Abstract
In this paper, we propose a steganographic method which is conducted on the quantized discrete cosine transform (DCT) coefficients of YUV. Three coefficients at the same frequency in YUV components are selected respectively to compose a triplet as the message carrier, then decide the embedding capacity in each triplet according to the property of the triplet. The modulus 2 or modulus 4 arithmetic operations are applied to the valid triplet to embed 1 bit or 2bits secret messages. When modification is required for data embedding, the random number is produced to decide the flipping direction and the improved shortest route modification scheme (SRM) is applied to reduce distortion. To compare with other existing methods, the proposed method has high embedding capacity while approximately preserving the histogram of quantized DCT coefficients, and the spatial blockiness of stego image has no obvious changes, so the method can resist against histogram-based and blockiness-based steganalysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Noda, H., Niimi, M., Kawaguchi, E.: High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognition Letters 27(5), 455–461 (2006)
Upham, D.: (1997), http://ftp.funet.fi/pub/crypt/cypherpunks/steganography/jsteg/
Westfeld, A.: F5-A steganographic algorithm: high capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Provos, N.: Defending against statistical steganalysis. In: Proceedings of the 10th USENIX Security Symposium, pp. 323–336 (2001)
Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics 5(1), 167–190 (2005)
Wong, K., Qi, X., Tanaka, K.: A DCT-Based Mod4 Steganographic Method. Signal Processing 87, 1251–1263 (2007)
Solanki, K., Sarkar, A., Manjunath, B.S.: YASS:Yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16–31. Springer, Heidelberg (2008)
Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)
Pevny, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proc. of SPIE, San Jose, CA (2007)
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)
Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and gray-scale images. IEEE Multimedia 8(4), 22–28 (2001)
Petitcolas, F., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 219–239. Springer, Heidelberg (1998), http://www.cl.cam.ac.uk/~fapp2/papers/ih98-attacks/
Fridrich, J., Goljan, M., Hogea, D.: Attacking the OutGuess. In: Proceedings ACM Workshop on Multimedia and Security 2002, France, pp. 3–6 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, T., Zhao, Y., Ni, R., Yu, L. (2009). A High Capacity Steganographic Algorithm in Color Images. In: Kim, HJ., Katzenbeisser, S., Ho, A.T.S. (eds) Digital Watermarking. IWDW 2008. Lecture Notes in Computer Science, vol 5450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04438-0_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-04438-0_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04437-3
Online ISBN: 978-3-642-04438-0
eBook Packages: Computer ScienceComputer Science (R0)