Skip to main content

Improved Uniform Embedding for Efficient JPEG Steganography

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10039))

Abstract

With the wide application of the minimal distortion embedding framework, a well-designed distortion function is of vital importance. In this paper, we propose an improved distortion function for the generalized uniform embedding strategy, called improved UERD (IUERD). Although the UERD has made great success, there still exists room for improvement in designing the distortion function. As a result, the mutual correlations among DCT blocks are utilized more efficiently in the proposed distortion function, which leads to less statistical detectability. The effectiveness of the proposed IUERD is verified with the state-of-the-art steganalyzer - JRM on the BOSSbase database. Compared with prior arts, the proposed scheme gains favorable performance in terms of secure embedding capacity against steganalysis.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)

    Article  Google Scholar 

  2. Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507–518 (2015)

    Article  Google Scholar 

  3. Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75(4), 1947–1962 (2016)

    Article  Google Scholar 

  4. Westfeld, A.: F5 – a steganographic algorithm. In: Proceedings of the 4th Information Hiding Conference, vol. 2137, pp. 289–302 (2011). http://wwwrn.inf.tu-dresden.de/_westfeld/f5.html

    Google Scholar 

  5. Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)

    Article  Google Scholar 

  6. Kim, Y.H., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314–327. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  7. Sachnev, V., Kim, H.J., Zhang, R.: Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, pp. 131–140 (2009)

    Google Scholar 

  8. Guo, L., Ni, J., Shi, Y.Q.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814–825 (2014)

    Article  Google Scholar 

  9. Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014, 1–13 (2014)

    Article  Google Scholar 

  10. Guo, L., Ni, J., Su, W., Tang, C., Shi, Y.Q.: Using statistical image model for JPEG steganography: uniform embedding revisited. IEEE Trans. Inf. Forensics Secur. 10(12), 2669–2680 (2015)

    Article  Google Scholar 

  11. Freedman, D.A.: Statistical Models: Theory and Practice. Cambridge University Press, Cambridge (2009)

    Book  MATH  Google Scholar 

  12. Bas, P., Filler, T., Pevný, T.: Break our steganographic system: the ins and outs of organizing BOSS. In: Proceedings of the 13th International Workshop on Information Hiding, pp. 59–70 (2011). http://www.agents.cz/boss/

    Google Scholar 

  13. Kodovský, J., Fridrich, J.: Steganalysis of JPEG images using rich models. In: Proceedings of SPIE, vol. 8303, p. 83030A, February 2012

    Google Scholar 

  14. Kodovský, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2012)

    Article  Google Scholar 

Download references

Acknowledgements

The authors appreciate the supports received from National Natural Science Foundation of China (No. 61379156 and 60970145), the National Research Foundation for the Doctoral Program of Higher Education of China (No. 20120171110037) and the Key Program of Natural Science Foundation of Guangdong (No. S2012020011114).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiangqun Ni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Pan, Y., Ni, J., Su, W. (2016). Improved Uniform Embedding for Efficient JPEG Steganography. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48671-0_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48670-3

  • Online ISBN: 978-3-319-48671-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics