Adaptive Steganography Based on bargain Game

11/08/2021
by   Behbod Keshavarzi, et al.
0

The capacity and security of the confidential message on the channel are two important challenges in steganography. In this paper, a new block steganography model is presented using the bargain method so that a competitive model is introduced. In this game, the blocks are the same players. The bargain is provided with the aim of embedding information without reducing capacity as well as increasing security. The proposed model shows that it can be used both of the special domain and the transform domain, which are two important methods of steganography. For this purpose, an example of a special domain model is introduced in which, In the first step, the image is divided into n × n blocks, and in the second step using the graph coloring algorithm, pixels are considered to embed confidential information in each block. In the third step, regarding the bargaining method in game theory, each block plays the role of a player, that the competition between players is based on the defined goal function, and in the best blocks in terms of two criteria of capacity and security, which here means each block has a higher security-to-capacity ratio, so it has a higher priority, which is determined based on the bargaining model. Also, information embedded in LSB two bits. An example of a conversion domain method is also shows that security increases without decreasing in capacity. The conclusion is evaluated by three criteria: PSNR, histogram, and ϵ-secure also, 2000 standard images were evaluated and observed that the proposed method improves the block methods of embedding information.

READ FULL TEXT

page 13

page 14

page 16

page 17

research
09/20/2017

A new adaptive method for hiding data in images

LSB method is one of the well-known steganography methods which hides th...
research
08/15/2023

Introducing a New Evaluation Criteria for EMD-Base Steganography Method

Steganography is a technique to hide the presence of secret communicatio...
research
09/10/2017

Hierarchical Watermarking Framework Based on Analysis of Local Complexity Variations

Increasing production and exchange of multimedia content has increased t...
research
07/11/2019

Reversible Data Hiding in Encrypted Images using Local Difference of Neighboring Pixels

This paper presents a reversible data hiding in encrypted image (RDHEI),...
research
01/22/2018

A tractable Multi-Partitions Clustering

In the framework of model-based clustering, a model allowing several lat...
research
06/02/2023

Compatibility and Timing Attacks for JPEG Steganalysis

This paper introduces a novel compatibility attack to detect a steganogr...
research
08/06/2019

An Efficient JPEG Steganographic Scheme Design Using Domain Transformation of Embedding Cost

Although the recently proposed JPEG steganography using Block embedding ...

Please sign up or login with your details

Forgot password? Click here to reset