Skip to main content
Log in

A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

A Correction to this article was published on 27 June 2019

This article has been updated

Abstract

Robust JPEG steganographic algorithms are proposed to protect the embedded message when the covert JPEG image is JPEG-compressed in some lossy channel. They usually perform much better on anti-compression ability than the traditional adaptive JPEG steganographic algorithms. However, massive recent experimental results reveal that the message extraction accuracy of the present robust JPEG steganographic methods are not high enough in some JPEG compressing channels. Thus, this paper proposes a new robust JPEG steganographic algorithm with high message extraction accuracy with equivalent detection resistance. First, the robust channel for the JPEG compression and steganographic embedding are analyzed. Second, a new error correction encoder that can protect the message in lossy channel is proposed. The structure and inside codes of the proposed encoder are different to the traditional codes used in adaptive steganography. Last, the proposed code, the relationship between coefficients and the minimal distortion model are combined to build new steganography. 10,000 images in the popular BOSSbase 1.01 image library are selected for magnanimous experiments. Compared with the adaptive JPEG steganographic algorithm and some current robust JPEG steganographic algorithms, the experimental results show that proposed method can not only resist detection efficiently, but also obtain higher extracting accuracy on resisting JPEG compression.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Change history

  • 27 June 2019

    The article “A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients” written by Zhenkun Bao et al. was originally published electronically on the publisher’s internet portal (currently SpringerLink) on 11 June 2019 with open access.

Notes

  1. Proposed by Patrick Bas, Tomas Filler, Tomas Pevny at ICASSP 2013, containing 10, 000 images of size \(512 \times 512\), download: http://agents.fel.cvut.cz/stegodata/.

References

  • Agarwal N, Singh AK, Singh PK (2019) Survey of robust and imperceptible watermarking. Multimed Tools Appl 78(7):8603–8633

    Article  Google Scholar 

  • Berlekamp ER (1968) Algebraic coding theory. McGraw-Hill, New York

    MATH  Google Scholar 

  • Chang CC, Nguyen TS, Lin CC (2015) A reversible compression code hiding using SOC and SMVQ indices. Inf Sci 300:85–99

    Article  Google Scholar 

  • Chen YY, Hsia CH, Jhong SY et al (2018) Data hiding method for AMBTC compressed images. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-1048-0

  • Chen DY, Ouhyoung M, Wu JL (2000) A shift-resisting public watermark system for protecting image processing software. IEEE Trans Consum Electron 46(3):404–414

    Article  Google Scholar 

  • Fan L, Sun W, Feng G (2018) Image steganalysis via random subspace fisher linear discriminant vector functional link network and feature mapping. Mob Netw Appl. https://doi.org/10.1007/s11036-018-1167-z

  • Feng G, Zhang X, Ren Y, Qian Z, Li S (2019) Diversity-based cascade filters for JPEG steganalysis. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2019.2891778

  • Filler T, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. In: Proceedings of the ISandT/SPIE electronic imaging, media forensics and security XIII, San Jose, CA, USA

  • Filler T, Judas J, Fridrich J (2010) Minimizing embedding impact in steganography using trellis-coded quantization. In: Proceedings of the ISandT/SPIE electronic imaging, media forensics and security XII, San Jose, CA, USA

  • Fridrich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • Fridrich J, Kodovský J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868–882

    Article  Google Scholar 

  • Fridrich J, Filler T (2007) Practical methods for minimizing embedding impact in steganography. In: Proceedings of IS&T/SPIE electronic imaging, Bellingham, WA, USA

  • Guo L, Ni J, Shi Y (2013) An efficient JPEG steganographic scheme using uniform embedding. In: Proceedings of the IEEE international workshop on information forensics and security, Guangzhou, China, pp 169-174

  • Holub V, Fridrich J (2015) Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forensics Secur 10(2):219–228

    Article  Google Scholar 

  • Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inf Secur 1(1):1–13

    Google Scholar 

  • Holub V, Fridrich J (2013) Designing steganographic distortion using directional filters. In Proceedings of the first ACM workshop on information hiding and multimedia security, Montpellier, France, pp 234–239

  • Huang F, Huang J, Shi Y (2012) New channel selection rule for JPEG steganography. IEEE Trans Inf Forensics Secur 7(4):1181–1191

    Article  Google Scholar 

  • Huang F, Luo W, Huang J et al (2013) Distortion function designing for JPEG steganography with uncompressed side-image. In: Proceedings of the first ACM workshop on information hiding and multimedia security, Montpellier, France, pp 69–76

  • Ker AD, Bas P, Böhme R et al (2013) Moving steganography and steganalysis from the laboratory into the real world. In: Proceedings of the first ACM workshop on information hiding and multimedia security, pp 45–58

  • Kodovský J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432–444

    Article  Google Scholar 

  • Kodovský J, Fridrich J (2009) Calibration revisited. In: Proceedings of ACM workshop on multimedia and security, Princeton, NJ, USA, pp 63–74

  • Li B, Tan S, Wang J et al (2014) Investigation on cost assignment in spatial image steganography. IEEE Trans Inf Forensics Secur 9(8):1264–1277

    Article  Google Scholar 

  • Luo X, Song X, Li X, Zhang W, Jicang L, Yang C, Liu F (2016) Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75(21):13557–13583

    Article  Google Scholar 

  • Ma Y, Luo X, Li X et al (2018) Selection of rich model steganalysis features based on decision rough set-positive region reduction. IEEE Trans Circuits Syst Video Technol 29(2):336–350

    Article  Google Scholar 

  • Massey J (1969) Shift-register synthesis and BCH decoding. IEEE Press, Piscataway

    Book  Google Scholar 

  • Pevný T, Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE-the international society for optical engineering, Bellingham, WA, USA, pp 650503-1-650503-13

  • Proakis JG, Salehi M (2008) Digital communications, 5th edn. McGraw-Hill, New York

    Google Scholar 

  • Qiao T, Shi R, Luo X, Xu M, Zheng N, Wu Y (2018) Statistical model-based detector via texture weight map: application in re-sampling authentication. IEEE Trans Multimed. https://doi.org/10.1109/TMM.2018.2872863

  • Reed IS, Solomon G (1960) Polynomial codes over certain finite fields. J Soc Ind Appl Math 8(2):300–304

    Article  MathSciNet  Google Scholar 

  • Shaheen AM, Sheltami TR, Al-Kharoubi TM et al (2018) Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0850-z

    Article  Google Scholar 

  • Singh AK, Kumar B, Singh SK et al (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Gener Comput Syst 86:926–939

    Article  Google Scholar 

  • Sriti T, Kumar SA, Prakash GS et al (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6263-3

  • Srivastava R, Kumar B, Singh AK et al (2018) Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach. Multimed Tools Appl 77(13):16447–16459

    Article  Google Scholar 

  • Tiwari G (2015) A review on robust watermarking with its applications and comparative analysis. Int J Signal Process Image Process Pattern Recognit 8(6):85–90

    Google Scholar 

  • Tsai JS, Huang WB, Kuo YH et al (2012) Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions. Signal Process 92(6):1431–1445

    Article  Google Scholar 

  • Tsougenis ED, Papakostas A, Koulouriotis DE et al (2012) Performance evaluation of moment-based watermarking methods: a review. J Syst Softw 85(8):1864–1884

    Article  Google Scholar 

  • Wang XY, Liu YN, Xu H et al (2016) Blind optimum detector for robust image watermarking in nonsubsampled shearlet domain. Inf Sci 372:634–654

    Article  Google Scholar 

  • Wang J, Li T, Luo X, Shi Y-Q, Jha SK (2018) Identifying computer generated images based on quaternion central moments in color quaternion wavelet domain. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2018.2867786

  • Wang C, Ni J (2012) An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients. In: Proceedings of the IEEE international conference on acoustics, speech and signal processing, Kyoto, Japan, pp 1785–1788

  • Zhang Y, Luo X, Yang C et al (2013) A framework of adaptive steganography resisting JPEG compression and detection. Secur Commun Netw 9(15):2957–2971

    Article  Google Scholar 

  • Zhang Y, Qin C, Zhang W et al (2018) On the fault-tolerant performance for a class of robust image steganograph. Signal Process 146:99–111

    Article  Google Scholar 

  • Zhong K, Feng G, Shen L et al (2018) Deep learning for steganalysis based on filter diversity selection. Sci Chin Inf Sci 61(12):196–198

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China (Grant nos. U1636219, U1736119, 61572052, 61772549, U1804263, and U1736214), the National Key R&D Program of China (Grant nos. 2016YFB0801303 and 2016QY 01W0105), Plan for Scientific Innovation Talent of Henan Province (Grant no. 2018JR0018) and the Key Technologies R&D Program of Henan Province (Grant no. 162102210032).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangyang Luo.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original version of this article was revised due to cancellation of retrospective Open Access order.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bao, Z., Guo, Y., Li, X. et al. A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients. J Ambient Intell Human Comput 11, 1889–1901 (2020). https://doi.org/10.1007/s12652-019-01345-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-019-01345-8

Keywords

Navigation