This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
1. Introduction
Stenography is technology that hides secret data into covers for covert transmission [1]. The most important aim of steganography is to combat the adversary’s detection using steganalysis tools [2–4]. As digital images are the most popular covers in steganography, many methods and tools of digital image steganography have been developed since 1990s, such as LSB (Least Significant Bitplane) [5]. To combat early steganalysis attacks, some algorithms have also been designed to keep the invariance of statistical properties [6]. However, most of the traditional works are not secure enough to modern steganalysis.
Currently, content adaptive steganography approaches are designed to improve security by minimizing the distortion between the cover and the stego. According to this idea, a popular framework for digital image steganography is defined in [7, 8], which includes two points, i.e., allocating the embedding cost and realizing the data encoding. In the first part, the embedding cost is allocated for each element of the cover to quantify the effect on the cover image when modifying the elements [9, 10]. In the second part, an encoding method is designed to achieve the theoretical embedding payload with the distortion function. Nowadays, STC (Syndrome-Trellis Codes) is the most popular tool for adaptive embedding [11, 12]. In this framework, defining a suitable distortion function is vital for steganography security. Starting from HUGO [13], many distortion functions have been proposed for spatial and JPEG images, e.g., MVGG [7], WOW [14], UNIWARD [15], HILL [16], and UED [17]. For spatial images, distortion functions allocate the embedding costs for gray values or RGB values. For JPEG images, distortion functions allocate the embedding costs for JPEG coefficients. Besides, some spatial image distortion functions can be used for JPEG images by allocating the embedding costs for the coefficients obtained from the inverse transformation of JPEG coefficients. As a countering technique, many effective steganalysis approaches have also been proposed. Steganalysts always train models to distinguish suspicious images from clean images [18]. Generally, a steganalysis model contains two parts. One is to extract features from a set of images, such as SRM [18], SPAM [19], DCTR [20], and GFR [21]. The other is to train a classifier using machine learning tools, e.g., the ensemble classifier [22]. Besides, both parts can also be realized by deep learning.
With the development of 4G/5G communication techniques and the social networks, GIF (Graphics Interchange Format) images are more and more popular because of the characteristics of the small size and the convenience to display animation effects. Different from the spatial images and JPEG images, each image frame used in GIF is composed of a color list, i.e., palette, and a set of index values, i.e., image data. When using GIF images as covers, there are three ways to hide secret data. The first way is structure steganography that modifies certain sections in the file header to accommodate secret data. The second way is to embed secret data by changing the correspondence between index values and actual pixel values in the palette, e.g., Gifshuffile [23]. The third way is to embed secret data by slightly modifying the index values, such as OPA (Optimal Parity Assignment) [24] and MBA (MultiBit Assignment) [25].
In 1999, Fridrich proposes a steganography method for palette images, which searches for closest colors and embeds data according to the parity of pixel values [26]. Some other methods for GIF steganography have also proposed in [27–29]. In recent years, there have also been some works on GIF steganography. Generally, these methods use some mathematical operations to calculate whether a pixel should be modified to embed data, e.g., the adaptive method using MOD operation by Fathurohman et al. [30]. These works have good capabilities of data embedding. However, they were designed for static GIF images.
In 2015, a method for embedding data into dynamic GIF images is proposed, which uses EzStego and chaos system to hide data [31]. From 2016 to 2017, a series of steganography approaches for dynamic GIF images were proposed [32–34]. In those methods, the steganography for static GIF is directly used in each frame of the dynamic GIF. Meanwhile, each frame is assigned with an equal payload. In 2018, Basak et al. propose to embed data into dynamic GIF images using the difference between adjacent pixels in the same frame [35]. Saleh and Merzah propose to combine LZW, EzStego, and LSB to embed secret text messages into dynamic GIF images [36]. Shi et al. propose to use the STC framework for emoji GIF images by designing a new distortion function [37]. These works have good performances on dynamic GIF steganography. However, the correlations between frames are not investigated efficiently. To design a more secure steganography tool for dynamic GIF images, we must consider the changes in the interframes. Meanwhile, payload assignment is also important [38]. While previous works embed even payloads into GIF frames, it would be more appropriate to distribute payloads unevenly to different frames to improve the performance of statistical undetectability, since each frame has different contents.
In this paper, we propose a new algorithm of cost assignment for dynamic GIF images by combining the characteristics of dynamic GIF image palette and the inter frames. Meanwhile, we propose to assign suitable embedding payloads for each frame using the entropy function. Finally, we construct a steganography framework for dynamic GIF images to improve the security. The rest of this paper is organized as follows. We introduce the preliminaries of GIF steganography in Section 2. The proposed framework will be described in Section 3. Section 4 shows the experimental results and analysis. Section 5 concludes the whole paper.
2. Preliminary
In this paper, the matrices, vectors, and sets are written in boldface, the variables are written in italics. For a dynamic GIF image
In order to embed secret data, a sender modifies a cover image
In [39], for a given embedding cost, the modification probability
In [39], it has been theoretically proved that the minimum distortion is achievable when embedding
Derivation of the minimum distortion corresponding to a fixed embedding payload is the rate-distortion bound [39]. When embedding
In the actual embedding process, we first define a suitable distortion function and then combine the coding methods, e.g., STC, to embed data and limit the distortion as far as possible.
For secret data
The definition of coset
As the stego is found in the codeword
3. Proposed Method
In Figure 1, we show the framework of the proposed method for steganography in dynamic GIF images. First, we decompose dynamic GIF images into frames, each of which is a static GIF image. We design new distortion function for each frame. Based on the existing distortion functions, we obtain the initial embedding costs
If the payload contains
3.1. Distortion Function Initialization
We first design a steganography method for each frame of dynamic GIF images. By changing the index values in the index matrix, the secret data can be embedded into the cover with slight modification in the image content.
For a 256-color dynamic GIF image, each index value
For each frame, we extract the matrix of RGB values from the GIF image palette separately. We use the spatial distortion function, i.e. HILL and UNWARD as initial distortion function to calculate the embedding costs of each pixel in RGB channels, denote the embedding cost of the
3.1.1. Palette Sort Algorithm
As shown in Figure 2, the GIF image palette is arranged out of order. Therefore, similar RGB vectors may be separated. For example, the difference between the RGB values corresponding to the index 2 and the index 100 is smaller than the difference between the RGB values corresponding to the index 2 and the index 3. To achieve better undetectability, the initial pixel value of the cover and the modified value of the stego should be as close as possible. Considering that Euclidean distance is the distance between two points in a multidimensional space, the RGB cube is a three-dimensional space. Hence, we rearrange the GIF image palette using the Euclidean distance as criterion.
[figure omitted; refer to PDF]We obtain the original palette
As the example shown in Figure 3, we have
Step 1.
We find
Step 2.
We generate a random number
Step 3.
From the palette
Step 4.
If the index value
3.2. Distortion Function Optimization Based on Magnitude
In dynamic GIF image steganography, we embed data by modifying the index values. It is different from the steganography method for spatial images that embeds data by modifying pixel values. However, we can use the STC framework by optimizing the distortion functions defined for spatial images. Before using the ±1 embedding algorithm, we initialize the distortion function by state-of-the-art designs, e.g., WOW, UNIWARD, or HILL.
For WOW, the distortion algorithm calculates a weighted difference embedding suitability to get the embedding costs of this pixel, using the difference between the residual
However, when embedding data in GIF, we must modify the index values. The modification would be result in the change of the RGB values. More importantly, the modifications of +1 and -1 have different impacts on the RGB values. As shown in Figure 4, the index value of
According to this point, we calculate the modification amplitudes on RGB values when adjusting ±1 on index values and optimize the initial distortion function according to the modified amplitude. The pixels with less impact are assigned with small embedding costs, and the pixels with more impacts are assigned with large embedding costs.
Accordingly, we propose to include an adjustment parameter
Combining three optimization factors with the initial distortion functions, we adjust the distortion function as (13).
3.3. Distortion Function Improvement Using the Correlation of Interframes
In spatial image steganography, the texture and edge regions are more appropriate for data hiding than the other regions, as it is more secure against the steganalysis. Most STC embedding methods assign these regions with low embedding costs. This principle can also be used for steganography in dynamic GIF images. As there are many frames in a dynamic GIF image, we also use the changes in interframes. When displaying animation effects, most of the successive frames have strong correlations, which can be found in Figure 5.
[figure omitted; refer to PDF]We propose to integrate the correlations of interframes into distortion function optimization. The pixels that have larger changes in interframes would be assigned with smaller embedding costs. First, we calculate the motion differences of adjacent frames of each pixel. Then, we select the appropriate pixels according to these motion differences. After that, we set adjustment parameters to adjust the embedding costs of these pixels to achieve the adjustment factor
For each pixel in dynamic GIF image
As the adjacent pixels are related, we use the average value of the differences of the pixels in a
After calculating the interchanges of each pixel of the dynamic GIF image, we sort all pixels according to the motion difference and select the pixels with the top
Subsequently, we define the adjustment factor in (18) according to the correlation of interframes.
Finally, we obtain the final distortion function
3.4. Payload Allocation
In dynamic GIF image steganography, we calculate the embedding costs for each frame. There are more pixels with small embedding cost in some frames. Therefore, these frames can accommodate more secret data. In order to achieve a better security with the condition of a constant total payload, we assign each frame with different payload according to the characteristics of each frame itself.
According to the calculation of the initial embedding costs and optimization factors, we get the optimized embedding costs
After obtaining the distortion function, we input the embedding costs of all frames and the payload of secret data into the constraints in (20) to calculate the parameter
4. Experimental Results
To verify the proposed method, we have conducted many experiments. Two dynamic GIF image datasets are constructed, i.e., the SPORTBase and the HAPPYBase. Each database contains 500 dynamic GIF images, and each image has 20 frames, i.e., 10,000 static GIF images in each dataset. They are all color dynamic images with 8-bit index values. The SPORTBase are football games downloaded from https://www.zhibo8.cc/. The HAPPYBase are emoticons from https://www.soogif.com/, https://www.sina.com.cn/ and other websites. Both are available in https://github.com/jzlin1997/GIF-Image-Steganography.
We use HILL, UNIWARD, and WOW as the initial distortion function in the proposed method. After optimizing the initial distortion function and allocating the embedding payloads, we generate a new steganography method for dynamic GIF images. We name the proposed steganography based on improved HILL, UNIWARD and WOW as Gp-HILL, Gp-UNIWARD and Gp-WOW, respectively.
We use the steganalysis tools of the state-of-the-art SPAM feature set [19] and SRM feature set [18] with the ensemble classifiers [22]. We obtain the RGB values of stego GIF images to calculate the gray values and extract SPAM features from the gray values. Half of the cover and stego feature sets are used for training, and the rest are for testing. We use the minimal total error
In Section 4.1, we discuss the adjustment parameter, i.e., the amplitude weight. Based on appropriate amplitude weight, we find a suitable value of the motion difference parameter. Subsequently, we compare our proposed method with the basic method using initial distortion functions and Shi et al. [37] in Section 4.2 and Section 4.3. We give a subjective evaluation of the stego image in Section 4.2 and a specific analysis of undetectability in Section 4.3.
4.1. Parameter Determination
In Section 3.2, we have analyzed that the modification amplitude is an important factor for distortion function. Considering that the modification amplitudes on pixel value of different operations are different, we not only embed the data in texture regions but also embed the data in the pixels with small modification amplitude. We define an adjustment parameter
We use Gp-HILL and Gp-UNIWARD to embed 0.15 bpp into dynamic GIF images in SPORTBase with different values of δ. The SPAM errors are shown in Figures 6(a) and 6(b). The results indicate that the largest testing errors can be achieved when
[figures omitted; refer to PDF]
Based on the identified amplitude weight
[figures omitted; refer to PDF]
4.2. Image Quality
In Figure 8, we compare quality of the stego frames by the proposed method and the other methods. We use HILL as the initial distortion function. The stegos are generated by the initial function, the function in [37] and ours. The embedding payload is 0.2 bpp. Figure 8(a) shows the original frame. Figures 8(b)–8(d) shows the stegos generated by different distortion functions. Traditional distortion functions used for GIF embedding only consider the embedding in texture regions, which always ignore the differences of modification amplitude. Therefore, there are some drawbacks like the black points appearing in the blue coat in Figure 8(b). However, the distortion function in [37] focuses on embedding secret data into the pixels with a smaller modification amplitude, a large piece of white in the blue coat in Figure 8(c). The results show that the proposed method achieves a better quality.
[figures omitted; refer to PDF]
Meanwhile, based on the HILL, we calculate the mean PSNR (peak-signal-to-noise ratio) of the stego generated by initial distortion function, the stego by Shi et al. and our Gp-HILL in Table 1. As shown in Table 1, all the PSNR of the stego generated by Gp-HILL has been improved. For example, the PSNR of the stego generated by Gp-HILL is 40.01 when the embedding payload is 0.15 bpp. Compared with the PSNR of the stego generated by the basic method using HILL, our method can improve 5.11. Moreover, from 0.05 bpp to 0.2 bpp, the PSNR of the stego generated by Gp-HILL has reached an undetectable level by the human eye.
Table 1
Comparison of the PSNR results between the basic method using HILL, Shi’s method using HILL, and our GP-HILL in SPORTBase.
Methods | Payload (bpp) | ||||
0.05 | 0.1 | 0.15 | 0.2 | 0.25 | |
Basic (HILL) | 40.51 | 37.00 | 34.90 | 33.37 | 32.18 |
Shi et al.’s (HILL) | 31.83 | 30.79 | 29.70 | 28.60 | 27.59 |
Gp-HILL | 45.71 | 42.13 | 40.01 | 38.46 | 37.27 |
4.3. Security against Steganalysis
We have also conducted many experiments to verify the capabilities of countering steganalysis. The proposed Gp-HILL, Gp-UNIWARD, and Gp-WOW are used to hide secret data into the dynamic GIF images in SPORTBase and HAPPYBase. Five different payloads from 0.05 bpp to 0.25 bpp are used.
We use SPAM and SRM to extract features from covers and stegos to evaluate the security of the proposed method. The proposed method is compared with the basic method, Shi et al.’s method in [37]. The basic method and Shi et al.’s method use HILL, UNIWARD, and WOW as initial distortion function.
In Table 2 and Figures 9(a)–9(f), we show the steganalysis results of data hiding in SPORTBase. Table 2 indicated that the proposed method outperforms the basic methods and the Shi et al.’s method using three distortion functions with SPAM feature. For example, the testing error of Gp-HILL with SPAM is 0.3414 when the embedding payload is 0.25 bpp. It can improve 0.0465 comparing the testing error of the basic method with SPAM using HILL. With the increase of embedding payload, the improvement of testing error also increases. Further, Table 2 shows all the testing errors obtained by the proposed method with SRM are higher than the basic method from 0.05 bpp to 0.5 bpp and are higher than the Shi et al.’s method from 0.05 bpp to 0.15 bpp. When payload becomes larger, embedding in texture area has lost its effect, such as the testing error of Gp-HILL with SRM is 0.0018 when the embedding payload is 0.25 bpp, therefore, the testing errors obtained by the proposed method with SRM are lower than the Shi et al.’s method. But the image quality of Shi et al.’s method is worse. It is shown the proposed steganography method could obtain improvements in the performance of steganalysis.
Table 2
Comparison of the steganalysis results in SPORTBase.
Feature | Methods | Payload (bpp) | ||||
0.05 | 0.1 | 0.15 | 0.2 | 0.25 | ||
SPAM | Basic (HILL) | 0.4360 | 0.3664 | 0.2949 | 0.2273 | 0.1672 |
Shi et al.’s (HILL) | 0.3674 | 0.2810 | 0.2039 | 0.1418 | 0.1034 | |
Ours (HILL) | 0.4516 | 0.3963 | 0.3414 | 0.2875 | 0.2367 | |
Basic (UNIWARD) | 0.4455 | 0.3829 | 0.3199 | 0.2543 | 0.1932 | |
Shi et al.’s (UNIWARD) | 0.4013 | 0.3161 | 0.2429 | 0.1766 | 0.1281 | |
Ours (UNIWARD) | 0.4563 | 0.4064 | 0.3569 | 0.3019 | 0.2489 | |
Basic (WOW) | 0.4362 | 0.3633 | 0.2934 | 0.2280 | 0.1718 | |
Shi et al.’s (WOW) | 0.4043 | 0.3249 | 0.2507 | 0.1795 | 0.1292 | |
Ours (WOW) | 0.4495 | 0.3910 | 0.3341 | 0.2803 | 0.2267 | |
SRM | Basic (HILL) | 0.1723 | 0.0437 | 0.0107 | 0.0039 | 0.0018 |
Shi et al.’s (HILL) | 0.0961 | 0.0440 | 0.0318 | 0.0287 | 0.0272 | |
Ours (HILL) | 0.2356 | 0.0982 | 0.0395 | 0.0165 | 0.0077 | |
Basic (UNIWARD) | 0.1950 | 0.0498 | 0.0125 | 0.0036 | 0.0017 | |
Shi et al.’s (UNIWARD) | 0.0922 | 0.0468 | 0.0311 | 0.0265 | 0.0238 | |
Ours (UNIWARD) | 0.2771 | 0.1123 | 0.0433 | 0.0175 | 0.0071 | |
Basic (WOW) | 0.1804 | 0.0441 | 0.0105 | 0.0036 | 0.0016 | |
Shi et al.’s (WOW) | 0.0944 | 0.0465 | 0.0316 | 0.0260 | 0.0242 | |
Ours (WOW) | 0.2616 | 0.1080 | 0.0410 | 0.0180 | 0.0085 |
[figures omitted; refer to PDF]
To further evaluate the performance of the proposed method, we do experiments using HAPPYBase. Figures 10(a) and 10(b) and Table 3 shows the comparisons of testing errors between Gp-HILL, the basic method, and Shi et al.’s method using HILL in HAPPYBase with SPAM and SRM. As shown in Table 3, the testing errors of the proposed method are higher than the basic method and the Shi et al.’s method in all situation in HAPPYBase, which has richer texture than SPORTBase. The results indicate the proposed method for dynamic GIF images steganography could achieve better performance on resisting the modern steganalysis and verify that the parameters are also appropriate for other databases.
[figures omitted; refer to PDF]
Table 3
Comparison of the steganalysis results in HAPPYBase.
Feature | Methods | Payload (bpp) | ||||
0.05 | 0.1 | 0.15 | 0.2 | 0.25 | ||
SPAM | Basic (HILL) | 0.4473 | 0.3956 | 0.3545 | 0.3180 | 0.2829 |
Shi et al.’s (HILL) | 0.2080 | 0.2007 | 0.1862 | 0.1654 | 0.1488 | |
Ours (HILL) | 0.4547 | 0.4160 | 0.3835 | 0.3538 | 0.3238 | |
SRM | Basic (HILL) | 0.1544 | 0.0662 | 0.0320 | 0.0184 | 0.0119 |
Shi et al.’s (HILL) | 0.0490 | 0.0333 | 0.0260 | 0.0225 | 0.0213 | |
Ours (HILL) | 0.2326 | 0.1212 | 0.0659 | 0.0380 | 0.0246 |
5. Conclusions
The paper presents a new steganography method for the dynamic GIF images based on STC framework. We rearrange the palette and calculate the modification amplitudes on pixel values according to the mapping relationships between index values and RGB values. According to the modification amplitudes on pixel values, we calculate the adjustment factors for each color channel. Considering the strong correlation of interframes, we use the motion difference of adjacent frames as an adjustment factor to adjust embedding costs. Combining adjustment factors, we design a new method of distortion function specification. Besides, with the embedding probabilities on different frames, we also assign different payloads for each frame to achieve higher security. The experimental results show that the proposed method has a better performance than previous works.
Acknowledgments
This work was supported by the Natural Science Foundation of China (Grant 61572308, U1736213, and U1636206) and Shanghai Excellent Academic Leader Plan (16XD1401200).
[1] Z. Wang, X. Zhang, "Secure cover selection for steganography," IEEE Access, vol. 7, pp. 57857-57867, DOI: 10.1109/ACCESS.2019.2914226, 2019.
[2] Z. Wang, Z. Qian, X. Zhang, M. Yang, D. Ye, "On improving distortion functions for JPEG steganography," IEEE Access, vol. 6, pp. 74917-74930, DOI: 10.1109/ACCESS.2018.2884198, 2018.
[3] Z. Wang, X. Zhang, Z. Yin, "Joint cover-selection and payload allocation by steganographic distortion optimization," IEEE Signal Processing Letters, vol. 25 no. 10, pp. 1530-1534, DOI: 10.1109/LSP.2018.2865888, 2018.
[4] Z. Zhou, Y. Mu, Q. M. J. Wu, "Coverless image steganography using partial-duplicate image retrieval," Soft Computing, vol. 23 no. 13, pp. 4927-4938, DOI: 10.1007/s00500-018-3151-8, 2019.
[5] F. A. P. Petitcolas, R. J. Anderson, M. G. KUHN, "Information hiding a survey," Proceedings of the IEEE, vol. 87 no. 7, pp. 1062-1078, DOI: 10.1109/5.771065, 1999.
[6] A. Westfeld, "F5A steganographic algorithm," Proceeding of 4th International Workshop on Information Hiding, pp. 289-302, DOI: 10.1007/3-540-45496-9_21, .
[7] V. Sedighi, J. Fridrich, R. Cogranne, "Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model," Proceeding of International Society for Optics and Photonics, pp. 9409-94090H, DOI: 10.1117/12.2080272, .
[8] T. Filler, J. Fridrich, "Design of adaptive steganographic schemes for digital images," Proceeding of SPIE, Electronic Imaging, Media Watermarking, Security and Forensics of Multimedia XIII,DOI: 10.1117/12.872192, .
[9] Z. Wang, J. Lv, Q. Wei, X. Zhang, "Distortion function for spatial image steganography based on the polarity of embedding change," Proceeding of the 15th International Workshop on Digital forensics and Watermarking (IWDW2016), pp. 487-493, DOI: 10.1007/978-3-319-53465-7_36, .
[10] W. Zhou, W. Zhang, N. Yu, "A new rule for cost reassignment in adaptive steganography," IEEE Transactions on Information Forensics and Security, vol. 12 no. 11, pp. 2654-2667, DOI: 10.1109/TIFS.2017.2718480, 2017.
[11] T. Filler, J. Judas, J. Fridrich, "Minimizing additive distortion in steganography using syndrome-trellis codes," IEEE Transactions on Information Forensics and Security, vol. 6 no. 3, pp. 920-935, DOI: 10.1109/TIFS.2011.2134094, 2011.
[12] J. Fridrich, T. Filler, "Practical methods for minimizing embedding impact in steganography," Proceeding of SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX,DOI: 10.1117/12.697471, .
[13] T. Pevny, T. Filler, P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," Proceeding of 12th International Workshop on Information Hiding, pp. 161-177, DOI: 10.1007/978-3-642-16435-4_13, .
[14] V. Holub, J. Fridrich, "Designing steganographic distortion using directional filters," Proceeding of IEEE Workshop on Information Forensic and Security, pp. 234-239, DOI: 10.1109/wifs.2012.6412655, .
[15] V. Holub, J. Fridrich, "Digital image steganography using universal distortion," Proceedings of the first ACM workshop on Information hiding and multimedia security - IH and MMSec '13, pp. 59-68, DOI: 10.1145/2482513.2482514, .
[16] B. Li, M. Wang, J. Huang, X. Li, "A new cost function for spatial image steganography," 2014 IEEE International Conference on Image Processing (ICIP), pp. 4206-4210, DOI: 10.1109/icip.2014.7025854, .
[17] L. Guo, J. Ni, Y. Q. Shi, "Uniform embedding for efficient JPEG steganography," IEEE Transactions on Information Forensics and Security, vol. 9 no. 5, pp. 814-825, DOI: 10.1109/tifs.2014.2312817, 2014.
[18] J. Fridrich, J. Kodovsky, "Rich models for steganalysis of digital images," IEEE Transactions on Information Forensics and Security, vol. 7 no. 3, pp. 868-882, DOI: 10.1109/TIFS.2012.2190402, 2012.
[19] T. Pevny, P. Bas, J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Transactions on Information Forensics and Security, vol. 5 no. 2, pp. 215-224, DOI: 10.1109/tifs.2010.2045842, 2010.
[20] V. Holub, J. Fridrich, "Low complexity features for JPEG steganalysis using undecimated DCT," IEEE Transactions on Information Forensics and Security, vol. 10 no. 2, pp. 219-228, DOI: 10.1109/tifs.2014.2364918, 2015.
[21] X. F. Song, F. L. Liu, C. F. Yang, X. Y. Luo, Y. Zhang, "Steganalysis of adaptive JPEG steganography using 2D Gabor filters," Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security - IH and MMSec '15, pp. 15-23, DOI: 10.1145/2756601.2756608, .
[22] J. Kodovsky, J. Fridrich, V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Transactions on Information Forensics and Security, vol. 7 no. 2, pp. 432-444, DOI: 10.1109/TIFS.2011.2175919, 2012.
[23] M. Kwan, The gifshuffle home page[EB/OL], 2010. http://www.darkside.com.au/gifshuffle/
[24] J. Fridrich, R. Du, "Secure steganographic methods for palette images," Proceeding of 3rd International Workshop Information Hiding, pp. 47-60, DOI: 10.1007/10719724_4, .
[25] X. Zhang, S. Wang, Z. Zhou, "Multibit assignment steganography in palette images," IEEE Signal Processing Letters, vol. 15, pp. 553-556, DOI: 10.1109/LSP.2008.2001117, 2008.
[26] J. Fridrich, A new steganographic method for palette-based images, 1999.
[27] Z. R. Zhou, Z. C. Ji, Y. Z. Wang, J. J. Lin, "A new algorithm of steganography based on palette image," 2006 1ST IEEE Conference on Industrial Electronics and Applications,DOI: 10.1109/iciea.2006.257381, .
[28] S. G. K. D. N. Samaratunge, "New steganography technique for palette based Iimages," 2007 International Conference on Industrial and Information Systems, pp. 335-339, DOI: 10.1109/iciinfs.2007.4579198, .
[29] S. M. Kim, Z. Q. Cheng, K. Y. Yoo, "A new steganography scheme based on an index-color image," 2009 Sixth International Conference on Information Technology: New Generations, pp. 376-381, DOI: 10.1109/itng.2009.119, .
[30] I. T. Fathurohman, T. W. Purboyo, R. A. Nugrahaeni, "Comparative analysis of steganography using LSB and adaptive method on GIF image," International Journal of Applied Engineering Research, vol. 12 no. 21, pp. 10999-11006, 2017.
[31] R. Munir, "Chaos-based modified “EzStego” algorithm for improving security of message hiding in GIF image," 2015 International Conference on Computer, Control, Informatics and Its Applications, pp. 80-84, DOI: 10.1109/ic3ina.2015.7377750, .
[32] R. Munir, "Application of the modified EzStego algorithm for hiding secret messages in the animated GIF images," 2016 2nd International Conference on Science in Information Technology, pp. 58-62, DOI: 10.1109/icsitech.2016.7852608, .
[33] M. T. Juzar, R. Munir, "Message hiding in animated GIF using multibit assignment method," 2016 International Symposium on Electronics and Smart Devices (ISESD), pp. 225-229, DOI: 10.1109/isesd.2016.7886723, .
[34] R. Munir, "Visual cryptography of animated GIF image based on XOR operation," 2017 International Conference on Advanced Computing and Applications (ACOMP), pp. 117-121, DOI: 10.1109/acomp.2017.14, .
[35] R. K. Basak, K. Dasgupta, P. Dutta, "Steganography in grey scale animated GIF using hash based pixel value differencing," 2018 Fourth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), pp. 248-252, DOI: 10.1109/icrcicn.2018.8718708, .
[36] I. M. Saleh, H. H. Merzah, "Efficient data hiding system using LZW cryptography and gif image steganography," International Journal of Technical Research and Applications, vol. 3 no. 2, pp. 28-32, 2015.
[37] L. Shi, Z. Wang, Z. Qian, N. Huang, P. Puteaux, X. Zhang, "Distortion function for emoji image steganography," Computers, Materials & Continua, vol. 59 no. 3, pp. 943-953, DOI: 10.32604/cmc.2019.05768, 2019.
[38] X. Liao, Y. Yu, B. Li, Z. Li, Z. Qin, "A new payload partition strategy in color image steganography," IEEE Transactions on Circuits and Systems for Video Technology, vol. 30 no. 3, pp. 685-696, DOI: 10.1109/TCSVT.2019.2896270, 2020.
[39] T. Filler, J. Fridrich, "Gibbs construction in steganography," IEEE Transactions on Information Forensics and Security, vol. 5 no. 4, pp. 705-720, DOI: 10.1109/TIFS.2010.2077629, 2010.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2020 Jingzhi Lin et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
This paper proposes a new steganography method for hiding data into dynamic GIF (Graphics Interchange Format) images. When using the STC framework, we propose a new algorithm of cost assignment according to the characteristics of dynamic GIF images, including the image palette and the correlation of interframes. We also propose a payload allocation algorithm for different frames. First, we reorder the palette of GIF images to reduce the modifications on pixel values when modifying the index values. As the different modifications on index values would result in different impacts on pixel values, we assign the elements with less impact on pixel values with small embedding costs. Meanwhile, small embedding costs are also assigned for the elements in the regions that the interframe changes are large enough. Finally, we calculate an appropriate payload for each frame using the embedding probability obtained from the proposed distortion function. Experimental results show that the proposed method has a better security performance than state-of-the-art works.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details


1 Shanghai Institute for Advanced Communication and Data Science, School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China
2 Shanghai Institute of Intelligent Electronics and Systems, School of Computer Science and Technology, Fudan University, 201203 Shanghai, China; China and Shanghai Institute of Intelligent Electronics & Systems, School of Computer Science, Fudan University, Shanghai 200433, China