Skip to main content
Log in

A channel selection rule for YASS

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

In this paper, a channel selection rule for YASS (Yet-Another-Secure-Steganography) is proposed. Secret message embedding imposes distortion to the cover image. The larger the distortion, the less secure the steganographic algorithm. Our channel selection rule engages in minimizing this distortion brought in by YASS. In our rule, the distortion caused by unit change on each quantized DCT (Discrete Cosine Transformation) component is computed, and the components with smaller unit change distortion are selected with higher priority. This channel selection rule reduces distortion to the medium spatial domain image and the final JPEG image. Experimental results show that our improved YASS scheme outperforms original YASS scheme on the aspects of both perception and statistics. This new channel selection rule can also be combined with other enhancements in YASS framework to further boost the performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Solanki K, Sarkar A, Manjunath B S. YASS: Yet another steganographic scheme that resists blind steganalysis. In: Proc Springer Int Workshop Information Hiding. Saint Malo, 2007. 16–31

    Google Scholar 

  2. Sarkar A, Solanki K, Manjunath B S. Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis. In: Proc SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, California, 2008. 6819: 681917–681917-11

    Article  Google Scholar 

  3. Yu L, Zhao Y, Ni R, et al. A high-performance YASS-like scheme using randomized big-blocks. In: Proc IEEE Int Conf Multimedia & Expo, 2010. 474–479

    Google Scholar 

  4. Lv X, Ma L, Tian J. An improved YASS approach using irregular host-blocks and modified quantization index modulation. In: Proc Int Conf Intelligent Infromation Hiding and Multimedia Signal Processing, 2012. 309–312

    Google Scholar 

  5. Ma L, Lv X, Tian J. Modified YASS algorithm with virtual host block selectioin and model based embedding. In: Proc Int Conf Industrial Electronics and Applications, 2012. 73–78

    Google Scholar 

  6. Li B, Huang J, Shi Y Q. Steganalysis of YASS. IEEE Trans Info Forensics and Security, 2009, 4: 369–382

    Article  Google Scholar 

  7. Sarkar A, Manjunath B S. Double embedding in the quantization index modulation framework. In: Proc IEEE Int Conf Image Processing, 2009. 3653–3656

    Google Scholar 

  8. Sarkar A, Madhow U, Manjunath B S. Matrix embedding with pseudorandom coefficient selection and error correction for robust and secure steganography. IEEE Trans Inf Forensics and Security, 2010, 5: 225–239

    Article  Google Scholar 

  9. Kodovský J, Fridrich J. Calibration revisited. In: Proc ACM Workshop Multimedia and Security, New York, 2009. 63–74

    Google Scholar 

  10. Yu X, Babaguchi N. Breaking the YASS algorithm via pixel and dct coefficients analysis. In: Proc IEEE Int Conf Pattern Recognition, Tampa, Florida, 2008. 1–4

    Google Scholar 

  11. Kodovský J, Pevný T, Fridrich J. Modern steganalysis can detect YASS. In: Proc SPIE Media Forensics and Security, 2010. 754102

    Chapter  Google Scholar 

  12. Yang X, Zhang W. Effective steganalysis of YASS based on statistical moments of wavelet characteristic functioin on Markov process. In: Proc Int Conf Computer Science and Electronics Engineering, 2012. 606–610

    Google Scholar 

  13. Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG images: Breaking the F5 algorithm. In: Proc Springer Int Workshop on Information Hiding, Noordwijkerhout, 2002. 310–323

    Google Scholar 

  14. Fridrich J, Goljan M, Hogea D. Attacking the OutGuess. In: Proc ACM Workshop Multimedia and Security, Frances: Juan-les-Pins, 2002. 3–6

    Google Scholar 

  15. Shi Y Q, Sun H. Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms and Standards, 1st ed. Boca Raton: CRC Press, 1999.

    Book  Google Scholar 

  16. Chen C, Shi Y Q. JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Proc IEEE Int Symposium Circuits and Systems, Seattle, Washington, 2008. 3029–3032

    Google Scholar 

  17. NRCS, NRCS photo gallery. In: http://photogallery.nrcs.usda.gov.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yao Zhao.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yu, L., Zhao, Y., Ni, R. et al. A channel selection rule for YASS. Sci. China Inf. Sci. 57, 1–10 (2014). https://doi.org/10.1007/s11432-014-5106-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-014-5106-8

Keywords

Navigation