Skip to main content
Log in

Framework for improving the security performance of ordinary distortion functions of JPEG steganography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Digital steganography is a new approach for secure communication. Via using it, the sender and the receiver can easily exchange secret message on the Internet without arousing any suspicion. Previously, a lot of ordinary distortion functions for joint photographic experts group (JPEG) steganography have been presented, which can guide the message embedding in the non-zero alternating current (AC) discrete cosine transform (DCT) coefficients of JPEG image. In this paper, we present a framework for improving the security performance of these distortion functions. In our new framework, these ordinary distortion functions are not restricted to evaluating the distortion values of non-zero AC DCT coefficients any more, and their coverage areas will be extended to all DCT coefficients, including the direct current (DC) coefficients and all the zero and non-zero AC coefficients. All the coefficients in JPEG image are divided into two groups: changeable group (CG) and reserve group (RG), respectively. The coefficients that may result in less detectable distortion are grouped into CG and the rest into RG. Via associating the distortion values to coefficients in CG and RG with different strategies, a series of new advanced distortion functions can be generated. The experimental results demonstrate that while applying these advanced distortion functions to JPEG steganography, the statistical characteristics of the carrier image will be preserved better than the prior art, and consequently secure JPEG steganographic schemes can easily be obtained.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007

    Article  Google Scholar 

  2. Filler T, Judas J, Fridrich J (2010) Minimizing additive distortion in steganography using Syndrome-Trellis Codes. IEEE Trans Inform Forensic Secur 6(3):920–935

    Article  Google Scholar 

  3. Filler T, Pevny T, and Bas P (2010) BOSS (Break Our Steganography System). http://www.agents.cz/boss, July 2010

  4. Fridrich J, Goljan M, and Soukal D (2004) Perturbed quantization steganography with wet paper codes, In Proceedings of the ACM Workshop on Multimedia & Security, Magdeburg, Germany, September 20–21, pp. 4–15.

  5. Fridrich J, Soukal D (2006) Matrix embedding for large payloads. IEEE Trans Inform Forensic Secur 1(3):390–395

    Article  Google Scholar 

  6. Fridrich J, Lisoněk P, Soukal D (2007) On Steganographic embedding efficiency. In Proceedings of 8th Information Hiding Workshop. Lect Notes Comput Sci 4437:282–296

    Article  Google Scholar 

  7. Fridrich J, Pevný T, and Kodovský J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In Proceedings of the ACM Workshop on Multimedia and Security, Dallas, Texas, September 20–21, pp. 3–14.

  8. Holub V and Fridrich J (2012) Designing steganographic distortion using directional filters. In Proceedings of 4th IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, December 2–5.

  9. Holub V and Fridrich J (2013) Digital image steganography using universal distortion. In Proceedings of 1th ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, June 17–19.

  10. Horng S.-J, Farfoura ME, Fan P, Wang X, Li T and Guo J.-M (2013) A low cost fragile watermarking scheme in H.264/AVC compressed domain. Multimedia Tools and Applications: 1–27.

  11. Huang H-C, Pan J-S, Huang Y-H, Wang F-H, Huang K-C (2007) Progressive Watermarking Techniques Using Genetic Algorithms. Circ Syst Sig Process 26(5):671–687

    Article  MATH  Google Scholar 

  12. Huang F, Shi YQ, Huang J (2010) New JPEG steganographic scheme with high security performance. In Proceedings of 9th International Workshop on Digital Watermarking. Lect Notes Comput Sci 6526:189–201

    Article  Google Scholar 

  13. Huang F, Huang J, Shi YQ (2012) New channel selection rule for JPEG steganography. IEEE Trans Inform Forensic Secur 7(4):1181–1191

    Article  Google Scholar 

  14. Huang F, Luo W, Huang J, and Shi YQ (2013) Distortion function designing for JPEG steganography with uncompressed side-image. In Proceedings of 1th ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, June 17–19.

  15. Huang F, Kim HJ, and Zhang D (2013) Efficiency of Frequency Selection in JPEG Steganography. In Proceedings of 3th International Conference on Multimedia Technology, Guangzhou, China, Nov. 29 - Dec. 1.

  16. Ker AD (2007) A fusion of maximal likelihood and structural steganalysis. In Proceedings of 9th Information Hiding Workshop. Lect Notes Comput Sci 4567:204–219

    Article  Google Scholar 

  17. Ker AD (2008) Locating steganographic payload via WS residuals. In Proceedings of 10th ACM Workshop on Multimedia and Security, Oxford, UK. Sep. 22–23, pp. 27–32.

  18. Ker AD, Bas P, Böhme R, Cogranne R, Craver S, Filler T, Fridrich J and Pevný T (2013) Moving steganography and steganalysis from the laboratory into the real world. In Proceedings of 1th ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, June 17–19.

  19. Kim Y, Duric Z, Richards D (2007) Modified matrix encoding technique for minimal distortion steganography. In Proceedings of 8th Information Hiding Workshop. Lect Notes Comput Sci 4437:314–327

    Article  Google Scholar 

  20. Kodovský J, and Fridrich J (2009) Calibration revisited. In Proceedings of the ACM Multimedia & Security Workshop, Princeton, New Jersey, September 7–9, pp. 63–74.

  21. Kodovský J, Pevný T, and Fridrich J (2010) Modern steganalysis can detect YASS. In Proceedings of SPIE, Electronic Imaging, Security Forensics of Multimedia XII, San Jose, California, Jan. 17–21, vol. 7541, pp. 0201–0211

  22. Kodovský J, Fridrich J, Holub V (2012) Ensemble calssifiers for steganalysis of digital media. IEEE Trans Inform Forensic Secur 2(7):432–444

    Article  Google Scholar 

  23. Kodovský J, Fridrich J (2012) Steganalysis of JPEG images using rich models. In Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, vol. 8303, San Francisco, CA, January 22–26, pp. 0A 1–13.

  24. Li F, Zhang X, Chen B, Feng G (2013) JPEG steganalysis with high-dimensional features and Bayesian ensemble classifier. IEEE Sig Process Lett 20(3):233–236

    Article  Google Scholar 

  25. Liu Q, Sung A, Qiao M (2011) Neighboring joint density-based JPEG Steganalysis. ACM Trans Intell Syst Technol 2(2):1–16

    Article  Google Scholar 

  26. Moon TK (2005) (2005) Error Correction Coding, Mathematical Methods and Algorithms. Wiley, Hoboken

    Book  Google Scholar 

  27. Patsakis C, Aroukatos N (2014) LSB and DCT Steganographic Detection Using Compressive Sensing. J Inf Hiding Multimedia Sig Process 5(1):20–32

    Google Scholar 

  28. Pevný T, and Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis. In Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, California, Jan. 28 - Feb. 1, vol. 6505, pp. 03.1-03.13

  29. Pevný T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inform Forensic Secur 52(2):215–224

    Article  Google Scholar 

  30. Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In Proceedings of 12th Information Hiding Workshop. Lect Notes Comput Sci 6387:161–177

    Article  Google Scholar 

  31. Sachnev V, Kim HJ, and Zhang R (2009) Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In Proceedings of the ACM Workshop on Multimedia & Security, Princeton, New Jersey, Sep. 7–9, pp. 131–140.

  32. Sachnev V, Kim HJ (2012) Modified BCH data hiding scheme for JPEG steganography. EURASIP J Adv Signal Process 2012:89–98

    Article  Google Scholar 

  33. Sallee P (2005) Model based methods for steganography and steganalysis. Int J Image Graph 5(1):167–190

    Article  Google Scholar 

  34. Solanki K, Sarkar A, Manjunath BS (2007) YASS: Yet another steganographic scheme that resists blind steganalysis. In Proceedings of 9th Information Hiding Workshop. Lect Notes Comput Sci 4567:16–31

    Article  Google Scholar 

  35. Shi YQ, Chen C, Chen W (2007) A Markov process based approach to effective attacking JPEG steganography. In Proceedings of 8th International Workshop on Information Hiding. Lect Notes Comput Sci 4437:249–264

    Article  Google Scholar 

  36. Wang C, Ni J (2012) An efficient JPEG steganographic scheme based on block-entropy of DCT coefficients. In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Kyoto, Japan, Mar. 25–30, pp. 1785–1788.

  37. Westfeld A (2001) High capacity despite better steganalysis (F5-a steganographic algorithm). In Proceedings of 4th Information Hiding Workshop. Lect Notes Comput Sci 2137:289–302

    Article  Google Scholar 

  38. Xuan G, Shi YQ, Gao J, Zou D, Yang C, Zhang Z, Chai P, Chen CH, Chen W (2005) Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In Proceedings of 7th Information Hiding Workshop. Lect Notes Comput Sci 3727:262–277

    Article  Google Scholar 

  39. Zhang R, Sachnev V, Kim HJ (2009) Fast BCH syndrome coding for steganography. In Proceedings of 11th Information Hiding Workshop. Lect Notes Comput Sci 5806:48–58

    Article  Google Scholar 

Download references

Acknowledgements

This work was partially supported by the National Natural Science Foundation of China (61173147), the Korea Foundation for Advanced Studies' International Scholar Exchange Fellowship for the academic year of 2013-2014, the Fundamental Research Funds for Central Universities (12lgpy31), and the Project Sponsored by the Scientific Research Foundation for the Returned Overseas Chinese Scholars, State Education Ministry ([2012]1707).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hyoung Joong Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, F., Kim, H.J. Framework for improving the security performance of ordinary distortion functions of JPEG steganography. Multimed Tools Appl 75, 281–296 (2016). https://doi.org/10.1007/s11042-014-2291-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2291-9

Keywords

Navigation