Skip to main content
Log in

Designing adaptive JPEG steganography based on the statistical properties in spatial domain

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Steganography is an important branch of information hiding, which is an effective way to solve the problem of communication security. Steganography can hide specific secret information in some kind of public information, such as images, documents, audio and video, without any suspicion. Joint Photographic Experts Group (JPEG) compressed image is the most widely used image format on the Internet. Recently, a series of JPEG image steganographic algorithms have been proposed. However, the existing JPEG steganography usually designs the cost function based on the statistical distribution in the DCT domain. In this paper, with the help of a “Microscope”, which can enhance the JPEG images in the spatial domain and highlight the texture regions, we design the steganographic cost function based on the statistical distribution of JPEG images in spatial domain and work out a JPEG image steganography with high security performance. Experimental results demonstrate that the proposed designing strategy is a practical approach to against several existing state-of-the-art steganalytic tools.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Bas P, Pevný T (2011) Break our steganographic system: The ins and outs of organizing boss, Information Hiding, Springer, pp. 59–70

  2. Chen K, Zhang W, Zhou H, Yu N, Feng G (2016) Defining cost functions for adaptive steganography at the microscale. In: Proc. IEEE Workshop Inf. Forensics Secur., pp. 1–6

  3. Crandall R (1998) Some notes on steganography. Steganography Mailing List [Online]. Available: http://os.inf.tu-dresden.de/westfeld/crandall.pdf, 1998

  4. Filler T, Judas J, Fridrich J (2010) Minimizing additive distortion in steganography using Syndrome-Trellis Codes. IEEE Transactions on Information Forensics and Security 6(3):920–935

    Article  Google Scholar 

  5. Fridrich J, Goljan M, Soukal D (2004) Perturbed quantization steganography with wet paper codes. Proc. the ACM Workshop on Multimedia and Security, Magdeburg, pp 4–15

    Google Scholar 

  6. Fridrich J, Goljan M, Soukal D (2006) Wet paper codes with improved embedding efficiency. IEEE Trans Information Forensics and Security 1(1):102–110

    Article  Google Scholar 

  7. Fridrich J, Pevný T, Kodovský J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. Proc. the ACM Workshop on Multimedia and Security, Dallas, pp 3–14

    Google Scholar 

  8. Guo L, Ni J, Shi YQ (2014) Uniform Embedding for Efficient JPEG Steganography. IEEE Trans Information Forensics and Security 9(5):814–825

    Article  Google Scholar 

  9. Guo L, Ni J, Su W, Tang C, Shi YQ (2015) Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited. IEEE Trans Information Forensics and Security 4(3):873–884

    Google Scholar 

  10. Holub V, Fridrich J (2015) Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT[J]. IEEE Transactions on Information Forensics & Security 10(2):219–228

    Article  Google Scholar 

  11. Holub V, Fridrich J, Denemark T (2014) Universal Distortion Function for Steganography in an Arbitrary Domain, EURASIP Journal on Information Security, (Section: SI: Revised Selected Papers of ACM IH and MMS 2013)

  12. Huang F, Huang J, Shi YQ (2012) New channel selection rule for JPEG steganography. IEEE Trans Information Forensics and Security 7(4):1181–1191

    Article  Google Scholar 

  13. Huang F, Luo W, Huang J, Shi YQ (2013) Distortion Function Designing for JPEG Steganography with Uncompressed Side-image. Proc. 1th ACM Information Hiding and Multimedia Security Workshop, Montpellier

    Book  Google Scholar 

  14. Kim Y, Duric Z, Richards D (2007) Modified matrix encoding technique for minimal distortion steganography. In: Proc. Information Hiding, 8th International Workshop, Old Town Alexandria, Virginia, July 10–12, 2006, volume 4437 of Lecture Notes in Computer Science, pp. 314–327

  15. Kodovský J, Fridrich J, Holub V (2012) Ensemble Classifiers for Steganalysis of Digital Media. IEEE Transactions on Information Forensics and Security 7(2):432–444

    Article  Google Scholar 

  16. Sallee P (2005) Model based methods for steganography and steganalysis. Int J Image Graphics 5(1):167–190

    Article  Google Scholar 

  17. Solanki K, Sarkar A, Manjunath BS (2007) YASS: Yet another steganographic scheme that resists blind steganalysis. In: Proc. Information Hiding, 9th International Workshop, Palais du Grand Large, Saint Malo, the corsair town, Brittany, volume 4567 of Lecture Notes in Computer Science, pp. 16–31

    Chapter  Google Scholar 

  18. Song X, Liu F, Yang C et al (2015) Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters. The, ACM Workshop. ACM, pp. 15–23

  19. Westfeld A (2001) F5—a steganographic algorithm. Information hiding. Springer, Berlin Heidelberg, pp 289–302

    MATH  Google Scholar 

  20. Zhang R, Sachnev V, Kim HJ (2009) Fast BCH syndrome coding for steganography. Proc. Information Hiding, 11th International Workshop, Darmstadt, volume 5806 of Lecture Notes in Computer Science, pp. 48–58

  21. Zhang X, Wang S (2006) Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Commun Lett 10(11):781–783

    Article  Google Scholar 

  22. Zhang W, Wang X (2009) Generalization of the ZZW embedding construction for steganography. IEEE Trans Information Forensics and Security 4(3):564–568

    Article  Google Scholar 

  23. Zhang W, Zhang X, Wang S (2010) Near-optimal codes for information embedding in gray-scale signals. IEEE Trans Information Forensics and Security 56(3):1262–1269

    MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

This work is partially supported by the National Natural Science Foundation of China (61772572), the NSFC-NRF Scientific Cooperation Program (61811540409), the Natural Science Foundation of Guangdong Province of China (2017A030313366), and the Fundamental Research Funds for Central Universities (17lgjc45).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fangjun Huang.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, G., Huang, F. & Li, Z. Designing adaptive JPEG steganography based on the statistical properties in spatial domain. Multimed Tools Appl 78, 8655–8665 (2019). https://doi.org/10.1007/s11042-018-6747-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6747-1

Keywords

Navigation