Skip to main content
Log in

Robust JPEG steganography based on DCT and SVD in nonsubsampled shearlet transform domain

  • 1213: Computational Optimization and Applications for Heterogeneous Multimedia Data
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Social media platform such as WeChat provides rich cover images for covert communication by steganography. However, in order to save band-width, storage space and make images load faster, the images often will be compressed, which makes the image steganography algorithms designed for lossless network channels unusable. Based on DCT and SVD in nonsubsampled shearlet transform domain, a robust JPEG steganography algorithm is proposed, which can resist image compression and correctly extract the embedded secret message from the compressed stego image. First, by combining the advantages of nonsubsampled shearlet transform, DCT and SVD, the construction method for robust embedding domain is proposed. Then, based on minimal distortion principle, the framework of the proposed robust JPEG steganography algorithm is given and the key steps are described in details. The experimental results show that the proposed JPEG steganography algorithm can achieve competitive robustness and anti-detection capability in contrast to the state-of-the-art robust steganography algorithms. Moreover, it can extract the secret message correctly even if the stego image is compressed by WeChat.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Bao P, Ma X (2005) Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Trans Circ Syst Video Technol 15(1):96–102

    Article  Google Scholar 

  2. Bas P, Filler T, Pevný T (2011) Break Our Steganographic System: The Ins and Outs of Organizing BOSS. In: Proceedings of the 13th International workshop on Information Hiding, Springer, pp 59–70

  3. Chen B, Wornell G (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423–1443

    Article  MathSciNet  Google Scholar 

  4. Chen X, Zhang Z, Qiu A, Xia Z, Xiong N (2021) A novel coverless steganography method based on image selection and StarGAN. IEEE Trans Netw Sci Eng 9:219–230. https://doi.org/10.1109/TNSE.2020.3041529

    Article  Google Scholar 

  5. Das R, Baykara M, Tuna G (2019) A novel approach to steganography: enhanced least significant bit substitution algorithm integrated with self-determining encryption feature. Comput Syst Sci Eng 34(1):23–32

    Article  Google Scholar 

  6. Easley G, Labate D, Lim W (2008) Sparse directional image representations using the discrete shearlet transform. Appl Comput Harmon Anal 25(1):25–46

    Article  MathSciNet  Google Scholar 

  7. Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensic Secur 6(3):920–935

    Article  Google Scholar 

  8. Guo L, Ni J, Shi YQ (2014) Uniform embedding for efficient JPEG steganography. IEEE Trans Inf Forensic Secur 9(5):814–825

    Article  Google Scholar 

  9. Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on Information hiding and multimedia security, ACM, pp. 59–68

  10. Holub V, Fridrich J (2015) Low-complexity features for JPEG Steganalysis using Undecimated DCT. IEEE Trans Inf Forensic Secur 10(2):219–228

    Article  Google Scholar 

  11. Kang X, Zhao F, Lin G, Chen Y (2018) A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength. Multimed Tools Appl 77(11):13197–13224

    Article  Google Scholar 

  12. Ker A D, Bas P, Böhme R, et al (2013). Moving steganography and Steganalysis from the laboratory into the real world. In: Proceedings of the first ACM workshop on Information hiding and multimedia security, ACM, pp. 45–58.

  13. Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432–444

    Article  Google Scholar 

  14. Luo Y, Qin J, Xiang X, Tan Y (2021) Coverless image steganography based on multi-object recognition. IEEE Trans Circ Syst Video Technol 31:2779–2791. https://doi.org/10.1109/TCSVT.2020.3033945

    Article  Google Scholar 

  15. Pevny T, Fridrich J (2008) Multiclass detector of current steganographic methods for JPEG format. IEEE Tran Inf Forensic Secur 3(4):635–650

    Article  Google Scholar 

  16. Qian Z, Zhou H, Zhang W, Zhang X (2016) Robust steganography using texture synthesis. In: Proceedings of 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Springer, pp. 25–33

  17. Tao J, Li S, Zhang X, Wang Z (2019) Towards robust image steganography. IEEE Trans Circ Syst Video Technol 29(2):594–600

    Article  Google Scholar 

  18. Tian C, Wen R, Zou W, Gong L (2020) Robust and blind watermarking algorithm based on DCT and SVD in the contourlet domain. Multimed Tools Appl 79(11):7515–7541

    Article  Google Scholar 

  19. Wang X, Liu Y, Xu H, Wang A, Yang H (2016) Blind optimum detector for robust image watermarking in nonsubsampled shearlet domain. Inf Sci 372:634–654

    Article  Google Scholar 

  20. Xiang L, Yang S, Liu Y, Li Q, Zhu C (2020) Novel linguistic steganography based on character-level text generation. Mathematics 8(9):1558

    Article  Google Scholar 

  21. Yang Z, Zhang S, Hu Y, Hu Z, Huang Y (2021) VAE-Stega: linguistic steganography based on Variational auto-encoder. IEEE Trans Inf Forensic Secur 16:880–895

    Article  Google Scholar 

  22. Yi S, Labate D, Easley G, Krim H (2009) A Shearlet approach to edge analysis and detection. IEEE Trans Image Process 18(5):929–941

    Article  MathSciNet  Google Scholar 

  23. Yu X, Chen K, Wang Y, Li W, Zhang W, Yu N (2020) Robust adaptive steganography based on generalized dither modulation and expanded embedding domain. Signal Process 168:1–12

    Article  Google Scholar 

  24. Zhang Y, Luo X, Yang C, Ye D, Liu F. (2015) A JPEG compression resistant adaptive steganography based on relative relationship between DCT coefficients. In: Proceedings of the 10th international conference on availability, Reliability and Security, IEEE, pp. 461–46.

  25. Zhang Y, Zhu X, Qin C, Yang C, Luo X (2018) Dither modulation based adaptive steganography resisting JPEG compression and statistic detection. Multimed Tools Appl 77(14):17913–17935

    Article  Google Scholar 

  26. Zhang Y, Luo X, Guo Y, Qin C, Liu F (2020) Multiple robustness enhancements for image adaptive steganography in Lossy channels. IEEE Trans Circ Syst Video Technol 30(8):2750–2764

    Article  Google Scholar 

  27. Zhao Z, Guan Q, Zhang H, Zhao X (2019) Improving the robustness of adaptive steganographic algorithms based on transport channel matching. IEEE Trans Inf Forensic Secur 14(7):1843–1856

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (No. 61872448, U1804263) and the Natural Science Basic Research Plan in Shanxi Province of China (No. 2021JQ-379).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaofeng Song.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Song, X., Yang, C., Han, K. et al. Robust JPEG steganography based on DCT and SVD in nonsubsampled shearlet transform domain. Multimed Tools Appl 81, 36453–36472 (2022). https://doi.org/10.1007/s11042-022-13525-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13525-4

Keywords

Navigation