 We now use the previously introduced \emph{signification function}
93 to attach a weight to each term defining a digital media,
94 w.r.t. its position $t$, leading to the following notion of
95 a decomposition function~\cite{bcg11b:ip}.
99 \begin{Def}[Decomposition function]
100 Let $(u^k)^{k \in \mathds{N}}$ be a signification function,
101 $\mathfrak{B}$ the set of finite binary sequences,
102 $\mathfrak{N}$ the set of finite integer sequences,
103 $m$ and $M$ be two reals s.t. $m < M$.
104 Any host $x$ may be decomposed into
106 (u_M,u_m,u_p,\phi_{M},\phi_{m},\phi_{p})
117 \item $u_M$, $u_m$, and $u_p$ are coefficients defined in Definition
119 \item $\phi_{M} = \left( x^{u^1_M}, x^{u^2_M}, \ldots,x^{u^{|u_M|}_M}\right)$;
120 \item $\phi_{m} = \left( x^{u^1_m}, x^{u^2_m}, \ldots,x^{u^{|u_m|}_m} \right)$;
121 \item $\phi_{p} =\left( x^{u^1_p}, x^{u^2_p}, \ldots,x^{u^{|u_p|}_p}\right) $.
123 The function that associates the decomposed host to any digital host is
124 the \emph{decomposition function}. It is
125 further referred as $\textit{dec}(u,m,M)$ since it is parametrized by
126 $u$, $m$ and $M$. Notice that $u$ is a shortcut for $(u^k)^{k \in \mathds{N}}$.
130 \begin{Def}[Recomposition]
132 $(u_M,u_m,u_p,\phi_{M},\phi_{m},\phi_{p}) \in
141 \item the sets of elements in $u_M$, elements in $u_m$, and
142 elements in $u_p$ are a partition of $\llbracket 1, n\rrbracket$;
143 \item $|u_M| = |\varphi_M|$, $|u_m| = |\varphi_m|$, and $|u_p| = |\varphi_p|$.
145 One may associate the vector
148 \sum_{i=1}^{|u_M|} \varphi^i_M . e_{{u^i_M}} +
149 \sum_{i=1}^{|u_m|} \varphi^i_m .e_{{u^i_m}} +
150 \sum_{i=1}^{|u_p|} \varphi^i_p. e_{{u^i_p}}
153 $(e_i)_{i \in \mathds{N}}$ is the usual basis of the $\mathds{R}-$vectorial space $\left(\mathds{R}^\mathds{N}, +, .\right)$.
154 The function that associates $x$ to any
155 $(u_M,u_m,u_p,\phi_{M},\phi_{m},\phi_{p})$ following the above constraints
156 is called the \emph{recomposition function}.
159 The embedding consists in the replacement of the values of
160 $\phi_{m}$ of $x$'s LSCs by $y$.
161 It then composes the two decomposition and
162 recomposition functions seen previously. More formally~\cite{bcg11b:ip}:
165 \begin{Def}[Embedding media]
166 Let $\textit{dec}(u,m,M)$ be a decomposition function,
167 $x$ be a host content,
168 $(u_M,u_m,u_p,\phi_{M},\phi_{m},\phi_{p})$ be its image by $\textit{dec}(u,m,M)$,
169 and $y$ be a digital media of size $|u_m|$.
170 The digital media $z$ resulting on the embedding of $y$ into $x$ is
171 the image of $(u_M,u_m,u_p,\phi_{M},y,\phi_{p})$
172 by the recomposition function $\textit{rec}$.
175 We have thus been able in~\cite{bcg11b:ip} to reformulate the \emph{dhCI} information hiding scheme, as follows:
177 \begin{Def}[Data hiding dhCI]
179 Let $\textit{dec}(u,m,M)$ be a decomposition function,
181 $\mathcal{S}$ be a strategy adapter,
182 $x$ be an host content,\linebreak
183 $(u_M,u_m,u_p,\phi_{M},\phi_{m},\phi_{p})$
184 be its image by $\textit{dec}(u,m,M)$,
185 $q$ be a positive natural number,
186 and $y$ be a digital media of size $l=|u_m|$.
189 The \emph{dhCI dissimulation} maps any
190 $(x,y)$ to the digital media $z$ resulting on the embedding of
191 $\hat{y}$ into $x$, s.t.
194 \item We instantiate the mode $f$ with parameter $l=|u_m|$, leading to
195 the function $f_{l}:\mathds{B}^{l} \rightarrow \mathds{B}^{l}$.
196 \item We instantiate the strategy adapter $\mathcal{S}$
197 with parameter $y$ (and some other ones eventually).
198 This instantiation leads to the strategy $S_y \in \llbracket 1;l\rrbracket ^{\mathds{N}}$.
200 \item We iterate $G_{f_l}$ with initial configuration $(S_y,\phi_{m})$.
201 \item $\hat{y}$ is the $q$-th term.
206 To summarize, iterations are realized on the LSCs of the
208 (the mode gives the iterate function,
209 the strategy-adapter gives its strategy),
210 and the last computed configuration is re-injected into the host content,
211 in place of the former LSCs.
216 \includegraphics[width=10cm]{IH/organigramme22.pdf}
217 \caption{The dhCI dissimulation scheme}
218 \label{fig:organigramme}
222 We are then left to show how to formally check
223 whether a given digital media $z$
224 results from the dissimulation of $y$ into the digital media $x$~\cite{bcg11b:ip}.
226 \begin{Def}[Marked content]
227 Let $\textit{dec}(u,m,M)$ be a decomposition function,
229 $\mathcal{S}$ be a strategy adapter,
230 $q$ be a positive natural number,
232 $y$ be a digital media,
233 \linebreak $(u_M,u_m,u_p,\phi_{M},\phi_{m},\phi_{p})$ be the
234 image by $\textit{dec}(u,m,M)$ of a digital media $x$.
236 Then $z$ is \emph{marked} with $y$ if
237 the image by $\textit{dec}(u,m,M)$ of $z$ is
238 $(u_M,u_m,u_p,\phi_{M},\hat{y},\phi_{p})$ where
239 $\hat{y}$ is the right member of $G_{f_l}^q(S_y,\phi_{m})$.
243 Various decision strategies are obviously possible to determine whether a given
244 image $z$ is marked or not, depending on the eventuality
245 that the considered image may have been attacked.
246 For example, a similarity percentage between $x$
247 and $z$ can be computed, and the result can be compared to a given
248 threshold. Other possibilities are the use of ROC curves or
249 the definition of a null hypothesis problem. These strategies have already
250 been discussed in a previous section, they can be adapted, mutatis mutandis,
251 to the generalized dhCI algorithm detailed above.
254 The next section, always extracted from~\cite{bcg11b:ip},
255 recalls some security properties and shows how the
256 \emph{dhCI dissimulation} algorithm verifies them.
262 \subsection{Security analysis}\label{sec:security}
265 We have proven in~\cite{bcg11b:ip}, using the stochastic matrix theorem, that,
267 \begin{Th}\label{th:stego}
268 Let $\epsilon$ be positive,
269 $l$ be any size of LSCs,
270 $X \sim \mathcal{U}\left(\mathbb{B}^l\right)$,
271 $f_l$ be an image mode s.t.
272 $\Gamma(f_l)$ is strongly connected and
273 the Markov matrix associated to $f_l$
274 is doubly stochastic.
276 In the instantiated \emph{dhCI dissimulation} algorithm
277 with any uniformly distributed (u.d.) strategy-adapter
278 which is independent from $X$,
279 there exists some positive natural number $q$ s.t.
280 $|p(X^q)- p(X)| < \epsilon$.
285 See~\cite{bcg11b:ip}.
288 Since $p(Y| K)$ is $p(X^q)$ the method is then stego-secure.
289 We have then focused on topological security properties, and have deduced
290 from the characterization recalled in Theorem~\ref{Th:Caracterisation des IC chaotiques} that,
293 Functions $f : \mathds{B}^{n} \to
294 \mathds{B}^{n}$ such that the graph $\Gamma(f)$ is strongly connected lead to topologically secure
295 \emph{dhCI dissimulation} algorithms.
301 %\subsection{Instantiation of Steganographic Methods}
302 \label{instantiating}
304 Theorem~\ref{th:stego} relies on a u.d.
305 strategy-adapter that is independent from the cover, and on an image mode
306 $f_l$ whose iteration graph $\Gamma(f_l)$ is strongly
307 connected and whose Markov matrix
308 is doubly stochastic.
309 We have shown in~\cite{bcg11b:ip} that the CIIS strategy
310 adapter~\cite{gfb10:ip} has the required
311 properties and have mentioned that \cite{wcbg11:ip} has presented an iterative approach
312 (which has been recalled in Section~\ref{sec:prac})
314 generate image modes $f_l$ such that
315 $\Gamma(f_l)$ is strongly connected.
316 Among these maps, it is obvious to check which verifies or not
317 the doubly stochastic constrain.
320 % \subsection{Conclusion}\label{sec:concl}
322 % This work has presented a new class of information hiding
323 % algorithms which generalizes
324 % algorithm~\cite{gfb10:ip} reduced to the negation mode.
325 % Its complete formalization has allowed to prove the stego-security
326 % and topological security properties.
327 % As far as we know, this is the first time a whole class of algorithm
328 % has been proven to have these two properties.
330 % In future work, our intention is to study the robustness of this class of
331 % dhCI dissimulation schemes.
332 % We are to find the optimized parameters (modes, stretegy adapters, signification coefficients, iterations numbers\ldots) giving
333 % the strongest robustness
334 % (depending on the chosen representation domain), theoretically and practically
335 % by realizing comprehensive simulations.
336 % Finally these algorithms will be compared to other existing ones, among other
337 % things by regarding whether these algorithms are chaotic or not.
364 %\section{Steganography: a class of secure and robust algorithms~\cite{bcg11:ij}}
370 \subsection{Discovering another relevant mode}
371 \label{sec:applications}
372 %\input{applications}
374 We can conclude from the previously summarized article
375 that we are left to provide:
377 \item an u.d. strategy-adapter that is independent
379 \item an image mode $f_l$ whose iteration
380 graph $\Gamma(f_l)$ is strongly connected and whose Markov
381 matrix is doubly stochastic.
383 We have recalled in the previous section that the $\textit{CIIS}(K,y,\alpha,l)$ strategy adapter
384 has the required properties.
385 In all the experiments provided in~\cite{bcg11:ij}, parameters $K$ and $\alpha$ are randomly
386 chosen in $] 0, 1[$ and $] 0, 0.5[$ respectively, while the
387 number of iteration is set to $4\times lm$, where $lm$ is the number of LSCs
388 that depends on the domain.
390 \cite{bcg11:ij} has then used the iterative approach of Section~\ref{sec:prac} to generate image
391 modes $f_l$ such that $\Gamma(f_l)$ is strongly connected, which has
392 been proposed in~\cite{bcgr11:ip} and recalled in the first part
393 of this manuscript. Among these
394 maps, it is obvious to check which verifies or not the doubly
395 stochastic constrain.
396 We have already stated that the negation mode matches these hypotheses, so it is relevant in that context.
397 As a second example, we have considered in~\cite{bcg11:ij} the mode
398 $f_l: \mathds{B}^l \rightarrow \mathds{B}^l$ s.t. its $i$-th component is
405 \overline{x_i} \textrm{ if $i$ is odd} \\
406 x_i \oplus x_{i-1} \textrm{ if $i$ is even.}
411 Thanks to Theorem~\ref{th:stego}, we have deduced in~\cite{bcg11:ij} that its iteration graph
412 $\Gamma(f_l)$ is strongly connected, and have finally proven
413 that its Markov chain is doubly stochastic by induction on the length $l$.
416 \subsection{dhCI in frequency domains}
417 We recall in this section the experimental protocol applied in~\cite{bcg11:ij}.
419 \subsubsection{DWT embedding}
422 We have firstly explained in~\cite{bcg11:ij} how the dhCI dissimulation can be applied in
423 the discrete wavelets transform domain (DWT).
424 The Daubechies family of wavelets has been chosen:
425 % a bitmap file of the famous Lena is converted into its Daubechies-1 DWT
426 % coefficients, which are altered by chaotic iterations.
427 each DWT decomposition depends on a decomposition level and a coefficient
428 matrix (Figure~\ref{fig:DWTs}): $\textit{LL}$ means approximation coefficient,
429 when $\textit{HH},\textit{LH},\textit{HL}$ denote respectively diagonal,
430 vertical, and horizontal detail coefficients.
431 For example, the DWT coefficient \textit{HH}2 is the matrix equal to the
432 diagonal detail coefficient of the second level of decomposition of the image.
436 \includegraphics[width=4cm]{IH/CompJ/DWTs.eps}
438 \caption{Wavelets coefficients.}
446 The choice of the detail level is motivated by finding
447 a good compromise between robustness and invisibility.
448 Choosing low or high frequencies in DWT domain leads either to a very
449 fragile watermarking without robustness (especially when facing a
450 JPEG 2000 compression attack) or to a large degradation of the host
452 In order to have a robust but discrete DWT embedding,
453 the second detail level
454 (\textit{i.e.}, $\textit{LH}2,\textit{HL}2,\textit{HH}2$)
455 that corresponds to the middle frequencies,
456 has been retained in~\cite{bcg11:ij}.
461 Let us consider the Daubechies wavelet coefficients of a third
462 level decomposition as represented in Figure~\ref{fig:DWTs}.
463 We then have translated these float coefficients into their 32-bits values, and have
464 defines in~\cite{bcg11:ij} the significance function $u$ that associates to any index $k$ in this sequence of bits the following numbers:
466 \item $u^k = -1$ if $k$ is one of the three last bits of any index of
467 coefficients in $\textit{LH}2$, $\textit{HL}2$, or in $\textit{HH}2$;
468 \item $u^k = 0$ if $k$ is an index of a coefficient in
469 $\textit{LH}1$, $\textit{HL}1$, or in $\textit{HH}1$;
470 \item $u^k = 1$ otherwise.
473 According to the definition of significance of coefficients
474 (Def.~\ref{def:msc,lsc}), if $(m,M)$ is $(-0.5,0.5)$, LSCs are the
475 last three bits of coefficients in
476 $\textit{HL}2$, $\textit{HH}2$, and $\textit{LH}2$.
477 Thus, decomposition and recomposition functions are fully defined
478 and dhCI dissimulation scheme can now be applied.
480 Figure \ref{fig:DWT} shows the result of a
481 dhCI dissimulation embedding into DWT domain.
482 The original is the image 5007 of the BOSS contest~\cite{Boss10}.
483 Watermark $y$ is given in Fig.~\ref{(b) Watermark}.
484 From a random selection of 50 images into the database from the BOSS
485 contest~\cite{Boss10}, we have applied in~\cite{bcg11:ij} the dhCI algorithm
487 defined in the previous section and with the negation mode.
491 \subfigure[Original Image.]{\includegraphics[width=5cm]
492 {IH/CompJ/5007.eps}\label{(a) Original 5007}}\hspace{1cm}
493 \subfigure[Watermark $y$.]{\includegraphics[width=1cm]{IH/CompJ/invader.eps}\label{(b) Watermark}}\hspace{1cm}
494 \subfigure[Watermarked Image.]{\includegraphics[width=5cm]{IH/CompJ/5007_bis.eps}\label{(c) Watermarked 5007}}
496 \caption{Data hiding in DWT domain}
501 \subsubsection{DCT embedding}
504 We have then explored the discrete cosinus transform (DCT) frequency domain embedding in~\cite{bcg11:ij}, by
505 following the protocol detailed below.
507 Let us denote by $x$ the original image of size $H \times L$, and by $y$
508 the hidden message, supposed here to be a binary image of size $H' \times L'$. %
509 The image $x$ is transformed from the spatial
510 domain to DCT domain frequency bands,
511 in order to embed $y$ inside it.
512 To do so, the host image is firstly divided into $8 \times 8$
513 image blocks as given below:
514 $$x = \bigcup_{k=1}^{H/8} \bigcup_{k'=1}^{L/8} x(k,k').$$
515 Thus, for each image block,
516 a DCT is performed and the coefficients in the frequency bands
517 are obtained as follows:
518 $x_{DCT}(m;n) = DCT(x(m;n))$.
520 To define a discrete but robust scheme, only the three following coefficients of each $8 \times 8$ block in position $(m,n)$ has
521 been possibly modified in~\cite{bcg11:ij}: $x_{DCT}(m;n)_{(3,1)},$ $x_{DCT}(m;n)_{(2,2)},$ or $x_{DCT}(m;n)_{(1,3)}$.
522 This choice can be reformulated as follows.
523 Coefficients of each DCT matrix are re-indexed by using a southwest/northeast diagonal, such that $i_{DCT}(m,n)_1 = x_{DCT}(m;n)_{(1,1)}$, $i_{DCT}(m,n)_2 = x_{DCT}(m;n)_{(2,1)}$, $i_{DCT}(m,n)_3 = x_{DCT}(m;n)_{(1,2)}$, $i_{DCT}(m,n)_4 = x_{DCT}(m;n)_{(3,1)}$, ..., and $i_{DCT}(m,n)_{64} =$ $ x_{DCT}(m;n)_{(8,8)}$.
524 So the signification function can be defined in this context by:
526 \item if $k$ mod $64 \in \{1,2,3\}$ and $k\leqslant H\times L$, then $u^k=1$;
527 \item else if $k$ mod $64 \in \{4, 5, 6\}$ and $k\leqslant H\times L$, then $u^k=-1$;
528 \item else $u^k = 0$.
530 The significance of coefficients are obtained for instance with
531 $(m,M)=(-0.5,0.5)$ leading to the definitions of MSCs, LSCs, and passive coefficients.
532 Thus, decomposition and recomposition functions are fully defined
533 and dhCI dissimulation scheme has then been applied in~\cite{bcg11:ij}.
538 \subsection{Image quality}
540 This section focuses on measuring visual quality of our steganographic method.
541 Traditionally, this is achieved by quantifying the similarity
542 between the modified image and its reference image.
543 The Mean Squared Error (MSE) and the Peak Signal to Noise
544 Ratio (PSNR) are the most widely known tools that provide such a metric.
545 However, both of them do not take into account Human Visual System (HVS)
547 Recent works~\cite{EAPLBC06,SheikhB06,PSECAL07,MB10} have tackled this problem
548 by creating new metrics. Among them, what follows focuses on PSNR-HVS-M~\cite{PSECAL07} and BIQI~\cite{MB10}, considered as advanced visual quality metrics.
549 The former efficiently combines PSNR and visual between-coefficient contrast masking of DCT basis functions based on HVS. This metric has
550 been computed in~\cite{bcg11:ij}
551 by using the implementation given at~\cite{psnrhvsm11}.
552 The latter allows to get a blind image quality assessment measure,
553 \textit{i.e.}, without any knowledge of the source distortion.
554 Its implementation is available at~\cite{biqi11}.
559 \begin{tabular}{|c|c|c|c|c|}
561 Embedding & \multicolumn{2}{|c|}{DWT}
562 & \multicolumn{2}{|c|}{DCT} \\
564 Mode & $f_l$ & neg. & $f_l$ & neg. \\
566 PSNR & 42.74 & 42.76 & 52.68 & 52.41 \\
568 PSNR-HVS-M & 44.28 & 43.97 & 45.30 & 44.93 \\
570 BIQI & 35.35 & 32.78 & 41.59 & 47.47 \\
574 \caption{Quality measures of our steganography approach~\cite{bcg11:ij}}
575 \label{table:quality}
580 Results of the image quality metrics obtained in~\cite{bcg11:ij}
581 are summarized in Table~\ref{table:quality}.
582 In wavelet domain, the PSNR values obtained in~\cite{bcg11:ij} are comparable to other approaches
583 (for instance, PSNR are 44.2 in~\cite{TCL05} and 46.5 in~\cite{DA10}),
584 but a real improvement for the discrete cosine embedding is obtained
585 (PSNR is 45.17 for~\cite{CFS08}, it is always lower than 48 for~\cite{Mohanty:2008:IWB:1413862.1413865}, and always lower than 39 for~\cite{MK08}).
586 Among steganography approaches that evaluate PSNR-HVS-M, results of our approach
587 are convincing. Firstly, optimized method developed along~\cite{Randall11} has a PSNR-HVS-M equal to 44.5 whereas our approach, with a similar PSNR-HVS-M, should be easily improved by considering optimized mode. Next,
588 another approach~\cite{Muzzarelli:2010} have higher PSNR-HVS-M, certainly, but
589 this work does not address robustness evaluation whereas the study presented in~\cite{bcg11:ij} is complete.
590 Finally, as far as we know, \cite{bcg11:ij} is the first one that has evaluated the BIQI metric in a
591 steganographic context.
595 With all this material, we have then evaluated the robustness of our
596 approach in~\cite{bcg11:ij}.
600 \subsection{Robustness}
602 Previous sections have formalized frequency domains embedding and
603 has focused on the negation and $f_l$ modes.
604 In the robustness given in this continuation, {dwt}(neg),
605 {dwt}(fl), {dct}(neg), and {dct}(fl)
606 respectively stand for the DWT and DCT embedding
607 with the negation mode and with this instantiated mode.
609 For each experiment presented in~\cite{bcg11:ij}, a set of 50 images is randomly extracted
610 from the database taken from the BOSS contest~\cite{Boss10}.
611 Each cover is a $512\times 512$ grayscale digital image and the watermark $y$
612 is given in Figure~\ref{(b) Watermark}.
613 Testing the robustness of the approach is achieved in~\cite{bcg11:ij} by successively applying
614 on watermarked images attacks like cropping, compression, and geometric
617 $\hat{y}$ and $\varphi_m(z)$ have then been
618 computed. Behind a given threshold rate, the image is said to be watermarked.
619 Finally, discussion on metric quality of the approach given in~\cite{bcg11:ij} is recalled in
620 Section~\ref{sub:roc}.
624 \subsubsection{Robustness against cropping}
626 Robustness of the approach is evaluated by
627 applying different percentage of cropping: from 1\% to 81\%.
628 Results obtained in~\cite{bcg11:ij} are recalled in Figure~\ref{Fig:atck:dec}.
629 Figure~\ref{Fig:atq:dec:img}
630 gives the cropped image
631 where 36\% of the image is removed, while Figure~\ref{Fig:atq:dec:curves}
632 presents effects of such an attack.
633 From this experiment, we have concluded in~\cite{bcg11:ij} that all embedding has similar
635 All the percentage differences are so far less than 50\%
636 (which is the mean random error) and thus robustness is established.
642 \subfigure[Cropped image]{\includegraphics[width=0.24\textwidth]
643 {IH/CompJ/5007_dec_307.eps}\label{Fig:atq:dec:img}}\hspace{2cm}
644 \subfigure[Cropping effects]{
645 \includegraphics[width=0.5\textwidth]{IH/CompJ/atq-dec.eps}\label{Fig:atq:dec:curves}}
646 \caption{Cropping results}
651 \subsubsection{Robustness against compression}
653 Robustness against compression is addressed
654 by studying both JPEG and JPEG 2000 image compression.
655 Results obtained in~\cite{bcg11:ij} are respectively presented in Fig.~\ref{Fig:atq:jpg:curves}
656 and Fig.~\ref{Fig:atq:jp2:curves}.
657 Without surprise, DCT embedding which is based on DCT
658 (as JPEG compression algorithm is) is more
659 adapted to JPEG compression than DWT embedding.
660 Furthermore, we have a similar behavior for the JPEG 2000 compression algorithm, which is based on wavelet encoding: DWT embedding naturally outperforms
661 DCT one in that case.
666 \subfigure[JPEG effects]{
667 \includegraphics[width=0.48\textwidth]{IH/CompJ/atq-jpg.eps}\label{Fig:atq:jpg:curves}}
668 \subfigure[JPEG 2000 effects]{
669 \includegraphics[width=0.48\textwidth]{IH/CompJ/atq-jp2.eps}\label{Fig:atq:jp2:curves}}
670 \caption{Compression results}
671 \label{Fig:atck:comp}
676 \subsubsection{Robustness against contrast and sharpness}
678 Contrast and Sharpness adjustments belong to the classical set of
679 filtering image attacks.
680 Results of such attacks are presented in
681 Fig.~\ref{Fig:atq:fil} where
682 Fig.~\ref{Fig:atq:cont:curve} and Fig.~\ref{Fig:atq:sh:curve} summarize
683 effects of contrast and sharpness adjustment respectively~\cite{bcg11:ij}.
688 \subfigure[Contrast effects]{
689 \includegraphics[width=0.48\textwidth]{IH/CompJ/atq-contrast.eps}\label{Fig:atq:cont:curve}}
690 \subfigure[Sharpness effects]{
691 \includegraphics[width=0.48\textwidth]{IH/CompJ/atq-flou.eps}\label{Fig:atq:sh:curve}}
692 \caption{Filtering results}
696 \subsubsection{Robustness against geometric transformations}
698 Among geometric transformations, we have focused in~\cite{bcg11:ij} on
699 rotations, \textit{i.e.}, when two opposite rotations
700 of angle $\theta$ are successively applied around the center of the image.
701 In these geometric transformations, angles range from 2 to 20
703 Results obtained in~\cite{bcg11:ij} are summed up in Figure~\ref{Fig:atq:rot}: Fig.~\ref{Fig:atq:rot:img}
704 gives the image of a rotation of 20 degrees whereas
705 Fig.~\ref{Fig:atq:rot:curve} presents effects of such an attack.
706 It is not a surprise that results are better for DCT embedding: this approach
707 is based on cosine as rotation is.
713 \subfigure[20 degrees rotation image]{
714 \includegraphics[width=0.25\textwidth]{IH/CompJ/5007_rot_10.eps}\label{Fig:atq:rot:img}}
715 \subfigure[Rotation effects]{
716 \includegraphics[width=0.5\textwidth]{IH/CompJ/atq-rot.eps}\label{Fig:atq:rot:curve}}
718 \caption{Rotation attack results}
722 \subsection{Evaluation of the Embedding}
725 We are then left to set a convenient threshold that is accurate to
726 determine whether an image is watermarked or not.
727 Starting from a set of 100 images selected among the Boss image panel,
728 we have computed in~\cite{bcg11:ij} the following three sets:
729 the one with all the watermarked images $W$,
730 the one with all successively watermarked and attacked images $\textit{WA}$,
731 and the one with only the attacked images $A$.
732 Notice that the 100 attacks for each image
733 are selected among these detailed previously.
736 For each threshold $t \in \llbracket 0,55 \rrbracket$ and a given image
737 $x \in \textit{WA} \cup A$,
738 differences on DCT have been computed in~\cite{bcg11:ij}.
739 The image has been claimed as watermarked
740 if these differences are less than the threshold.
742 \item In the positive case and if $x$ really belongs to
743 $\textit{WA}$ it is a True Positive (TP) case.
744 \item In the negative case but if $x$ belongs to
745 $\textit{WA}$, it is a False Negative (FN) case.
746 \item In the positive case but if $x$ belongs to
747 $\textit{A}$, it is a False Positive (FP) case.
748 \item Finally, in the negative case and if $x$ belongs to
749 $\textit{A}$, it is a True Negative (TN).
751 The True (resp. False) Positive Rate (TPR) (resp. FPR) has thus been computed
752 by dividing the number of TP (resp. FP) by 100.
756 \includegraphics[width=9cm]{IH/CompJ/ROC.eps}
758 \caption{ROC curves for DWT or DCT embeddings}\label{fig:roc:dwt}
761 Figure~\ref{fig:roc:dwt} recalled the obtained Receiver Operating Characteristic (ROC)
763 For the DWT, it shows that best results are obtained when the threshold
764 is 45\% for the dedicated function (corresponding to the point (0.01, 0.88))
765 and 46\% for the negation function (corresponding to (0.04, 0.85)).
766 It allows to conclude that each time LSCs differences between
767 a watermarked image and another given image $i'$ are less than 45\%, we can claim that
768 $i'$ is an attacked version of the original watermarked content.
769 For the two DCT embedding, best results have been obtained when the threshold
770 is 44\% (corresponding to the points (0.05, 0.18) and (0.05, 0.28)).
772 We have thus conclude some confidence intervals for all the evaluated
773 attacks in~\cite{bcg11:ij}. The
774 approach is resistant to:
776 \item all the cropping where percentage is less than 85;
777 \item compression where quality ratio is greater
778 than 82 with DWT embedding and
779 where quality ratio is greater than 67 with DCT one;
780 \item contrast when strengthening belongs to $[0.76,1.2]$
781 (resp. $[0.96,1.05]$) in DWT (resp. in DCT) embedding;
782 \item all the rotation attacks with DCT embedding and a rotation where
783 angle is less than 13 degrees with DWT one.
787 % \subsection{Conclusion}\label{sec:concl}
788 % %\input{conclusion}
789 % This paper has proposed a new class of secure and robust information hiding
791 % It has been entirely formalized, thus allowing both its theoretical security
792 % analysis, and the computation of numerous variants encompassing spatial and
793 % frequency domain embedding.
794 % After having presented the general algorithm with detail, we have given
795 % conditions for choosing mode and strategy-adapter making the whole
796 % class stego-secure or $\epsilon$-stego-secure.
797 % To our knowledge, this is the first time such a result has been established.
800 % Applications in frequency domains (namely DWT and DCT domains) have finally be
802 % Complete experiments have allowed us
803 % first to evaluate how invisible is the steganographic method (thanks to the PSNR computation) and next to verify the robustness property against attacks.
804 % Furthermore, the use of ROC curves for DWT embedding have revealed very high rates
805 % between True positive and False positive results.
807 % In future work, our intention is to find the best image mode with respect to
808 % the combination between DCT and DWT based steganography
809 % algorithm. Such a combination topic has already been addressed
810 % (\textit{e.g.}, in~\cite{al2007combined}), but never with objectives
814 % Additionally, we will try to discover new topological properties for the dhCI
815 % dissimulation schemes.
816 % Consequences of these chaos properties will be drawn in the context of
817 % information hiding security.
818 % We will especially focus on the links between topological properties and classes
819 % of attacks, such as KOA, KMA, EOA, or CMA.
821 % Moreover, these algorithms will be compared to other existing ones, among other
822 % things by testing whether these algorithms are chaotic or not.
823 % Finally we plan to verify the robustness of our approach
824 % against statistical steganalysis methods~\cite{GFH06,ChenS08,DongT08,FridrichKHG11a}.