Loading…

Security-oriented steganographic payload allocation for multi-remote sensing images

Multi-image steganography, a technique for concealing information within multiple carrier mediums, finds remote sensing images to be particularly apt carriers due to their complex structures and abundant texture data. These characteristics bolster the resilience against steganalysis and enhance steg...

Full description

Saved in:
Bibliographic Details
Published in:Scientific reports 2024-02, Vol.14 (1), p.4826-4826, Article 4826
Main Authors: Wu, Tian, Hu, Xuan, Liu, Chunnian
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Multi-image steganography, a technique for concealing information within multiple carrier mediums, finds remote sensing images to be particularly apt carriers due to their complex structures and abundant texture data. These characteristics bolster the resilience against steganalysis and enhance steganographic capacity. The efficacy of multi-image steganography hinges on the diplomatic strategy of cover selection and the meticulous allocation of the payload. Nevertheless, the majority of current methods, which are empirically formulated, predominantly focus on the texture complexity of individual images, thereby potentially undermining overall security. This paper introduces a security-oriented approach to steganographic payload allocation for multiple remote sensing images aimed at fortifying the security of multi-image steganography. Our primary contributions include employing a steganalysis pre-trained network to quantify texture complexity in remote sensing cover images, directly correlating it with security. Additionally, we have developed an adaptive payload allocation strategy for multiple images, which embeds a payload proximate to each image’s maximal steganographic capacity while concurrently ensuring the security of the embedding process. Experimental results corroborate that our methodology excels in cover selection and payload allocation and achieves better undetectability against modern steganalysis tools.
ISSN:2045-2322
2045-2322
DOI:10.1038/s41598-024-55474-y