Abstract

Cloud services have become an increasingly popular solution to provide different services to clients. More and more data are outsourced to the cloud for storage and computing. With this comes concern about the security of outsourced data. In recent years, homomorphic encryption, blockchain, steganography, and other technologies have been applied to the security and forensics of outsourced data. While encryption technologies such as homomorphic encryption and blockchain scramble data so that they cannot be understood, steganography hides the data so that they cannot be observed. Traditional steganography assumes that the environment is lossless. Robust steganography is grounded in traditional steganography and is proposed based on a real lossy social network environment. Thus, researchers, who study robust steganography, believe that the measurement should follow traditional steganography. However, the application scenario of robust steganography breaks through the traditional default lossless environment premise. It brings about changes in the focus of steganography algorithms. Simultaneously, the existing steganography methods miss the evaluation of applicability and ease of use. In this paper, “default parameters” are observed by comparing the process of robust image steganography with traditional image steganography. The idea of “perfecting default parameters” is proposed. Based on this, the attribute set of measuring robust image steganography is presented. We call it PRUDA (Payload, Robustness, ease of Use, antiDetection, and Applicability). PRUDA perfects default parameters observed in the process of traditional steganography algorithms. Statistics on image processing attacks in mobile social apps and analyses on existing algorithms have verified that PRUDA is reasonable and can better measure a robust steganography method in practical application scenarios.

1. Introduction

With the proliferation of mobile terminals and the astonishing expansion of the mobile Internet, Internet of things, and cloud computing, more and more data are outsourced to cloud storage systems because once the data are shared with untrusted servers, there are potential risks that the data might be modified or replicated by unauthorized servers. Users worry that when they outsource their data to untrusted parties, they lose control of the outsourced data, and the ownership of the data is not well guaranteed. Thus, users are reluctant to share their data in these network environments with other entities they do not trust because of privacy concerns. To address this issue, many schemes have been proposed to protect outsourced data security. Homomorphic encryption [1, 2], blockchain [3, 4], and steganography [5, 6] are effective methods that have been popular in recent years. When using homomorphic encryption and blockchain to encrypt and verify the outsourced data, the carrier transmitted over the channel and stored in the cloud are garbled media. The garbled media is easy to attract the attention of attackers. Steganography embeds private data into normal media, and the carrier transmitted over the channel and stored in the cloud is everyday media. It not only hides the content of data but also hides its existence. Thus, the data are doubly insured.

The photos and pictures of blowout growth [7] shared on social applications, post bars, and open websites provide natural carriers for steganography. For the sake of speed or other bandwidth considerations, images are often processed unexpectedly (such as scaled or compressed) in the cloud environment. The traditional image steganography method cannot function effectively in this lossy environment. Based on this, robust image steganography is introduced [8]. Traditional steganography methods usually focus on designing proper distortion functions. The aim is to improve antistatistical detection performance by keeping the modifications concentrated on complicated texture areas adaptively [9, 10], or the pixels’ modification directions met expectation [11]. Robust image steganography [1217] has inherited a lot from traditional image steganography. For example, the measurement attributes. New problems arise due to the different application backgrounds of robust image steganography.

Figure 1 shows the application scenarios of traditional steganography and robust steganography. A stego image is transmitted in a lossless environment in traditional steganography (Figure 1(a)) while it is transmitted in an open lossy environment in robust steganography (Figure 1(b)). Measurement attributes are born in traditional steganography (the blue dashed tail arrow) and used to evaluate all steganography methods (the regular blue arrows). The application background of robust steganography, lossy environment (e.g., Wechat1 and Facebook2), is not reflected (the hollow green arrow) in the measurement attributes. As one robust steganography method after another was proposed, the contradiction between the measurement attributes and the robust steganography is gradually exposed.

The existing robust image steganography methods can be divided into methods combing with watermarking algorithm and methods digging environment features (or called channel features which refer to lossy operations in transmission or the cloud) according to the algorithm’s idea. The former obtained the wanted robustness while introducing the unwanted low embedding rate and poor antidetection performance such as DCRAS [8], GMAS [16], and MREAS- [17]. Some researchers tried to dig channel features and simulated channel attacks to keep attacks that images suffered when transmitting are predictable such as designing a transport channel matching [12], adjusting cover images according to the received image [13], constructing an autoencoder [14], and utilizing a simulated repetitive compression network [15]. These methods always had good antidetection performance and a higher embedding rate. However, they generally had relatively strict restrictions on channels. Otherwise, the robustness would be reduced.

All these methods consider reducing the message extraction error rates while maintaining [15] (sometimes sacrificing [17]) the antistatistical detection ability. Antistatistical detection ability is one of the essential attributes to measuring traditional steganography. It means that the measurement attributes are beginning to diverge. For traditional steganography, two key attributes of the measurement are message embedding capacity (payload) and antistatistical detection ability [18]. There are also eyes on embedding efficiency [19], color frequency test [20], and dual statistics attacks [21]. The validity of antistatistical detection abilities has been challenged because of the impact of network behaviors [22].

With profound research in robust image steganography, some questions arose. Is there any disadvantage to measuring robust image steganography using them directly? Are they suitable for the application background of a lossy environment? When evaluating a robust steganography method using the traditional measurement attributes directly, the usage of measurement attributes has been altered to some extent. These nonuniform settings hamper comparisons between methods. It means traditional measurement attributes begin to limit robust steganography methods. Besides, because the existing measurement attributes do not consider the lossy environment’s application background, the evaluation of a method is incomprehensive. These indicate that the existing measurement attributes cannot accurately evaluate robust image steganography.

Based on the above considerations, we try to look for suitable measurement attributes for robust image steganography. We first compare the transmission process of robust image steganography and traditional steganography. The “default parameter” is observed, and the concept of “perfecting default parameter” is naturally introduced. The attribute set PRUDA (Payload, Robustness, ease of Use, antiDetection, and Applicability) is presented based on this. The main contributions are as follows:(i)The concept of “perfecting default parameter” is proposed. It provides a direction for the attribute set perfection and may offer inspiration to other related measurements’ improvement.(ii)Contrasting the pursuits and application background of robust image steganography with the existing measurement attributes, the attribute set PRUDA is proposed. It may measure robust image steganography comprehensively and may push this field closer to the practical application faster.(iii)A large number of statistics on processed images and open lossy channel attacks are given. They verify the rationality of PRUDA and can be used as the application basis of the relevant research on robust image steganography.

The rest of this paper is organized as follows: in Section 2, we introduce the concept of “perfecting default parameters.” Then, logically and smoothly, by perfecting the “default parameters” of traditional steganography, a new measurement attribute set, “PRUDA,” is proposed and elaborated in Section 3. Next, the rationality of PRUDA is verified in Section 4. Finally, the paper is discussed and concluded in Section 5.

2. The Concept of “Perfecting Default Parameters”

Figure 2 shows the comparison between the transmission process of traditional image steganography (Figure 2(a)) and robust image steganography (Figure 2(b)). The upper left box is the legend. As shown in Figure 2(a), the cover image can be any image for traditional image steganography. The sender embeds the secret messages of a given payload into a cover image and generates a stego image. The stego image is transmitted through a lossless channel [23]. The receiver extracts the secret message from the received stego image. In this process, the steganalyzer distinguishes the cover and stego image by statistical detection.

As shown in Figure 2(b), to ensure that the secret message can be extracted from a stego image transmitted through the public lossy channel, more operations are added in the transmission process of robust image steganography. Thus, this process is more complicated than that of traditional steganography. The cover image is no longer an arbitrary original image but maybe the image with specific features or the preprocessed image. The sender embeds the secret message of a given payload into a prefiltered or preprocessed cover image. Many algorithms encode the secret message first before embedding to reduce the message extraction error rate. Thus, the actual message embedding rate may be lower than that of the desired. The encoded message is always embedded into the prefiltered or preprocessed cover image, and the stego image is generated. When the stego image is transmitted through a public lossy channel, it may be subjected to scaling and compression attacks. After the stego image is received, the corresponding extraction steps are performed. In this process, the steganalyzer still distinguishes the cover and stego image by statistical detection. Nevertheless, it is worth a reminder that the cover image here is always not the original image but the prefiltered or preprocessed image.

The cover image, message extraction error rate, and environment are not considered when studying traditional steganography. We name them “default parameters.” Specifically speaking, the traditional steganography algorithm can use any cover image to embed messages. The message extraction error rate is zero. The environment is lossless, and the stego image is unchanged before and after transmission. The only consideration in the whole process is to reduce the possibility of detecting the stego image and extract messages correctly. Therefore, it is reasonable to take antistatistical detection ability and message extraction error rate as the attributes of the measurement of traditional steganography.

To ensure robustness and improve antidetection performance, “default parameters” have changed a lot in robust image steganography. The cover image may not be arbitrary, but the prefiltered or preprocessed image. It directly affects the message embedding rate, which is computed based on the cover image. Messages are no longer embedded directly but are first encoded using various codes. The environment is a public and lossy channel with its own transmission rules. Images and behaviors that do not obey these rules would be easily detected [24]. Stego images suffer attacks during transmission. After transmission, their image sizes and file sizes are uncertain. It is challenging to ensure the stego image’s consistency of the sender and the receiver, so is the message extraction accuracy rate.

This is the complex environment faced by robust image steganography, in which “default parameters” are no longer default. Researchers try to enhance robustness considering the lossy environment. However, when evaluating the method, they directly use the measurement attributes of traditional steganography. This paper focuses on this neglected point and argues that it is time to perfect default parameters. “Perfecting default parameters” means to perfect those parameters that are no longer default to the measurement to take the actual application background (the lossy environment/channel) into account. We believe this can help robust image steganography towards practical applications.

3. PRUDA

Reasonable measurement attributes are essential to promote the research of robust image steganography. In this section, a five-sphere measurement attribute set, PRUDA, is put forward. As shown in Figure 3, PRUDA considers five perspectives. Payload is the message embedding rate of an image transmitted through the lossy channel. Considering the lossy channel’s effect, the definition is extended by perfecting the definition: message embedding rate in the traditional steganography method. Robustness refers to the resistance of a stego image to attacks from the lossy channel. The definition is extended considering the feature and fault-tolerant retransmission mechanism of lossy channels. AntiDetection is defined as the unidentifiability and indistinguishability of images. The definition is updated considering the actual application background of robust steganography. Ease of Use means the difficulty of using the method, or rather, the difficulty of obtaining cover images. Applicability refers to the degree to which the channel is constrained by the method. Ease of Use and Applicability are two novel attributes proposed by perfecting two default parameters: cover image and environment in the traditional steganography method.

The attribute set PRUDA perfects the explicit and implicit (default) measurement attributes of traditional steganography. It not only inherits the measurement attributes of traditional steganography but also considers the actual application scenarios of robust image steganography. Thus, it can measure the robust image steganography method more accurately.

3.1. Payload

Payload is defined as the message embedding rate in traditional steganography, where is the number of embedded messages, is the number of pixels (spatial domain), or the nonzero AC coefficients (frequency domain) in an image. The “image” in the definitions refers to the sender’s cover image and is represented by .

has undergone a great change in robust image steganography. Unlike traditional steganography methods [25, 26], which uniformly define as any cover image, is defined differently in various robust steganography methods. For example, in Yu et al.’s method [16], is defined as a precompressed image, while in Zhang et al.’s method [27], is defined as a scaled image.

Like , has changed a lot too. Unlike traditional steganography, where represents there are messages embedded, robust steganography methods have embedded far fewer messages than . The reason for this is that in robust steganography methods, messages are often encoded first before embedded, such as RS (Reed–Solomon) [16], CRC (Cyclic Redundancy Check) [28], and BCH (Bose–Chaudhuri–Hocquenghem) [12]. That is, is the encoded message. Thus, the effective message embedding rate is lower than expected to some extent.

This inconsistency hampers the comparison of methods and is not conducive to the development of this field. Therefore, Payload needs to be unified, and it is redefined aswhere and represent the number of embedded error correction code and the number of pixels (or nonzero AC coefficients) of “the open-processed image” , respectively. refers to the image performed simple, reasonable processing that most users would do, such as scaling an image to the received image’s image size, precompressing an image once. represents the percentage of embedded messages in . represents the number of effective embedded messages.

This definition considers the inconsistency of payload calculation caused by the inconsistency of message encoding and cover image in robust image steganography, thus avoiding the differential use of message embedding rate and building a comparison bridge between different methods.

3.2. Robustness

Robustness refers to the resistance of a stego image to attacks from a lossy channel. Reflected in measurement attributes, it is the integrity of the messages extracted from the image attacked. For robust image steganography, the unit transmitted in the public lossy channel is the image. The unit of the sender embedding messages and that the receiver extracting messages is the image too. Considering the fault-tolerant retransmission mechanism in practical applications (if a fragment of messages fails to be extracted, the sender is requested to resend), the message complete extraction rate of the image is challenged. In other words, in the practical application, if images are sent, and messages embedded in images can be extracted entirely, then messages in images need to be resent. If messages embedded in each image cannot be fully extracted, even if the average message extraction error rate is low, the sender still needs to resend all the images.

The average message extraction error rate is one of the default parameters of traditional steganography and is 0. For existing robust image steganography methods, the average message extraction error rate of 0 comes with many constraints. Otherwise, the rate is far from zero. The message extraction utterly is the ultimate goal of robust image steganography. Considering the fault-tolerant retransmission mechanism in practical applications, assigning two meanings to robustness to measure the method’s effectiveness is more practical. (1) The current average message extraction error rate , where is the number of message bits mistakenly extracted from every image, and is the total number of embedded messages in the image. (2) The completely correct extraction rate , where is the number of stego images that can extract the completely correct message, and is the total number of stego images. Giving robustness with these two meanings considers the extraction accuracy of each image and the overall average extraction error rate.

3.3. Ease of Use

For a user, the ease of use of a method has nothing to do with the method’s complexity but with the difficulty of using it. The internal implementation is encapsulated when the product is released, and interactions with users depend on input and output parameters.

For the traditional steganography method, the input is generally a cover image, messages transmitted, and a shared key to the sender. The output is the stego image obtained by embedding messages into the cover image, transmitted through the lossy channel. As shown in, , , , and represent the cover image, secret message, shared key, stego image, and the embedding operation, respectively. represents that after embedding operation, the stego image is generated.

To the receiver, the input is the stego image transmitted through the lossy channel and a shared key. The output is the message extracted from the image. As shown in represents the extraction operation. represents that after extraction operation, the transmitted secret message is extracted.

We do not need to focus too much on and , but we have to think about . In traditional steganography, there is generally no special requirement for . In other words, for a traditional steganography method, is one of the default parameters, and any image can be used as a cover; thus, the method is easy to use.

However, robust image steganography is not the case. To improve robustness or maintain antistatistical detection ability, preprocessing [12] or prefiltering [17] of cover images has gradually become one step of some steganography methods. The step limits the suitable cover images and increases the selection difficulty of cover images. It means that the cover image is no longer any image but images with particular characteristics. That is the reason why we think ease of use should be one of the attributes of measurement.

“Ease of Use” can be defined as how easy to obtain the method’s cover image. As shown in is the number of images available in the database. is the ratio of the number of available images to the total number of images. Suppose the method is greatly affected by the “selection of cover image,” and the “selection of cover image” is difficult to a certain extent. In that case, the method’s usability will decline sharply, and we think that the reliability and guideline of the experimental results of the method may relatively be reduced.

3.4. AntiDetection

Steganography analysis is regarded as having promoted steganography’s progress [18]. Statistical detection is an essential means of steganography analysis. Antistatistical detection ability is one of the critical evaluation attributes of steganography. However, with further development, the rationality of antistatistical detection ability has been questioned [22]. In robust image steganography, we need to pay extra attention to it.

With the advent of the mobile phone era, thousands of images are transmitted at any moment on the network, converging into an image ocean. Such an image ocean provides a natural hiding environment for stego images. In such an environment, as long as the stego image is like other images and does not attract attackers’ attention, it is secure. This new security, known as behavioral security, has attracted the attention of scholars [24]. This section considers the antidetection ability from the images’ perspective on robust image steganography’s actual application background. It includes two aspects: (1) the image itself is unrecognizable, such as the image’s size is not suspect; (2) the image is indistinguishable in the image ocean.

3.4.1. The Image Is Unrecognizable

To reduce the channel’s monitor’s attention, the stego image transmitted through the channel should be unrecognizable. That is, it should look similar to other images on the channel. As shown in and represent the identifiable feature of the stego image and the image transmitted on the channel, respectively. represents that they are approximate.

Take the most identifiable feature of images: size as an example. For a lossy channel with compression and scaling attacks, to ensure robustness, suppose smaller images are selected for transmission to avoid compression and scaling, for instance, memo, as shown in Figure 4. Memes are generally small and will not be scaled or compressed. Thus, they seem to be the right choice as robust covers. However, memes are not suitable for hiding messages, because (1) for the same messages, compared with typical size images, more emojis images are needed due to their small sizes, which is easy to attract the attention of the monitor; (2) frequently sending memes on moments where people are sharing photos is abnormal behavior [24]; and (3) memes are generally traceable; that is, their original versions are easy to locate. Besides, memes are generally of a single tone, and messages hidden in them are more likely to be extracted than those hidden in other normal photos. Therefore, memes that seem very appropriate from a robust point of view are not suitable for robust steganography. Normal photos may be more suitable.

3.4.2. The Image Is Indistinguishable

With the increasingly powerful camera apps on mobile phones, unprocessed images are rare. Unlike traditional steganography, which assumes that all images are unprocessed, nowadays, images processed are ubiquitous on social software, forums, and photo contests. When stego images mingle with kinds of images processed, the effect of a method’s antistatistical detection ability is greatly weakened (Section 4.3.2). Thus, in the robust image steganography’s practical application environment, it is more meaningful to consider the indistinguishability between a stego image and other images processed. As shown in and represent the stego image and the processed image, respectively. represents that they are approximate.

Therefore, giving antidetection these two new meanings takes into account the unrecognizable of the image itself and considers the indistinguishability of the image in the general environment. It is more suitable for the practical application background of robust image steganography.

3.5. Applicability

Applicability refers to the degree to which the channel is constrained by a method. Robust image steganography studies how to extract messages correctly from the image transmitted through a lossy channel. It means the attacks that robust image steganography addressed should be those contained or possibly contained in the “open lossy environment,” rather than the “imagined” ones.

At present, the robust steganography method is difficult to apply to free and open lossy channels. Focusing on the characteristics that fit, reality is a shortcut to promote research into practice. As shown in and represent the applicable condition of a steganography method and the real channel’s attack parameter, respectively. represents that they are approximate.

To make the stego image resistant to an open lossy channel, in robust steganography, the constraints on the scaling/compression/other channel’s attack parameters should be reasonable; it should be set within the actual factor range than be set as an imagined value. Take the most common image scaling and compression as examples.

3.5.1. Scaling Attack

Assume that the premise of a method is to know the size of the receiver’s image. According to the investigation of some lossy channels, the received image’s size can be determined. The channel’s scaling factor remains constant for a long time. Thus, this premise is practical.

Suppose a method applies to upsampling with a scaling factor of more than five but not upsampling with a scaling factor less than two and downsampling. According to surveys of real lossy channels, images are almost all downsampled on the channel. Hence, this hypothesis is impractical, and this study makes little sense in robust image steganography (however, it may be significant in other fields).

3.5.2. Compression Attack

Assume a method applies to a fixed quality factor, and when the quality factor changes a little, the method works poorly. According to surveys of real lossy channels, it is not easy to obtain the channel’s accurate quality factor. Thus, this restriction may be a little harsh.

Suppose a method is useful for the quality factor within the range of a quality factor. According to the investigation of the actual lossy channel, the channel’s compression factor range can be estimated, so this method’s condition is reasonable.

There may be other types of attacks on the channel, and the actual attack types and attack parameters need to be fully considered in the research. Taking applicability as a measurement attribute can put the research of robust steganography to practical applications.

3.6. Observations on Five Attributes

Five attributes measure a robust steganography method from five dimensions. Different methods have different emphases and concerns, leading to different measurement dimensions.

With observations on the current development history of robust steganography, scholars’ attention on attributes is affected and limited by the development of this research field. Therefore, it may be challenging to obtain a perfect method. Consideration of “lossy channel” is added in robust steganography. Thus, scholars paid more attention to Robustness in the early days, even at the expense of antiDetection and Payload [8]. Robustness had more to do with observing that attacks (such as the compression attack) were on a channel. The researchers constructed a number of attack experiments in laboratories based on the attacks they observed. That is said, research at that time [15] was “totally based on a laboratory environment.” With further development, the robust steganography field has gradually gone from the “laboratory” to the “real environment.” Applicability began to appear in experimental verification in some papers [16]. During this process, due to the impact of “lossy environment,” the two measurement attributes of traditional steganography, Payload and antiDetection, were sacrificed to some extent [17]. At present, robust steganography is still in its infancy. Restricted to the stage, a mature robust steganography application (product) has not been released yet. Thus, Ease of Use has not been considered so far.

The above observations indicate that PRUDA’s five attributes are the alchemy of quenching a robust steganography method that can only be used in a laboratory environment into one that can be used in an actual lossy environment. In essence, none of the five attributes is more important than the other. However, some attributes need to be paid special attention to at a particular development stage to facilitate a method’s breakthrough. Thus, some attributes are considered to be more important than others at a specific stage of development. By perfecting attributes one by one, the robust steganography method is gradually improved, and finally, to realize the original intention of robust steganography research: achieving covert communication in an actual lossy environment.

4. Verification

In this section, we first discuss and show the not unified status quo of the existing methods. Then, the rationality and practicality of PRUDA are verified through actual statistics. Finally, since Robustness and Ease of Use are apparent, the discussion emphasizes the three attributes that may be questioned: Payload, antiDetection, and Applicability.

4.1. Verification of PRUDA’s Necessity

We first gather statistics on the robust steganography methods’ nonuniform measurement attributes to verify that it is necessary to perfect the existing measurement attributes. Then, an existing method is evaluated from five attributes to verify the necessity of PURDA.

4.1.1. Necessity of Perfecting Measurement Attributes

Some existing methods are analyzed from five aspects in this section, as shown in Table 1. The first column is the attack type that the second column’s method can resist; the third column represents the payload used in the method, where (BCH/RS) is the algorithm used for message encoding. The fourth column shows robustness measurements used in the method (the average message extraction error rate or the completely correct extraction rate ). The fifth column explicates what kind of images can be used as the method’s cover images; the method’s antistatistical detection performance is demonstrated in the sixth column. Performance calculation parameters are as follows: payload is 0.1bpp/bpnC/bpnAC (except for the method in [29, 30]). SPAM (Subtractive Pixel Adjacency Matrix) [32] feature is extracted from spatial domain images, and DCTR (Discrete Cosine Transform Residual) [33] feature is extracted from frequency domain images. The seventh column gives the requirement of the method for the applicable channel.

Table 1 shows the nonuniform status of the existing methods. For example, for Payload, a fixed amount of embedded messages are used in [29, 30]’s method; in studies [12, 14, 15], an original image is the basis for calculating payload; in other papers, a scaled image or precompressed image is the basis. For Ease of Use, “any image” [13, 27] means the method is used easily; “precompressed image” [8, 16] means that the method needs to preprocess the cover image, which increases the difficulty for the use of the method; “repeatedly compressed image that meets certain requirements” [12] and “the image that conforms to certain laws” [17] mean that the method becomes more difficult to use. For antiDetection, when payload = 0.1, only [27]’s method maintains the antistatistical detection ability of traditional classical steganography (such as J-UNIWARD [34]) (data 0.45); these data of other methods decrease significantly, even close to 0 [17]. Moreover, cover features extracted in these papers are based on preprocessed images rather than original ones. For Applicability, “no restriction” [14, 15] means that there is no requirement for the channel, while most methods require accurate channel details [12, 13, 27] or an approximate parameter range [8, 16, 17, 31]. All these show that nowadays when evaluating a method, it uses custom but not unified attributes. It hampers comparisons between methods. Thus, direct applying the traditional measurement attributes to robust steganography is not reasonable to some extent. Therefore, it is necessary to perfect the measurement attributes of robust steganography, determined by its practical application background.

4.1.2. Necessity of PURDA

We take the method in the paper [12] as an example to analyze the five attributes of PRUDA. We chose it because there are experiments on practical applications, and we think this is consistent with our idea to some extent. Our idea is trying to perfect the measurement attributes and make them more suitable for robust image steganography under the lossy channel. Thus, the robust steganography method is promoted to be closer to practice.

Two robust image steganography methods based on TCM (Transport Channel Matching), namely, JCRIS and JCRISBE, are introduced in the paper [12]. The notations used below follow those in that paper. The image size of the received image, , and the channel compression factor, , need to know. The TCM algorithm is used to compress images repeatedly. We denote the number of compressions as . The JCRIS algorithm compresses the stego image repeatedly. This process is performed up to times. The JCRISBE algorithm encodes messages repeatedly. This process is performed up to times.

10,000 images from the Bossbase-1.01 database are used to verify JCRISBE.  = 75, and attack quality factor  = 65, 72, 75, 78, 85. Payload = 0.01–0.1 bpnzAC.(1)Payload. Two algorithms used 0.05–0.3 bpnzAC of the multiple compressed images as payload. For JCRIS, the cover image is compressed times, which means that the cover image has a small file size. For JCRISBE, the messages are encoded by BCH before embedded into the compressed image, which means there are many error correction codes in the embedded messages. The actual message embedding rate falls short of the 0.05–0.3 bpnzAC of the original cover image in both cases. Table 2 gives the actual embedding rate of our verification experiment (“all” means the results for all the are the same). Obviously, the actual embedding rate is lower than the defined payload.(2)Robustness. Two algorithms considered the message extraction error rate . We verified and , and the results are shown in Table 2.(3)Ease of Use. When the payload = 0.1 bpnzAC and the distortion function is J-UNIWARD, the available image in the Bossbase-1.01 database was about 55% and 99% for JCRIS and JCRISBE. It means that not all images can be used as cover images for these methods. The number of failed images we verified that cannot be as cover images is higher than that in the paper [12] (Table 2).(4)AntiDetection. For JCRIS, the number of compression of the cover image is , which means that the cover image’s file size is relatively small and may be recognizable. The security of JCRIS was not evaluated in the paper [12]. For JCRISBE, in the statistical performance test, cover features are extracted from the TCM output compressed images and once-compressed images. Images used for extracting stego features are generated by embedding messages into these two kinds of images. When evaluating antistatistical detection performance, unlike the traditional steganography, images used for extracting cover features are no longer the original images but maybe processed images. The processing may differ in different methods, which brings obstacles to the security comparison between different methods.(5)Applicability. This method requires a known received image size and a known accurate channel compression factor . is predictable, which is verified in the next section. may not be so easy to obtain. To verify the method’s effectiveness when the channel’s (attack) quality factor is somewhat different from , we did some experiments (Table 2). It shows that the method needs a that equals . Otherwise, the method is out of work.

4.2. Verification of Definition on Payload and Application

To verify the Payload’s definition, we should verify whether the sender can predict the receiver’s image size (scaling factor) and file size (compression factor). To verify the Application’s definition, we should study if it is feasible to make some constraints on the channel, whether we can have harsh constraints. Our verification process is as follows.

We shot with the top seven mobile phones and three camera apps on 1,000 scenes. A total of (13 + 10 + 12 + 10 + 11 + 11 + 9) resolution types 1,000 scenes = 76,000 photos are captured, shared and compressed, separately. For space consideration, only the data of four mobile phones under one scene are listed here. Mobile phone brands came from Zhongguancun Online3 and listed in the first column of Table 3. Test phones were randomly selected from our laboratory classmates (the model and resolution are listed in the second column of Table 3). Three camera apps were selected combining Zhongguancun Online’s recommendation4 and laboratory classmates’ preferences (three camera apps are listed in the third column of Table 3). We used Huawei as PhoneA and others as PhoneB. When Huawei was used as PhoneB, Oppo was used as PhoneA temporarily.

We did the following test using PhoneA and PhoneB:(i)Shoot with three camera apps using PhoneB, and captured images are called the Original Photo. Its two properties, image size and file size, are denoted as ImageSize_OP and FileSize_OP, respectively.(ii)Post original photos in WeChat Moment using PhoneB.(iii)Download photos from PhoneB’s Moment in WeChat using PhoneA, and call them Moment Photo. Its two properties, image size and file size, are denoted as ImageSize_MP and FileSize_MP, respectively.(iv)Resize the original photo’s image size to ImageSize_MP, which is renamed ImageSize_CP. Then, perform JPEG compression to make the compressed photo as consistent as possible with FileSize_MP. The quality factor used is 98, and the compressed photo’s file size is denoted as FileSize_CP.

The reason for choosing the compression quality factor 98 is that the FileSize_CP is the closest to FileSize_MP when the quality factor is 98 after our repeated tests. When the quality factor is slightly changed, the difference between FileSize_CP and FileSize_MP is greater than that of 98. The unit of FileSize_X (X is OP, MP, or CP) is in KB.

The comparison between ImageSize_OP and ImageSize_MP in Table 3 shows when the image size of the original image is greater than the resolution of the receiver’s phone, the image will be scaled while preserving the ratio of the height-to-width. Otherwise, the image stays the same (the bold data). It indicates that the sender can predict the image size of the received image for a certain receiver. It has been used as a premise for existing robust steganography methods. Many methods resisting compression [12, 13, 16] are proposed on the presumption of resizing the cover image to the receiver’s image size. The comparison between FileSize_MP and FileSize_CP in Table 3 shows that the FileSize_CP may be larger or smaller than FileSize_MP. It indicates that the original image can be compressed to an image the file size of which is approximately equal to but not the exact size. Therefore, a proposed method can constrain the channel, but it must be a mild constraint rather than a harsh one.

4.3. Verification of Definition on AntiDetection

We have given the antiDetection two meanings. The image is unrecognizable, such as the image’s size is not suspect; the image is indistinguishable in the image ocean. The first meaning is given because we want to keep the image noteless. The second meaning is given because we find the role of the existing statistical detection in open lossy channels (the application background of robust image steganography) is reduced. This section verifies the antiDetection’s definition from two aspects: image composition in public lossy channels and the role of statistical detection in open lossy channels.

4.3.1. Image Composition in Open Lossy Channels

The social platform is an important application background of robust image steganography. We focus on the proportion of processed images on the social platform. From a common user’s perspective, there are two types of images on social platforms: those captured by the user and those downloaded from other sources. Among downloaded images, there are also two types: captured photos and produced images. Thus, there are two types of images on social platforms: photos taken and images produced. The latter are processed images undoubtedly. Here, we focus on the former: besides the platform’s processing such as compression and scaling, how many images are processed when sharing? To this end, we developed the following questionnaire (six questions (Q1–Q6) and corresponding options (O1–O6)):Questionnaire on Camera and Photo ProcessingQ1: the degree of concern with the camera app when buying a phone.O1: 5 scores. (1 means not concerned at all; 5 means extremely concerned.)Q2: your greatest concern in a camera application.O2: A, resolution; B, number of cameras; C, camera functions (such as various image operations); D, others.Q3: the proportion of processed images to all posted images.O3: 5 scores. (1 means never processed at all, and 5 means every image is processed.)Q4: the most commonly used operation.O4: A, beautify/filter/blur; B, enhance (contrast, brightness, sharpen, etc.); C, adding (stickers, doodles, watermarks, etc.); D, others.Q5: your age.O5: A, 1–17; B, 18–25; C, 26–40; D, 40–55; E, over 55.Q6: your gender.O6: A, male; B, female.A total of 1,917 questionnaires were collected. 641 participants were female, and the rest were male; 76.98% were 18–25 years old, and 15.24% were 26–55 years old. The statistical results are shown in Figure 5.

The blue bars in Figure 5 show all the returned questionnaires’ statistical results. Figures 5(a)–5(d) are corresponding to questions 1–4 in the questionnaire, respectively. It can be seen that when buying a phone, 60.69% of people pay attention to the camera app (); of the concerns about camera applications, half focus on resolution, and nearly 40% focus on image processing. Nearly half of the participants always processed their photos before posting on social platforms (). In image processing, nearly half prefer beauty/filter/blur processing, 23% prefer enhancement processing, and 24% like to add extra doodles to their photos.

In our cognition, females prefer cameras and image processing more than males. To avoid inaccurate statistical results caused by gender, we chose 641 males as the comparison to ensure the ratio of males to females is 1 : 1. Among them, 75.02% were 18–25 years old, and 16.89% were 26–55 years old. The statistical results are shown in the red bars in Figure 5. It shows that on social networks, males and females showed similar preferences for image processing.

The statistical results show that nearly half of the photos transmitted through the open lossy channel (the application background of robust image steganography) have been processed. This means that the processed images transmitted through open lossy channels account for far more than half.

4.3.2. The Role of Statistical Detection in Open Lossy Channels

To study the role of statistical detection in open lossy channels, we verified the antistatistical detection performance in variously processed images. 10,000 gray images from the Bossbase-1.01 database and 886 color images from the UCID database were utilized. JPEG compression is first performed to generate JPEG images. The quality factor is 75 for Bossbase-1.01 database and 85 for the UCID database. Five operations, including mean filtering, gaussian filtering, contrast adjustment, image sharpening, and edge enhancement, were performed. Stego images are generated utilizing “J-UNIWARD + STC (Syndrome-Trellis Codes).” Payload = 0.1–0.3 bpnzAC. DCTR feature was utilized to extract features of cover and stego images. We randomly selected 1/2 for classifier training in each group and the remaining 1/2 for testing to get the average detection error rate .

Table 4 is the experimental results of antistatistical detection. The first column refers to the types of cover images included in the experiment. The abbreviations are in parentheses. The corresponding stego images are generated by embedding messages in these cover images with different embedding rates. For example, “Contrast + Edge + Sharpen” means that the cover images contain these three types of images, each accounting for 1/3. The stego images are generated by embedding messages into these cover images. The second to the fourth column and the fifth to the seventh column are the detection error rates of two image databases under three different embedding rates of 0.1–0.3 bpnzAC.

Table 4 shows that images with edge enhancement or sharpening are suitable as cover images and have good antistatistical detection performance. In contrast, images with mean filtering and Gaussian filtering are the opposite. When cover images contain multiple types of images, the antistatistical detection performance is an approximate average value of that of them. It means that when an image is in an ocean composed of various types of images, the antistatistical detection performance increases, and the role of statistical detection may be weakened. The practical application environment of robust image steganography is open lossy channels, and there are plenty of processed images in open lossy channels. Considering this, it may be more meaningful to assign the antidetection as the indistinguishability between the stego images and other processed images.

5. Discussion and Conclusion

With the development and maturity of technologies, cloud services provide more and more convenience for people. This convenience comes with security issues. For privacy or data ownership reasons, users do not want the outsourced data to be seen by third parties or performed unexpected operations. For this reason, the outsourced data are often encrypted or hidden in other carriers. The recently popular used cryptographic technique is homomorphism encryption. In addition, the blockchain has been widely used to verify the integrity of outsourcing data in recent years. These methods encrypt the outsourced data into garbled code to hide the contents. However, garbled code can be a noticeable feature that catches an attacker’s eyes. Steganography, masking the content of outsourced data and its existence simultaneously, is also effective schemes used to maintain the security of outsourced data in recent years. Because the cloud is an open lossy environment, which is different from the lossless hypothesis of traditional steganography, robust steganography came into being. The open lossy environment diverts the algorithm’s focus and leads that the existing measurement attributes inherited from traditional steganography are no longer suitable for robust image steganography.

Affected by the lossy environment, many default parameters in traditional image steganography are no longer default in robust image steganography. Considering this, “perfecting the default parameters” is proposed. A measurement attribute set that is suitable for robust image steganography is proposed considering practical application background. We call it PRUDA. PRUDA perfects the default parameters of traditional steganography. It improves the existing measurement attributes from five perspectives of Payload, Robustness, Ease of Use, antiDetection, and Applicability. The rationality of measurement needs to be tested by practice. After all, it is a truth universally acknowledged that genuine knowledge comes from practice. For this reason, this paper verified PRUDA utilizing a large number of practice experiments. First, the existing robust image steganography methods are presented and discussed from five aspects, which shows some deficiencies in experimental verification’s uniformity, and perfecting the existing measurement is needed. Then, the scaling and compression experiments are done on WeChat, one of China’s most popular social media. Top 7 mobile phone brands and three camera apps are used. Results show that the definition of Payload and Application is reasonable. Finally, the questionnaire of photo processing and antistatistical detection performance of processed images shows that the definition of antiDetection is reasonable. Therefore, the rationality of PRUDA is verified.

Parts of the attributes in PRUDA have been used in the measurement of existing robust steganography methods. However, limited by the traditional measurement attributes, the robust steganography method is evaluated as incomprehensive and inconsistent. In this paper, the attribute set PRUDA unifies measurement attributes, hoping to break down the measurement barriers between methods. Worthy of note, this paper does not intend to challenge the existing measurement standard. It is valuable for traditional steganography methods. Nor does this paper intend to challenge any existing robust image steganography approach. They have strongly promoted steganography field development. Our goal is to show the observation that the existing measurement standard is restricting the robust image steganography to some extent. This paper only draws the hook out. Further improvement on measurement is likely possible to promote robust image steganography closer to reality faster by doing the next work. (1) The definition of antiDetection and Applicability needs to be more specific and more operable. (2) Simple and effective methods to judge the unidentifiability of stego images and processed images are to be proposed.

Data Availability

The proposed scheme data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work was partly supported by the National Natural Science Foundation of China (no. U1736214, U1804263, and 62172435), the National Science Foundation for Young Scientists of China (no. 62002387), and Zhongyuan Science and Technology Innovation Leading Talent Project of China (no. 214200510019).