Skip to main content
Log in

New Distortion Metric for Efficient JPEG Steganography Using Linear Prediction

  • Published:
Journal of Signal Processing Systems Aims and scope Submit manuscript

Abstract

Hiding a secret message in a cover image with the least possible statistical detectability is the objective of steganography. This is generally formulated as a problem of minimal-distortion embedding and practically implemented by incorporating an efficient coding method and a well-designed distortion metric. In this paper, we construct a new distortion metric for JPEG steganography, which employs a local linear predictor to generate both the intra- and inter-block prediction errors of a quantized DCT coefficeint, and then accumulates them to form the distortion metric for this coefficient. Such distortion metric is then further integrated in the minimal-distortion framework using STC to give rise to the proposed JPEG steganographic scheme. This scheme exploits the proposed distortion metric to guide the STC to hide the secret message in those quantized DCT coefficients with minimal distortion cost. Consequently, the average changes of both first- and second-order statistics of quantized DCT coefficients and thus the statistical detectability would decrease significantly. Compared with prior arts, experimental results demonstrate the effectiveness of the proposed scheme in terms of secure embedding capacity against steganalysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12

Similar content being viewed by others

References

  1. Filler T., Judas J. Fridrich J. (2010). Minimizing embedding impact in steganography using Trellis-Coded Quantization, in Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, ed. by S Jose, vol. 7541 (CA, 2010), 17–21.

  2. Westfeld, A. (2001). F5 - A steganographic algorithm: high capacity despite better steganalysis. In Proceedings of the 4th International Workshop on Information Hiding, 289302.

  3. Fridrich, J., Pevny, T., & Kodavsky, J. (2007). Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In Proceedings of the 9th Workshop on Multimedia and Security, 3–14.

  4. Kim, H. Y., Duric, Z., & Rechards, D. (2007). Modified matrix encoding technique for minimal distortion steganography. In Proceedings of the 8th International Workshop on Information Hiding, 314–327.

  5. Choi, Y., & Kim, H. (2009). Improving the modified matrix encoding on steganography Method. In Proceedings of the International Conference on Information Assurance and Security. 205–208.

  6. Sachnev, V., Kim, H.-J., & Zhang, R. (2009). Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In Proceedings of the 11th ACM Workshop on Multimedia and Security. 131–139.

  7. Solanki, K., Sarkar, A., & Manjunath, B. S. (2008). YASS: yet another steganographic scheme that resists blind steganalysis. In T. Furon, F. Cayre, G. Doërr, & P. Bas (Eds.), IH 2007. LNCS (Vol. 4567, pp. 16–31). Heidelberg: Springer.

    Google Scholar 

  8. Yu, L. F., Zhao, Y., Ni, R. R., & Cao, G. (2014). A New Channel Selection Rule for YASS. Science China Information Sciences, 2014(8), 156–165.

    Google Scholar 

  9. Filler T., Fridrich J. (2011). Design of adaptive steganographic schemes for digital images, in Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, San Francisco, USA, 23–27 January 2011.

  10. Kodovsky J., Fridrich J.(2009) Calibration revisited, in Proceedings of the 11th ACM Multimedia and Security Workshop, Princeton, USA, 7–8 September 2009.

  11. Pevny T., Fridrich J.(2007), Merging Markov and DCT features for multiclass JPEG steganalysis, in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX. Ed. by S Jose, vol.6505, (CA, 2007), 301–314.

  12. Kodovsk’y J., Fridrich J., Holub V. (2011). On dangers of overtraining steganography to incomplete cover model, in Proceedings of the 13th ACM Multimedia& Security Workshop, Niagara Falls, NY, 29–30 September 2011, 69–76.

  13. Holub V. & Fridrich J. (2013). Digital image steganography using universal distortion, in Proceedings of the first ACM workshop on Information hiding and multimedia security, 2013, 59–68.

  14. Pevny, T., & Fridrich, J. (2007). Merging markov and DCT features for multi-class JPEG steganalysis. In Proceedings of the SPIE Conference on Security, Steganography and Watermarking of Multimedia Contents IX

  15. Chen C, Shi Y. Q. (2008). JPEG image steganalysis utilizing both intrablock and interblock correlations, IEEE ISCAS, International Symposium on Circuits and Systems. 3029–3032.

  16. Kodovsky J., Fridrich J. (2012). Steganalysis of JPEG Images Using Rich Models, in Proc. SPIE, Electronic Imaging, Media Watermarking, Security and Forensics XIV, San Francisco, USA, 23–25 January 2012

  17. Narwaria, M., Lin, W., McLoughlin, I., Emmanuel, S., & Tien, C. (2012). Fourier Transform Based Scalable Image Quality Measure. IEEE Transactions on Image Processing, 21(8), 3364–3377.

    Article  MathSciNet  Google Scholar 

  18. ] Shan Q., Jia J., & Agarwala A. (2008). High-Quality Motion Deblurring From a Single Image, ACM Transactions on Graphics (SIGGRAPH 2008), 27(3)

  19. Bas P., Filler T., & Pevn’y T. (2011). Break our steganographic system —the ins and outs of organizing boss, in Proc. 13th Information Hiding Conf., 59–70, http://www.agents.cz/boss/.

  20. Kodovsky J., Fridrich J., & Holub V. (2012). Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security, 7(2), 432–444, Soft-ware available at http://dde.binghamton.edu/download/nsf5simulator/.

  21. Chang C. C., Lin C. J. (2001). LIBSVM: a library for support vector machines,, http://www.csie.ntu.edu.tw/cjlin/libsvm/.

Download references

Acknowledgments

This work is supported by National Natural Science Foundation of China (No. 61379156 and 61202467), the National Research Foundation for the Doctoral Program of Higher Education of China (No. 20120171110037), the Key Program of Natural Science Foundation of Guangdong (No. S2012020011114), and the Scientific Research Foundation for Returned Overseas Chinese Scholars, State Education Ministry.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chang Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, C., Ni, J. & Wang, C. New Distortion Metric for Efficient JPEG Steganography Using Linear Prediction. J Sign Process Syst 81, 389–400 (2015). https://doi.org/10.1007/s11265-014-0961-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11265-014-0961-5

Keywords

Navigation