Skip to main content
Log in

Blind image steganography algorithm development which resistant against JPEG compression attack

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Digital image steganography is now one of the effective methods for exchanging confidential information over the public network. One of the major challenges is to protect secret data embedded in to image against JPEG compression. This paper introduces a new method for image steganography which immune to JPEG compression with 100% retrieval rate of secret information up to 8192 bits payload with maintaining good Imperceptibility. The proposed algorithm is developed using DC coefficients of Discrete Cosine Transform (DCT) technique that resistant against lossy JPEG compression attack. The proposed algorithm can belong to the image realization steganography in which instead of actually embedding secret information directly to the cover image, key is derived with the combination of secret message and cover image and then the key is embed in the MSBs of the DC values in the selected blocks of DCT. The simulation test environment is used to perform a number of experiments on a standard dataset and to compare results with existing research. Standard parameters such as PSNR, Payload, BPP, SSIM and NCC are considered to evaluate the performance of the proposed algorithm. Efficiency of proposed work has been corroborated by conducting different experiments on various types of other attacks as well. Our proposed algorithm is surviving under JPEG compression attack for any quality factor range from 10 to 90.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Abbreviations

C.I:

Cover image

S.M.:

Secret image

S.I.:

Stego image

DCT:

Discrete cosine transform

Q.F.:

Quality factor

DC:

Direct current

AC:

Alternate current

C.S.I:

Compressed stego image

PSNR:

Peak signal to noise ratio

BER:

Bits error rate

SSIM:

Structure similarity index

NCC:

Normalized cross correlation

References

  1. Abdullah W et al (2016) A review on steganography techniques. Am Sci Res J Eng Technol Sci (ASRJETS) 24(1):131–150

    Google Scholar 

  2. Amar B et al (2018) A new robust and blind image watermarking scheme in frequency domain based on optimal blocks selection. In: Computer Science Research Notes, Short Papers Proceedings: 78–86

  3. Bairagi A et al (2014) A robust RGB channel based image steganography technique using a secret key. In: 16th Int'l Conf. Computer and Information Technology, IEEE, Bangladesh 81–87

  4. Benoraira A et al (2015) Blind image watermarking technique based on differential embedding in DWT and DCT domains. EURASIP J Adv Signal Process Springer Open J 1–11

  5. Bhatnagar G, Raman B (2009) A new robust reference watermarking scheme based on DWT-SVD. Comput Stand Interfaces 31(5):1002–1013

    Article  Google Scholar 

  6. Cabeen K, Gent P  “Image Compression and Discrete Cosine Transform,” College of Redwoods. http://online.redwoods.cc.ca.us/instruct/darnold/LAPROJ/Fall98/PKen/dct.pdf

  7. Chen B et al (2020) High-capacity robust image steganography via adversarial network. KSII Trans Internet Inf Syst 14(1):366–381

    Google Scholar 

  8. ChoiandI Y (1999) Digital watermarking using inter block correlation. In: Proceedings of the International Conference on Image Processing 2:216–220

  9. Ernawan F et al (2017) A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection. In: The 12th International Conference for Internet Technology and Secured Transactions (ICITST-2017), IEEE, 92–97

  10. Ferda M et al (2018) A Robust Image Watermarking Technique With an Optimal DCT-Psychovisual Threshold. IEEE Access 6:20464–20480

    Article  Google Scholar 

  11. Imageprocessingplace.com, ‘standard image dataset’, 2018. [Online]. Available: http://www.imageprocessingplace.com/root_files_V3/image_databases.html. Accessed from 28 Jul 2018

  12. Jagadeesh B (2016) A novel approach to robust digital image watermarking algorithms using artificial intelligence techniques, Jawaharlal Nehru Technological University, Anantapuram. http://hdl.handle.net/10603/175659

  13. Kang X et al (2017) A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength. CrossMark-Springer Science+Business Media, Multimedia Tools Application, Springer, New York

    Google Scholar 

  14. Lai C (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284(4):938–944

    Article  Google Scholar 

  15. Mokhnache S et al (2018) A robust watermarking scheme based on DWT and DCT using image gradient. Int J Appl Eng Res 13(4):1900–1907

    Google Scholar 

  16. Nagalinga R (2015) Robust Digital Image Steganographic Schemes, Manonmaniam Sundaranar University http://shodhganga.inflibnet.ac.in

  17. Nair K et al (2015) Implementing semi-blind image steganography with improved concealment. Int J Comput Appl 975:8887

    Google Scholar 

  18. Pal A et al (2019) A steganography scheme on JPEG compressed cover image with high embedding capacity. Int Arab J Inf Technol 16(1):116–124

    Google Scholar 

  19. Paunwala M, Patnaik S (2012) DCT Watermarking Approach for Security Enhancement of Multimodal System, Research Article , International Scholarly Research Network, ISRN Signal Processing 1–11

  20. Rachmawanto E et al (2017) Secure image steganography algorithm based on DCT with OTP encryption. J Appl Intell Syst 2(1):1–11

    Article  Google Scholar 

  21. Rawat S, Raman B (2012) Best tree wavelet packet transform based copyright protection scheme for digital images. Opt Commun 285(10):2563–2574

    Article  Google Scholar 

  22. Sari C et al (2017) Robust and imperceptible image watermarking by DC coefficients using singular value decomposition. Proc EECSI Yogyak Indones IEEE 19(21):187–191

    Google Scholar 

  23. Setia A et al (2017) An improved secure image hiding technique using PN-sequence based on DCT-OTP. In: 1st International Conference on Informatics and Computational Sciences 47–52

  24. Singh S (2014) Transform Domain Techniques for Image Steganography. University of Allahabad, Allahabad. http://shodhganga.inflibnet.ac.in

  25. Singh S, Siddiqui TJ, Singh HV (2011) DCT based digital data hiding in image cover. Int J Syst Simul 5(1):45–49

    Google Scholar 

  26. Sipi.usc.edu, ‘standard image dataset’, 2018. [Online]. Available: http://sipi.usc.edu/database/database.php?volume=misc. Accessed from 28 Jul 2018

  27. Sleit A et al (2012) An enhanced semi-blind DWT-SVD-based watermarking technique for digital images. Imaging Sci J 60:29–37

    Article  Google Scholar 

  28. Wang Y, Pearmain A (2004) Blind image data hiding based on self reference. Pattern Recogn Lett 25(15):1681–1689

    Article  Google Scholar 

  29. Yesilyurt M (2013) A new DCT based watermarking method using luminance component. Elektron IR Elektrotechn 19(4):47–52

    Article  Google Scholar 

  30. Zhang Y et al (2015) A JPEG-compression resistant adaptive steganography based on relative relationship between DCT coefficients. In: 10th International Conference on Availability, Reliability and Security 461–466

  31. Zhang Y et al (2016) A framework of adaptive steganography resisting JPEG compression and detection. Security and Communication Networks-special issue paper. Wiley, Hoboken

    Google Scholar 

  32. Zheng Y-P et al (2017) A watermarking algorithm based on DCT and JPEG quantization table. In: ITM web of conferences. Open access article, ITA-2017-China: 1–5

  33. Zhu Z et al (2019) Robust steganography by modifying sign of DCT coefficients. https://doi.org/10.1109/ACCESS.2019.2953504,IEEE Access 1–16

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Darshan Mehta.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mehta, D., Bhatti, D. Blind image steganography algorithm development which resistant against JPEG compression attack. Multimed Tools Appl 81, 459–479 (2022). https://doi.org/10.1007/s11042-021-11351-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11351-8

Keywords

Navigation