Skip to main content
Log in

A High Capacity Steganographic Method Based on Quantization Table Modification and F5 Algorithm

  • Short Paper
  • Published:
Circuits, Systems, and Signal Processing Aims and scope Submit manuscript

Abstract

This paper presents a steganographic method based on quantization table modification and the F5 algorithm. This method has a larger embedded secret message capacity and improves the embedding strategy to avoid “shrinkage” due to the use of the F5 algorithm. The experimental results show that, in comparison with the F5 algorithm and other methods, the proposed method has a higher steganographic capacity and an improved embedding efficiency. In terms of the structural similarity as well as PSNR for assessing image quality, the stego-image has better image quality and the proposed method has better anti-attack capability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. A. Amohammad, R.M. Hierons, G. Ghinea, High capacity steganographic method based upon JPEG, in Third International Conference on Availability. Reliability and Security, Washington (2008), pp. 544–549

    Chapter  Google Scholar 

  2. A. Amohammad, G. Ghinea, R.M. Hierons, JPEG steganography: a performance evaluation of quantization tables, in 2009 International Conference on Advanced Information Networking and Applications, Bradford, UK (2009), pp. 471–478

    Chapter  Google Scholar 

  3. C.C. Chang, T.S. Chen, L.Z. Chung, A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141, 123–138 (2002)

    MATH  Google Scholar 

  4. Y.S. Choi, H.J. Kim, Improving the modified matrix encoding on steganography method, in 2009 Fifth International Conference on Information Assurance and Security (2009), pp. 205–208

    Chapter  Google Scholar 

  5. J. Fridrich, Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes, in Proceedings 6th Information Hiding Workshop, Berlin (2004), pp. 67–81

    Chapter  Google Scholar 

  6. J. Fridrich, M. Goljan, D. Hogea, Steganalysis of JPEG image: breaking the F5 algorithm, in The 5th International Workshop on Information Hiding (Springer, Berlin, 2002), pp. 310–323

    Google Scholar 

  7. J. Fridrich, M. Goljan, D. Hogea, D. Soukal, Quantitative steganalysis: estimating secret message length. Multimed. Syst. 9(3), 288–302 (2003). Special issue on multimedia security

    Article  Google Scholar 

  8. J.M. Guo, T.N. Le, Secret communication using JPEG double compression. IEEE Signal Process. Lett. 17(10), 879–882 (2010)

    Article  Google Scholar 

  9. J. Huang, Y.Q. Shi, Y. Shi, Embedding image watermarks in DC components. IEEE Trans. Circuits Syst. Video Technol. 10(6), 974–979 (2000)

    Article  Google Scholar 

  10. M. Ishaque, S.A. Sattar, Quality based JPEG steganography using balanced embedding technique, in 2009 2nd International Conference Emerging Trends in Engineering and Technology (ICETET) (2009), pp. 215–221

    Chapter  Google Scholar 

  11. Y.B. Jiang, M.S. Pattichis, JPEG image compression using quantization table optimization based on perceptual image quality assessment, in 2011 Conference Record of the Forty-Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR) (2011), pp. 225–229

    Chapter  Google Scholar 

  12. C.L. Jiang, Y.L. Pang, L. Guo, A high capacity steganographic method based on quantization table modification. Wuhan Univ. J. Nat. Sci. 16(3), 223–227 (2011)

    Article  Google Scholar 

  13. M. Kumar, R. Newman, J3: high payload histogram neutral JPEG steganography, in 2010 Eighth Annual International Conference on Privacy, Security and Trust (2010), pp. 46–53

    Chapter  Google Scholar 

  14. X.X. Li, J.J. Wang, A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf. Sci. 177, 3099–3109 (2007)

    Article  Google Scholar 

  15. G.P. Lu, X.Y. Ye, Y.L. Wang, Y. Zhang, A F5 steganographic method based on quantization table modification. Comput. Eng. 38(24), 123–127 (2012)

    Google Scholar 

  16. D.M. Monro, B.G. Sherlock, Optimal quantization strategy for DCT image compression. IEE Proc., Vis. Image Signal Process. 143(1), 10–14 (1996)

    Article  Google Scholar 

  17. S. Sachdeva, A. Kumar, Colour image steganography based on modified quantization table, in 2012 Second International Conference on Advanced Computing & Communication Technologies (ACCT), (2012), pp. 309–313

    Chapter  Google Scholar 

  18. H.W. Tseng, C.C. Chang, Steganography using JPEG-compressed images, in The Fourth International Conference on Computer and Information Technology, CIT’04, 14–16 Sept (2004), pp. 12–17

    Google Scholar 

  19. N. Vongurai, S. Phimoltares, Frequency-based steganography using 32×32 interpolated quantization table and discrete cosine transform, in 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation, Kuantan, Malaysia (2012), pp. 249–253

    Chapter  Google Scholar 

  20. Z. Wang, A.C. Bovik, Mean squared error: love it or leave it?—a new look at signal fidelity measures. IEEE Signal Process. Mag. 26(1), 98–117 (2009)

    Article  Google Scholar 

  21. Z. Wang, A.C. Bovik, H.R. Sheikh, E.P. Simoncelli, Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)

    Article  Google Scholar 

  22. A. Westfeld, F5—a steganographic algorithm: high capacity despite better steganalysis, in Proceedings of 4th International Workshop on Information Hiding (Springer, New York, 2001), pp. 289–302

    Chapter  Google Scholar 

  23. E.H. Yang, L.J. Wang, Joint optimization of run-length coding, Huffman coding, and quantization table with complete baseline JPEG decoder compatibility. IEEE Trans. Image Process. 18(1), 63–74 (2009)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (No. 60975004) and Fundamental Research Funds for the Central Universities.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cuiling Jiang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jiang, C., Pang, Y. & Xiong, S. A High Capacity Steganographic Method Based on Quantization Table Modification and F5 Algorithm. Circuits Syst Signal Process 33, 1611–1626 (2014). https://doi.org/10.1007/s00034-013-9703-3

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00034-013-9703-3

Keywords

Navigation