Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 165 tok/s
Gemini 2.5 Pro 50 tok/s Pro
GPT-5 Medium 41 tok/s Pro
GPT-5 High 33 tok/s Pro
GPT-4o 124 tok/s Pro
Kimi K2 193 tok/s Pro
GPT OSS 120B 443 tok/s Pro
Claude Sonnet 4.5 36 tok/s Pro
2000 character limit reached

A Robust Image Steganographic Scheme against General Scaling Attacks (2212.02822v1)

Published 6 Dec 2022 in cs.MM

Abstract: Conventional covert image communication is assumed to transmit the message, in the securest way possible for a given payload, over lossless channels, and the associated steganographic schemes are generally vulnerable to active attacks, e.g., JPEG re-compression, scaling, as seen on social networks. Although considerable progress has been made on robust steganography against JPEG re-compression, there exist few steganographic schemes capable of resisting to scaling attacks due to the tricky inverse interpolations involved in algorithm design. To tackle this issue, a framework for robust image steganography resisting to scaling with general interpolations either in standard form with fixed interpolation block, or pre-filtering based anti-aliasing implementation with variable block, is proposed in this paper. And the task of robust steganography can be formulated as one of constrained integer programming aiming at perfectly recover the secret message from stego image while minimizing the difference between cover and stego images. By introducing a metric - the degree of pixel involvement (dPI) to identify the modifiable pixels in cover image, the optimization problem above could be effectively solved using branch and bound algorithm (B&B). In addition, a customized distortion function for scaled stego images is adopted to further boost the security performance. Extensive experiments are carried out which demonstrate that the proposed scheme could not only outperform the prior art in terms of security by a clear margin, but also be applicable to resisting the scaling attacks with various interpolation techniques at arbitrary scaling factors (SFs).

Citations (1)

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.