Skip to main content
Log in

Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we present a universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain. This strategy can make up for the problem when applying batch steganography to adaptive steganography in JPEG domain meanwhile improve the secure performance in spatial domain. When embedding, the strategy are employed to determine the sub-batch of cover images to carry the total message. To evaluate the feasibility of images selected as sub-batch, we calculate the histogram equilibrium for each image and the images with larger “size” and more equilibrated histogram are set a high priority when determining the sub-batch. The histogram equilibrium of images is the combination of entropy and standard deviation for the probability of histogram coefficients. We keep the repetitive information of using entropy and standard deviation to measure the histogram equilibrium. Experimental results show that histogram equilibriums vary according to images and employing images with larger “size” and more equilibrated histogram to carry the total message is a universal embedding strategy for both spatial and JPEG domain. Batch adaptive steganography with this embedding strategy can improve the secure performance effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J (2014) Selection-channel-aware rich model for steganalysis of digital images. In: Proceedings of the IEEE international workshop on information forensic and security. Atlanta, pp 48–53

    Google Scholar 

  2. Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics Secur 6:920–935

    Article  Google Scholar 

  3. Filler T, Pevný T, Bas P (2011) Break our steganographic system: the ins and outs of organizing BOSS. In: Filler T, Pevný T, Craver S, Ker A (eds) IH. LNCS, vol 6958, pp 59–70

    Google Scholar 

  4. Fridrich J, Kodovský J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7:868–882

    Article  Google Scholar 

  5. Fridrich J, Goljan M, Lisonek P, Soukal D (2005) Writing on wet paper. IEEE Trans Signal Process 53:3923–3935

    Article  MathSciNet  MATH  Google Scholar 

  6. Guo L, Ni j Shi Y (2012) An efficient JPEG steganographic scheme using uniform embedding. In: IEEE International workshop on information forensic and security (WIFS). Tenerife, pp 169–174

    Google Scholar 

  7. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Proceedings of the IEEE international workshop on information forensic and security. Tenerife, pp 234–239

    Google Scholar 

  8. Holub V, Fridrich J (2013) Random projections of residuals for digital image steganalysis. IEEE Trans Inf Forensics Secur 8:1996–2006

    Article  Google Scholar 

  9. Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the 1st ACM workshop information hiding multimedia security. ACM, New York, pp 59–68

    Chapter  Google Scholar 

  10. Holub V, Fridrich J (2015) Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forensics Secur 10:219–228

    Article  Google Scholar 

  11. Ker A, Pevný T (2012) Batch steganography in the real world. In: ACM Proceeding of the on multimedia and security. ACM, New York, pp 1–10

    Google Scholar 

  12. Ker A, Pevný T, Kodovský J, Fridrich J (2008) The square root law of steganographic capacity. In: Proceedings of the 10th ACM workshop on multimedia and security. ACM, New York, pp 107–116

    Google Scholar 

  13. Kodovský J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7:432–444

    Article  Google Scholar 

  14. Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: Proceedings of the IEEE International conference on image processing. Paris, pp 4206–4210

    Google Scholar 

  15. Pevny T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Information hiding (Lecture Notes in Computer Science). Springer-Verlag, Berlin, pp 161–177

    Google Scholar 

  16. Sallee P (2003) Model-based steganography. In: Digital watermarking (Lecture Notes in Computer Science), vol 2939, pp 154–167

    Google Scholar 

  17. Shllee P Matlab JPEG Toolbox [Online]. Available: http://www.philsallee.com/jpegtbx/index.html

  18. Song X, Liu F, Yang C, Luo X, Zhang Y (2015) Steganalysis of adaptive JPEG steganography using 2D gabor filters. In: Proceedings of the 3th ACM workshop information on hiding multimedia security. ACM, New York, pp 15–23

    Chapter  Google Scholar 

  19. Westfeld A (2001) F5-A steganographic algorithm. In: Information hiding (Lecture Notes in Computer Science), vol 2137, pp 289–302

    Google Scholar 

  20. Zhao Z, Guan Q, Zhao X (2016) Constructing near-optimal double-layered syndrome-trellis codes for spatial steganography. In: Proceedings on the 4th ACM workshop information on hiding multimedia security. ACM, New York, pp 139–148

    Google Scholar 

  21. Zhao Z, Guan Q, Zhao X, Yu H, liu C (2016) Embedding strategy for batch adaptive steganography. In: The 15th international workshop on digital-forensics and watermarking (IWDW2016), accepted

    Google Scholar 

Download references

Acknowledgments

This work was supported by the Natural Science Foundation of China under U1536105 and U1636102, and National Key Technology R&D Program under 2014BAH41B01, 2016YFB0801003 and 2016QY15Z2500.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qingxiao Guan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhao, Z., Guan, Q., Zhao, X. et al. Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain. Multimed Tools Appl 77, 14093–14113 (2018). https://doi.org/10.1007/s11042-017-5016-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5016-z

Keywords

Navigation