Skip to main content
Log in

Adaptive JPEG steganography with new distortion function

  • Published:
annals of telecommunications - annales des télécommunications Aims and scope Submit manuscript

Abstract

This paper presents an adaptive steganographic scheme in JPEG images by designing a novel distortion function. While some previous works employed distortion functions based on coefficient difference, we point out that the data embedding on coefficients with larger absolute values may cause less steganalytic detectability. In the proposed scheme, the distortion function is derived from both the coefficient residual and coefficient value, which measures the risks of detection due to the modification on cover data. With an exhaustive searching method, the parameters of the proposed distortion function are optimized. Then, we may employ syndrome trellis coding to embed the secret data into JPEG images when keeping a low risk. This way, the modifications are forced into high textured areas in JPEG images, and experimental results demonstrate that the steganographic security is improved by the designed distortion function.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Sallee P (1997) Model-based methods for steganography and steganalysis. Int J Image Graph 5(1):167–190

    Article  Google Scholar 

  2. Fridrich J, Pevny T, Kodovsky J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In: Proceedings of 9th ACM multimedia & security workshop, pp 3–14

  3. Solanki K, Sarkar A, Manjunath BS (2007) YASS: yet another steganographic scheme that resists blind steganalysis. Information Hiding, 9th International Workshop 4437:249–264

    Article  Google Scholar 

  4. Kim Y, Duric Z, Richards D (2006) Modified matrix encoding technique for minimal distortion steganography. Information Hiding, 8th International Workshop 4437:314–327

    Article  Google Scholar 

  5. Sachnev V, Kim H, Zhang R (2009) Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In: Proceedings of the 11th ACM multimedia & security workshop, pp 131–140

  6. Pevny T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. Information Hiding, 12th International Workshop 6387:161–177

    Google Scholar 

  7. Ryabko B, Ryabko D (2009) Asymptotically optimal perfect steganographic systems. Probl Inf Transm 45(2):184–190

    Article  MATH  MathSciNet  Google Scholar 

  8. Yang X, Guo D, Li J (2013) An image steganography based on multi-layered syndrome-trellis codes in DWT domain. In: 32nd IEEE Chinese control conference (CCC), pp 3738–3743

  9. Guo L, Ni J, Shi Y (2012) An efficient JPEG steganographic scheme using uniform embedding, IEEE Workshop on information forensics and security, December 2–5. Tenerife

  10. Penvy T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215– 224

    Article  Google Scholar 

  11. Gul G, Kurugollu F (2011) A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO). Information Hiding, 13th International Workshop 6958:71–84

    Article  Google Scholar 

  12. Chen L, Shi Y, Sutthiwan P, Niu X (2013) A novel mapping scheme for steganalysis. Int Work Digit Water-Marking 7809:19–33

    Google Scholar 

  13. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. IEEE Workshop on information forensics and security, December 2–5. Tenerife

  14. Filler T, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. In: Proceedings of SPIE, electronic imaging, media watermarking, security and forensics of multimedia XIII, vol 7880, pp 1–14

  15. Kodovsky J, Fridrich J, Holub V (2011) On dangers of overtraining steganography to incomplete cover model. In: Proceedings of the 13th ACM multimedia & security workshop, pp 69–76

  16. Huang F, Huang J, Shi Y (2012) New channel selection rule for JPEG steganography. IEEE Trans Inf Forensic Secur 7(4):1181–1191

    Article  Google Scholar 

  17. Pevny T, Fridrich J (2007) Merging markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE, electronic imaging, security, steganography, and watermarking of multimedia contents IX, vol 6505, pp 3 1–3 14

  18. Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifier for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432–444

    Article  Google Scholar 

  19. Kodovsky J, Fridrich J (2012) Steganalysis of JPEG images using rich models. In: Proceedings of SPIE, electronic imaging, media watermarking, security, and forensics of multimedia XIV, January 22–26. San Francisco

  20. Kodovsky J, Fridrich J (2009) Calibration revisited. In: Proceedings of 11th ACM multimedia & security workshop, pp 7–8

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China under grants 61073190 and 61103181, the Research Fund for the Doctoral Program of Higher Education of China under grant 20113108110010, and the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning, and Shanghai Pujiang Program under grant 13PJ1403200.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fengyong Li.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, F., Zhang, X., Yu, J. et al. Adaptive JPEG steganography with new distortion function. Ann. Telecommun. 69, 431–440 (2014). https://doi.org/10.1007/s12243-013-0415-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-013-0415-2

Keywords

Navigation