Abstract
In this paper, we present a new JPEG steganographic scheme. Three measures are taken in our method: 1) The secret message bits are not spread into the quantized block discrete cosine transform (BDCT) coefficients of all frequencies, and only those coefficients (including those of value 0) belonging to relatively low frequencies are selected for data embedding; 2) For any coefficients selected for embedding, the rounding error in JPEG quantization is utilized directly to guide the data embedding; 3) Matrix embedding. The experiments have demonstrated that these three measures can help to achieve small distortion in spatial domain, preserve the histogram of quantized block discrete cosine transform coefficients, and enhance the embedding efficiency of matrix embedding, etc. Consequently, the proposed steganographic scheme has achieved a high security performance. It can resist today’s most powerful JPEG steganalyzers effectively.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
JP Hide & Seek, http://linux01.gwdg.de/~alatham/stego.html
Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington DC, USA (2001)
Westfeld, A.: High capacity despite better steganalysis (F5-a steganographic algorithm). In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Sallee, P.: Model based methods for steganography and steganalysis. International Journal of Image Graphics 5(1), 167–190 (2005)
Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography with wet paper codes. In: Proc. the ACM Workshop on Multimedia and Security, Magdeburg, Germany, September 20-21, pp. 4–15 (2004)
Kim, Y., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314–327. Springer, Heidelberg (2007)
Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16–31. Springer, Heidelberg (2008)
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–75. Springer, Heidelberg (2000)
Provos, N., Honeyman, P.: Detecting steganographic content on the Internet. CITI Technical Report 01-11 (August 2001)
Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. In: IEEE Security and Privacy, May/June, pp. 32–44 (2003)
Fridrich, J., Goljan, M., Du, R.: Attacking the OutGuess. In: Proc. the ACM Workshop on Multimedia and Security, Juan-les-Pins, France, December 6, pp. 3–6 (2002)
Böhme, R., Westfeld, A.: Breaking Cauchy model-based JPEG steganography with first order statistics. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 125–140. Springer, Heidelberg (2004)
Crandall, R.: Some notes on steganography. Steganography Mailing List (1998), http://os.inf.tu-dresden.de/westfeld/crandall.pdf
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)
Fridrich, J., Pevny, T., Kodovsky, J.: Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities. In: Proc. the ACM Workshop on Multimedia and Security, Dallas, TX, September 20-21, pp. 3–14 (2007)
Pevny, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, vol. 6505, pp. 650503.1–650503.13 (2007)
Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)
Fu, D., Shi, Y.Q., Zou, D., Xuan, G.: JPEG steganalysis using empirical transition matrix in blick DCT domain. In: Proc. IEEE International Workshop on Multimedia Signal Processing, Victoria, BC, Canada (2006)
Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)
Chen, C., Shi, Y.Q.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Proc. IEEE International Symposium on Circuits and Systems, Seattle, WA, May 18-21 (2008)
Huang, F., Li, B., Huang, J.: Universal JPEG steganalysis based on microscopic and macroscopic calibration. In: Proc. IEEE International Conference on Image Processing, San Diego, California, U.S.A, October 12-15 (2008)
Huang, F., Huang, J.: Calibration based JPEG steganalysis. Science in China Series F: Information Sciences 52(2), 260–268 (2009)
Huang, F., Shi, Y.Q., Huang, J.: A study on the security performance of YASS. In: Proc. IEEE International Conference on Image Processing, San Diego, California, U.S.A, October 12-15 (2008)
Huang, F., Huang, J., Shi, Y.Q.: An experimental study on the security performance of YASS. IEEE Trans. Informaiton Forensics and Security 5(3), 374–380 (2010)
Li, B., Huang, J., Shi, Y.Q.: Steganalysis of YASS. IEEE Trans. Information Forensics and Security 4(3), 369–382 (2009)
Moon, T.K.: Error correction coding. Mathematical methods and algorithms. John Wiley & Sons, Inc., Hoboken (2005)
NRCS Photo Gallery, http://photogallery.nrcs.usda.gov
CorelDraw Image CD, http://www.corel.com
Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, F., Shi, Y.Q., Huang, J. (2011). New JPEG Steganographic Scheme with High Security Performance. In: Kim, HJ., Shi, Y.Q., Barni, M. (eds) Digital Watermarking. IWDW 2010. Lecture Notes in Computer Science, vol 6526. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18405-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-18405-5_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-18404-8
Online ISBN: 978-3-642-18405-5
eBook Packages: Computer ScienceComputer Science (R0)