Skip to main content

Advertisement

Log in

Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Since it is difficult to acquire a strong JPEG compression resistant ability while achieving a good detection resistant performance for current information hiding algorithms, a JPEG compression and detection resistant adaptive steganography algorithm using feature regions is proposed. Based on the proposed feature region extraction and selection algorithms, the embedding domain robust to JPEG compression and containing less embedding distortion can be obtained. Utilizing the current distortion functions, the distortion value of DCT coefficients in the embedding domain can be calculated. Combined with error correct coding and STCs, the messages are embedded into the cover images with minimum embedding distortion, and can be extracted with high accuracy after JPEG compression, hence, the JPEG compression and detection resistant performance are enhanced at the same time. The experimental results demonstrate that comparing with current J-UNIWARD steganography under quality factor 85 of JPEG compression, the extraction error rates decrease from above 20 % to nearly 0, while the stego images remain a better detection resistant performance comparing with the current JPEG compression and detection resistant adaptive steganography algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. BossBase-1.01[EB/OL]. http://exile.felk.cvut.cz/boss/BOSSFinal/.2013.

References

  1. Denemark T, Fridrich J (2015) Side-informed steganography with additive distortion. In: Proceedings of international workshop on information forensics and security. IEEE, pp 1–6

  2. Filler T, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. IS&T/SPIE electronic imaging. Int Soc Optics Photon 78800F–78800F-14

  3. Filler T, Judas J, Fridrich J (2010) Minimizing embedding impact in steganography using trellis-coded quantization. IS&T/SPIE electronic imaging. Int Soc Optics Photon:754105–754105-14

  4. Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forens Secur 6(3):920–935

    Article  Google Scholar 

  5. Fridrich J, Pevný T, Kodovský J (2007) Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: Proceedings of the 9th workshop on multimedia & security. ACM, pp 3–14

  6. Galand F, Kabatiansky G (2003) Information hiding by coverings. In: Proceedings of the workshop on information theory. IEEE, pp 151–154

  7. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Proceedings of the international workshop on information forensics and security. IEEE, pp 234–239

  8. Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the 1st ACM workshop on information hiding and multimedia security. ACM, pp 59–68

  9. Kodovský J, Fridrich J (2009) Calibration revisited. In: Proceedings of the 11th workshop on multimedia and security. ACM, pp 63–74

  10. Li B, Tan S, Wang M et al (2014) Investigation on cost assignment in spatial image steganography. IEEE Trans Inf Forens Secur 9(8):1264–1277

    Article  Google Scholar 

  11. Li B, Wang M, Huang J et al (2014) A new cost function for spatial image steganography. In: Proceedings of international conference on image processing. IEEE, pp 4206–4210

  12. Li C, Zhang Z, Wang Y et al (2015) Dither modulation of significant amplitude difference for wavelet based robust watermarking. Neurocomputing 166:404–415

    Article  Google Scholar 

  13. Liu W, Liu G, Dai Y (2015) Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency. Secur Commun Netw 8(9):1636–1647

    Article  Google Scholar 

  14. Luo W, Heileman G L, Pizano C E (2002) Fast and robust watermarking of JPEG files. In: s Proceedings of the 5th Southwest symposium on image analysis and interpretation. IEEE, pp 158–162

  15. Makbol N M, Khoo B E (2014) A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. Digit Signal Process 10(33):134–147

    Article  Google Scholar 

  16. Mikolajczyk K, Schmid C (2001) Indexing based on scale invariant interest points. In: Proceedings of the 8th international conference on computer vision, vol 1. IEEE, pp 525–531

  17. Mikolajczyk K, Schmid C (2004) Scale & affine invariant interest point detectors. Int J Comput Vis 60(1):63–86

    Article  Google Scholar 

  18. Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: International workshop on information hiding. Springer Berlin Heidelberg, pp 161–177

  19. Pevný T, Fridrich J (2008) Multiclass detector of current steganographic methods for JPEG format. IEEE Trans Inf Forens Secur 3(4):635–650

    Article  Google Scholar 

  20. Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forens Secur 11(2):221–234

    Article  Google Scholar 

  21. Tsai J S, Huang W B, Kuo Y H (2011) On the selection of optimal feature region set for robust digital image watermarking. IEEE Trans Image Process 20(3):735–743

    Article  MathSciNet  Google Scholar 

  22. Tsai J S, Huang W B, Kuo Y H et al (2012) Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions. Signal Process 92(6):1431–1445

    Article  Google Scholar 

  23. Wang X, Niu P, Yang H et al (2014) A new robust color image watermarking using local quaternion exponent moments. Inf Sci 277:731–754

    Article  Google Scholar 

  24. Zhang Y, Luo X, Yang C et al A framework of adaptive steganography resisting JPEG compression and detection. Secur Commun Netw. in press. 10.1002/sec.1502

  25. Zhang Y, Luo X, Yang C et al (2015) A JPEG-compression resistant adaptive steganography based on relative relationship between DCT coefficients. In: Proceedings of the 10th international conference on availability, reliability and security. IEEE, pp 461–466

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (No. 61379151, 61272489, 61302159, 61401512, and 61572052), the Excellent Youth Foundation of Henan Province of China (No. 144100510001), the Innovation Scientist and Technicians Troop Construction Project of Zhengzhou City (No. 10LJRC182), ant the Foundation of Science and Technology on Information Assurance Laboratory (No. KJ-14-108).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangyang Luo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Y., Luo, X., Yang, C. et al. Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection. Multimed Tools Appl 76, 3649–3668 (2017). https://doi.org/10.1007/s11042-016-3914-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3914-0

Keywords

Navigation