Abstract
Digital steganography is a new approach for secure communication. Via using it, the sender and the receiver can easily exchange secret message on the Internet without arousing any suspicion. Previously, a lot of ordinary distortion functions for joint photographic experts group (JPEG) steganography have been presented, which can guide the message embedding in the non-zero alternating current (AC) discrete cosine transform (DCT) coefficients of JPEG image. In this paper, we present a framework for improving the security performance of these distortion functions. In our new framework, these ordinary distortion functions are not restricted to evaluating the distortion values of non-zero AC DCT coefficients any more, and their coverage areas will be extended to all DCT coefficients, including the direct current (DC) coefficients and all the zero and non-zero AC coefficients. All the coefficients in JPEG image are divided into two groups: changeable group (CG) and reserve group (RG), respectively. The coefficients that may result in less detectable distortion are grouped into CG and the rest into RG. Via associating the distortion values to coefficients in CG and RG with different strategies, a series of new advanced distortion functions can be generated. The experimental results demonstrate that while applying these advanced distortion functions to JPEG steganography, the statistical characteristics of the carrier image will be preserved better than the prior art, and consequently secure JPEG steganographic schemes can easily be obtained.
Similar content being viewed by others
References
Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007
Filler T, Judas J, Fridrich J (2010) Minimizing additive distortion in steganography using Syndrome-Trellis Codes. IEEE Trans Inform Forensic Secur 6(3):920–935
Filler T, Pevny T, and Bas P (2010) BOSS (Break Our Steganography System). http://www.agents.cz/boss, July 2010
Fridrich J, Goljan M, and Soukal D (2004) Perturbed quantization steganography with wet paper codes, In Proceedings of the ACM Workshop on Multimedia & Security, Magdeburg, Germany, September 20–21, pp. 4–15.
Fridrich J, Soukal D (2006) Matrix embedding for large payloads. IEEE Trans Inform Forensic Secur 1(3):390–395
Fridrich J, Lisoněk P, Soukal D (2007) On Steganographic embedding efficiency. In Proceedings of 8th Information Hiding Workshop. Lect Notes Comput Sci 4437:282–296
Fridrich J, Pevný T, and Kodovský J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In Proceedings of the ACM Workshop on Multimedia and Security, Dallas, Texas, September 20–21, pp. 3–14.
Holub V and Fridrich J (2012) Designing steganographic distortion using directional filters. In Proceedings of 4th IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, December 2–5.
Holub V and Fridrich J (2013) Digital image steganography using universal distortion. In Proceedings of 1th ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, June 17–19.
Horng S.-J, Farfoura ME, Fan P, Wang X, Li T and Guo J.-M (2013) A low cost fragile watermarking scheme in H.264/AVC compressed domain. Multimedia Tools and Applications: 1–27.
Huang H-C, Pan J-S, Huang Y-H, Wang F-H, Huang K-C (2007) Progressive Watermarking Techniques Using Genetic Algorithms. Circ Syst Sig Process 26(5):671–687
Huang F, Shi YQ, Huang J (2010) New JPEG steganographic scheme with high security performance. In Proceedings of 9th International Workshop on Digital Watermarking. Lect Notes Comput Sci 6526:189–201
Huang F, Huang J, Shi YQ (2012) New channel selection rule for JPEG steganography. IEEE Trans Inform Forensic Secur 7(4):1181–1191
Huang F, Luo W, Huang J, and Shi YQ (2013) Distortion function designing for JPEG steganography with uncompressed side-image. In Proceedings of 1th ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, June 17–19.
Huang F, Kim HJ, and Zhang D (2013) Efficiency of Frequency Selection in JPEG Steganography. In Proceedings of 3th International Conference on Multimedia Technology, Guangzhou, China, Nov. 29 - Dec. 1.
Ker AD (2007) A fusion of maximal likelihood and structural steganalysis. In Proceedings of 9th Information Hiding Workshop. Lect Notes Comput Sci 4567:204–219
Ker AD (2008) Locating steganographic payload via WS residuals. In Proceedings of 10th ACM Workshop on Multimedia and Security, Oxford, UK. Sep. 22–23, pp. 27–32.
Ker AD, Bas P, Böhme R, Cogranne R, Craver S, Filler T, Fridrich J and Pevný T (2013) Moving steganography and steganalysis from the laboratory into the real world. In Proceedings of 1th ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, June 17–19.
Kim Y, Duric Z, Richards D (2007) Modified matrix encoding technique for minimal distortion steganography. In Proceedings of 8th Information Hiding Workshop. Lect Notes Comput Sci 4437:314–327
Kodovský J, and Fridrich J (2009) Calibration revisited. In Proceedings of the ACM Multimedia & Security Workshop, Princeton, New Jersey, September 7–9, pp. 63–74.
Kodovský J, Pevný T, and Fridrich J (2010) Modern steganalysis can detect YASS. In Proceedings of SPIE, Electronic Imaging, Security Forensics of Multimedia XII, San Jose, California, Jan. 17–21, vol. 7541, pp. 0201–0211
Kodovský J, Fridrich J, Holub V (2012) Ensemble calssifiers for steganalysis of digital media. IEEE Trans Inform Forensic Secur 2(7):432–444
Kodovský J, Fridrich J (2012) Steganalysis of JPEG images using rich models. In Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, vol. 8303, San Francisco, CA, January 22–26, pp. 0A 1–13.
Li F, Zhang X, Chen B, Feng G (2013) JPEG steganalysis with high-dimensional features and Bayesian ensemble classifier. IEEE Sig Process Lett 20(3):233–236
Liu Q, Sung A, Qiao M (2011) Neighboring joint density-based JPEG Steganalysis. ACM Trans Intell Syst Technol 2(2):1–16
Moon TK (2005) (2005) Error Correction Coding, Mathematical Methods and Algorithms. Wiley, Hoboken
Patsakis C, Aroukatos N (2014) LSB and DCT Steganographic Detection Using Compressive Sensing. J Inf Hiding Multimedia Sig Process 5(1):20–32
Pevný T, and Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis. In Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, California, Jan. 28 - Feb. 1, vol. 6505, pp. 03.1-03.13
Pevný T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inform Forensic Secur 52(2):215–224
Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In Proceedings of 12th Information Hiding Workshop. Lect Notes Comput Sci 6387:161–177
Sachnev V, Kim HJ, and Zhang R (2009) Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In Proceedings of the ACM Workshop on Multimedia & Security, Princeton, New Jersey, Sep. 7–9, pp. 131–140.
Sachnev V, Kim HJ (2012) Modified BCH data hiding scheme for JPEG steganography. EURASIP J Adv Signal Process 2012:89–98
Sallee P (2005) Model based methods for steganography and steganalysis. Int J Image Graph 5(1):167–190
Solanki K, Sarkar A, Manjunath BS (2007) YASS: Yet another steganographic scheme that resists blind steganalysis. In Proceedings of 9th Information Hiding Workshop. Lect Notes Comput Sci 4567:16–31
Shi YQ, Chen C, Chen W (2007) A Markov process based approach to effective attacking JPEG steganography. In Proceedings of 8th International Workshop on Information Hiding. Lect Notes Comput Sci 4437:249–264
Wang C, Ni J (2012) An efficient JPEG steganographic scheme based on block-entropy of DCT coefficients. In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Kyoto, Japan, Mar. 25–30, pp. 1785–1788.
Westfeld A (2001) High capacity despite better steganalysis (F5-a steganographic algorithm). In Proceedings of 4th Information Hiding Workshop. Lect Notes Comput Sci 2137:289–302
Xuan G, Shi YQ, Gao J, Zou D, Yang C, Zhang Z, Chai P, Chen CH, Chen W (2005) Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In Proceedings of 7th Information Hiding Workshop. Lect Notes Comput Sci 3727:262–277
Zhang R, Sachnev V, Kim HJ (2009) Fast BCH syndrome coding for steganography. In Proceedings of 11th Information Hiding Workshop. Lect Notes Comput Sci 5806:48–58
Acknowledgements
This work was partially supported by the National Natural Science Foundation of China (61173147), the Korea Foundation for Advanced Studies' International Scholar Exchange Fellowship for the academic year of 2013-2014, the Fundamental Research Funds for Central Universities (12lgpy31), and the Project Sponsored by the Scientific Research Foundation for the Returned Overseas Chinese Scholars, State Education Ministry ([2012]1707).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Huang, F., Kim, H.J. Framework for improving the security performance of ordinary distortion functions of JPEG steganography. Multimed Tools Appl 75, 281–296 (2016). https://doi.org/10.1007/s11042-014-2291-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-2291-9