Abstract
Digital image steganography is now one of the effective methods for exchanging confidential information over the public network. One of the major challenges is to protect secret data embedded in to image against JPEG compression. This paper introduces a new method for image steganography which immune to JPEG compression with 100% retrieval rate of secret information up to 8192 bits payload with maintaining good Imperceptibility. The proposed algorithm is developed using DC coefficients of Discrete Cosine Transform (DCT) technique that resistant against lossy JPEG compression attack. The proposed algorithm can belong to the image realization steganography in which instead of actually embedding secret information directly to the cover image, key is derived with the combination of secret message and cover image and then the key is embed in the MSBs of the DC values in the selected blocks of DCT. The simulation test environment is used to perform a number of experiments on a standard dataset and to compare results with existing research. Standard parameters such as PSNR, Payload, BPP, SSIM and NCC are considered to evaluate the performance of the proposed algorithm. Efficiency of proposed work has been corroborated by conducting different experiments on various types of other attacks as well. Our proposed algorithm is surviving under JPEG compression attack for any quality factor range from 10 to 90.
Similar content being viewed by others
Abbreviations
- C.I:
-
Cover image
- S.M.:
-
Secret image
- S.I.:
-
Stego image
- DCT:
-
Discrete cosine transform
- Q.F.:
-
Quality factor
- DC:
-
Direct current
- AC:
-
Alternate current
- C.S.I:
-
Compressed stego image
- PSNR:
-
Peak signal to noise ratio
- BER:
-
Bits error rate
- SSIM:
-
Structure similarity index
- NCC:
-
Normalized cross correlation
References
Abdullah W et al (2016) A review on steganography techniques. Am Sci Res J Eng Technol Sci (ASRJETS) 24(1):131–150
Amar B et al (2018) A new robust and blind image watermarking scheme in frequency domain based on optimal blocks selection. In: Computer Science Research Notes, Short Papers Proceedings: 78–86
Bairagi A et al (2014) A robust RGB channel based image steganography technique using a secret key. In: 16th Int'l Conf. Computer and Information Technology, IEEE, Bangladesh 81–87
Benoraira A et al (2015) Blind image watermarking technique based on differential embedding in DWT and DCT domains. EURASIP J Adv Signal Process Springer Open J 1–11
Bhatnagar G, Raman B (2009) A new robust reference watermarking scheme based on DWT-SVD. Comput Stand Interfaces 31(5):1002–1013
Cabeen K, Gent P “Image Compression and Discrete Cosine Transform,” College of Redwoods. http://online.redwoods.cc.ca.us/instruct/darnold/LAPROJ/Fall98/PKen/dct.pdf
Chen B et al (2020) High-capacity robust image steganography via adversarial network. KSII Trans Internet Inf Syst 14(1):366–381
ChoiandI Y (1999) Digital watermarking using inter block correlation. In: Proceedings of the International Conference on Image Processing 2:216–220
Ernawan F et al (2017) A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection. In: The 12th International Conference for Internet Technology and Secured Transactions (ICITST-2017), IEEE, 92–97
Ferda M et al (2018) A Robust Image Watermarking Technique With an Optimal DCT-Psychovisual Threshold. IEEE Access 6:20464–20480
Imageprocessingplace.com, ‘standard image dataset’, 2018. [Online]. Available: http://www.imageprocessingplace.com/root_files_V3/image_databases.html. Accessed from 28 Jul 2018
Jagadeesh B (2016) A novel approach to robust digital image watermarking algorithms using artificial intelligence techniques, Jawaharlal Nehru Technological University, Anantapuram. http://hdl.handle.net/10603/175659
Kang X et al (2017) A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength. CrossMark-Springer Science+Business Media, Multimedia Tools Application, Springer, New York
Lai C (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284(4):938–944
Mokhnache S et al (2018) A robust watermarking scheme based on DWT and DCT using image gradient. Int J Appl Eng Res 13(4):1900–1907
Nagalinga R (2015) Robust Digital Image Steganographic Schemes, Manonmaniam Sundaranar University http://shodhganga.inflibnet.ac.in
Nair K et al (2015) Implementing semi-blind image steganography with improved concealment. Int J Comput Appl 975:8887
Pal A et al (2019) A steganography scheme on JPEG compressed cover image with high embedding capacity. Int Arab J Inf Technol 16(1):116–124
Paunwala M, Patnaik S (2012) DCT Watermarking Approach for Security Enhancement of Multimodal System, Research Article , International Scholarly Research Network, ISRN Signal Processing 1–11
Rachmawanto E et al (2017) Secure image steganography algorithm based on DCT with OTP encryption. J Appl Intell Syst 2(1):1–11
Rawat S, Raman B (2012) Best tree wavelet packet transform based copyright protection scheme for digital images. Opt Commun 285(10):2563–2574
Sari C et al (2017) Robust and imperceptible image watermarking by DC coefficients using singular value decomposition. Proc EECSI Yogyak Indones IEEE 19(21):187–191
Setia A et al (2017) An improved secure image hiding technique using PN-sequence based on DCT-OTP. In: 1st International Conference on Informatics and Computational Sciences 47–52
Singh S (2014) Transform Domain Techniques for Image Steganography. University of Allahabad, Allahabad. http://shodhganga.inflibnet.ac.in
Singh S, Siddiqui TJ, Singh HV (2011) DCT based digital data hiding in image cover. Int J Syst Simul 5(1):45–49
Sipi.usc.edu, ‘standard image dataset’, 2018. [Online]. Available: http://sipi.usc.edu/database/database.php?volume=misc. Accessed from 28 Jul 2018
Sleit A et al (2012) An enhanced semi-blind DWT-SVD-based watermarking technique for digital images. Imaging Sci J 60:29–37
Wang Y, Pearmain A (2004) Blind image data hiding based on self reference. Pattern Recogn Lett 25(15):1681–1689
Yesilyurt M (2013) A new DCT based watermarking method using luminance component. Elektron IR Elektrotechn 19(4):47–52
Zhang Y et al (2015) A JPEG-compression resistant adaptive steganography based on relative relationship between DCT coefficients. In: 10th International Conference on Availability, Reliability and Security 461–466
Zhang Y et al (2016) A framework of adaptive steganography resisting JPEG compression and detection. Security and Communication Networks-special issue paper. Wiley, Hoboken
Zheng Y-P et al (2017) A watermarking algorithm based on DCT and JPEG quantization table. In: ITM web of conferences. Open access article, ITA-2017-China: 1–5
Zhu Z et al (2019) Robust steganography by modifying sign of DCT coefficients. https://doi.org/10.1109/ACCESS.2019.2953504,IEEE Access 1–16
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mehta, D., Bhatti, D. Blind image steganography algorithm development which resistant against JPEG compression attack. Multimed Tools Appl 81, 459–479 (2022). https://doi.org/10.1007/s11042-021-11351-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11351-8