3.1. IIF (Incremental Information Function)
The definition of the Incremental Information Function (IIF) is inspired by the concept of the Bit Error Rate (BER), which measures the ratio of incorrectly encoded bits to the total number of encoded bits in a message [
17]. A lower BER indicates less information loss in the encoded message and higher robustness. In contrast, for the IIF, a higher function value signifies a greater amount of information decoded from the steganogram.
Let us first define the auxiliary function
(see Equation 15), which assigns to a given steganogram
and message
the relative number of occurrences of decoded bits with the value
that had the value
in the original message
.
where:
– number of bits in the message
(message length),
– the value of bit in original message ,
– the value of bit in decoded message ,
– the steganogram created by function by encoding message in cover ,
– the -th bit of message ,
– number of -bites in message ( or ,
– the decoding function,
– the message to be encoded by function in cover – number of decoding steps.
Let us define the
function (see Equation 16) as a weighted sum of the functions
and
, where the weights are proportional to the number of bits with values 0 and 1 in the original message
. This corresponds to the proportion of all correctly decoded bits in the message
.
where:
– number of bits in the message
(message length),
– number of encoding steps,
– the decoding function,
– the message to be decoded by function in steganogram ,
– number of zero-bites in message ,
– number of one-bites in message ,
– the -th bit of message ,
– the steganogram created by function by encoding message in cover .
In Equation 16, which defines the IIF function, it is also possible to incorporate different weights, particularly in scenarios where the steganographic method differentiates between zero and one bits in its processing. In a hypothetical case where zero bits are much less important than one bits, the weight for the function may not be proportional to but could instead be, for example, 1/10 of the weight for the function . In other specific steganographic techniques, it is also feasible to include the values of the functions and in the definition of the function, serving as "penalties" for errors made in training the decoding algorithm (keeping in mind that and
3.3. Characteristic Values
We define the characteristic value as the smallest value of the function for which the amount of information read from the steganogram is sufficient to decode the message . Depending on the steganographic technique used, particularly on the implementation of the decoding algorithm, the characteristic value ranges between 0.7 and 1.0. The level of is a feature that strongly characterizes a specific steganographic technique.
Conversely, we define the characteristic value
as the first iteration for which the
function reaches the characteristic value
(see Eq. 17).
where:
– the steganogram created by encoding message
,
– the message to be encoded in the steganogram ,
– minimal value of enough to decode message from steganogram ,
– the first iteration when reach value of .
The characteristic value can be used as an indicator of the robustness of a given steganographic technique and the steganogram itself. The lower the value of , the less decoded information is needed to uncover the hidden message, which means that greater distortions or transformations of the steganogram can be tolerated.
On the other hand, the characteristic value can be used as an indicator of the steganogram's capacity. The lower the value of , the faster the hidden message is decoded, requiring fewer iterations. In the case of iterative steganography, this implies higher capacity, meaning the ability to encode and decode more bits of information in a shorter time.