Abstract
In this paper we present a novel steganography method for JPEG images. The proposed data hiding technique bases on removing and inserting AC coefficients 1 or -1. The candidates for removing and inserting are searched among all non rounded AC coefficients after quantization. The proposed search technique flags the most appropriate coefficients, which provide less degradation after modification. The proposed data hiding technique based on the modification the flagged coefficients significantly decreases distortion after data hiding and, as result, shows the less detectability for steganalysis. The proposed method was tested with steganalysis method proposed by T. Pevny and J.Fridrich. The experimental results show that the proposed method has less detectability compared to the existed widely used steganography methods as F5 and OutGuess.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chandramouli, R., Kharrazi, M., Memon, N.D.: Image steganography and steganalysis: Concepts and practice. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 35–49. Springer, Heidelberg (2004)
Eggers, J., Bauml, R., Girod, B.: A communications approach to steganography. In: SPIE, Electronic Imaging, Security, and Watermarking of Multimedia Contents, San Jose, CA (2002)
Farid, H., Lyu, S.: Steganalysis using higher-order image statistics. IEEE Transactions on Information Forensics and Security, 111–119 (2006)
Farid, H., Siwei, L.: Detecting hidden messages using higher-order statistics and support vector machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340–354. Springer, Heidelberg (2003)
Fridrich, J.: Minimizing the embedding impact in steganography. In: Proceedings ACM Multimedia and Security Workshop, Geneva, Switzerland, pp. 2–10 (2006)
Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)
Fridrich, J., Filler, T.: Practical methods for minimizing embedding impact in steganography. In: Proceedings SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, vol. 6505, pp. 02–03 (2007)
Hetzl, S., Mutzel, P.: A graphtheoretic approach to steganography. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 119–128. Springer, Heidelberg (2005)
Lee, K., Westfeld, A.: Generalized category attackimproving histogram-based attack on JPEG LSB embedding. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 378–391. Springer, Heidelberg (2008)
Noda, H., Niimi, M., Kawaguchi, E.: Application of QIM with dead zone for histogram preserving JPEG steeganography. In: Processing ICIP, Genova, Italy (2005)
Pevny, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. SPIE (2007)
Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington, DC (2001)
Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)
Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image Graphics, 167–190 (2005)
Solanki, K., Sakar, A., Manjunath, B.S.: YASS: Yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16–31. Springer, Heidelberg (2008)
Westfeld, A.: High capacity despite better steganalysis (F5a steganographic algorithm). In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Xuan, G., Shi, Y.Q., Gao, J., Zou, D., Yang, C., Zhang, Z., Chai, P., Chen, C., Chen, W.: Steganalysis based on multiple features formed by statistical moments of wavelet characteristic function. In: Barni, M., Herrera-JoancomartÃ, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 262–277. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sachnev, V., Kim, H.J., Zhang, R., Choi, Y.S. (2009). A Novel Approach for JPEG Steganography. In: Kim, HJ., Katzenbeisser, S., Ho, A.T.S. (eds) Digital Watermarking. IWDW 2008. Lecture Notes in Computer Science, vol 5450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04438-0_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-04438-0_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04437-3
Online ISBN: 978-3-642-04438-0
eBook Packages: Computer ScienceComputer Science (R0)