Abstract
This paper presents an adaptive steganographic scheme in JPEG images by designing a novel distortion function. While some previous works employed distortion functions based on coefficient difference, we point out that the data embedding on coefficients with larger absolute values may cause less steganalytic detectability. In the proposed scheme, the distortion function is derived from both the coefficient residual and coefficient value, which measures the risks of detection due to the modification on cover data. With an exhaustive searching method, the parameters of the proposed distortion function are optimized. Then, we may employ syndrome trellis coding to embed the secret data into JPEG images when keeping a low risk. This way, the modifications are forced into high textured areas in JPEG images, and experimental results demonstrate that the steganographic security is improved by the designed distortion function.








Similar content being viewed by others
References
Sallee P (1997) Model-based methods for steganography and steganalysis. Int J Image Graph 5(1):167–190
Fridrich J, Pevny T, Kodovsky J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In: Proceedings of 9th ACM multimedia & security workshop, pp 3–14
Solanki K, Sarkar A, Manjunath BS (2007) YASS: yet another steganographic scheme that resists blind steganalysis. Information Hiding, 9th International Workshop 4437:249–264
Kim Y, Duric Z, Richards D (2006) Modified matrix encoding technique for minimal distortion steganography. Information Hiding, 8th International Workshop 4437:314–327
Sachnev V, Kim H, Zhang R (2009) Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In: Proceedings of the 11th ACM multimedia & security workshop, pp 131–140
Pevny T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. Information Hiding, 12th International Workshop 6387:161–177
Ryabko B, Ryabko D (2009) Asymptotically optimal perfect steganographic systems. Probl Inf Transm 45(2):184–190
Yang X, Guo D, Li J (2013) An image steganography based on multi-layered syndrome-trellis codes in DWT domain. In: 32nd IEEE Chinese control conference (CCC), pp 3738–3743
Guo L, Ni J, Shi Y (2012) An efficient JPEG steganographic scheme using uniform embedding, IEEE Workshop on information forensics and security, December 2–5. Tenerife
Penvy T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215– 224
Gul G, Kurugollu F (2011) A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO). Information Hiding, 13th International Workshop 6958:71–84
Chen L, Shi Y, Sutthiwan P, Niu X (2013) A novel mapping scheme for steganalysis. Int Work Digit Water-Marking 7809:19–33
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. IEEE Workshop on information forensics and security, December 2–5. Tenerife
Filler T, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. In: Proceedings of SPIE, electronic imaging, media watermarking, security and forensics of multimedia XIII, vol 7880, pp 1–14
Kodovsky J, Fridrich J, Holub V (2011) On dangers of overtraining steganography to incomplete cover model. In: Proceedings of the 13th ACM multimedia & security workshop, pp 69–76
Huang F, Huang J, Shi Y (2012) New channel selection rule for JPEG steganography. IEEE Trans Inf Forensic Secur 7(4):1181–1191
Pevny T, Fridrich J (2007) Merging markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE, electronic imaging, security, steganography, and watermarking of multimedia contents IX, vol 6505, pp 3 1–3 14
Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifier for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432–444
Kodovsky J, Fridrich J (2012) Steganalysis of JPEG images using rich models. In: Proceedings of SPIE, electronic imaging, media watermarking, security, and forensics of multimedia XIV, January 22–26. San Francisco
Kodovsky J, Fridrich J (2009) Calibration revisited. In: Proceedings of 11th ACM multimedia & security workshop, pp 7–8
Acknowledgments
This work was supported by the National Natural Science Foundation of China under grants 61073190 and 61103181, the Research Fund for the Doctoral Program of Higher Education of China under grant 20113108110010, and the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning, and Shanghai Pujiang Program under grant 13PJ1403200.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, F., Zhang, X., Yu, J. et al. Adaptive JPEG steganography with new distortion function. Ann. Telecommun. 69, 431–440 (2014). https://doi.org/10.1007/s12243-013-0415-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-013-0415-2