Journal of South China University of Technology (Natural Science Edition) ›› 2008, Vol. 36 ›› Issue (4): 86-92.

• Computer Science & Technology • Previous Articles     Next Articles

Evaluation Model of Steganography Security and Its Application

He Jun-hui  Tang Shao-hua   

  1. School of Computer Science and Engineering, South China University of Technology, Guangzhou 510640, Guangdong, China
  • Received:2007-05-30 Revised:2007-09-04 Online:2008-04-25 Published:2008-04-25
  • Contact: 何军辉(1976-),男,讲师,博士,主要从事信息安全研究. E-mail:hejh@scut.edu.cn
  • About author:何军辉(1976-),男,讲师,博士,主要从事信息安全研究.
  • Supported by:

    广东省信息安全技术重点实验室2006年度开放基金资助项目

Abstract:

At present, there are few effective models to evaluate the security of steganography. In this paper, first, a model to describe the statistical distribution of the discrete cosine transform (DCT) coefficients of an image is es- tablished, and a model based on the information-theory definition of steganography security is presented to measure the security of steganography in the DCT domain. The securities of several steganographic techniques in both spatial and DCT domains are then compared. Moreover, some experiments are performed to measure the effects of the methods of model solving, the size of hiding message, the block size in DCT, the embedding position and the dou- ble compression on the security evaluation. The results show that the proposed model is an effective model, which provides valuable references for the design of steganography and steganalytic algorithms.

Key words: steganography, evaluation model, discrete cosine transform, Gaussian distribution, maximum likelihood estimation, discrimination information