skip to main content
10.1145/2482513.2482517acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Distortion function designing for JPEG steganography with uncompressed side-image

Published: 17 June 2013 Publication History

Abstract

In this paper, we present a new framework for designing distortion functions of joint photographic experts group (JPEG) steganography with uncompressed side-image. In our framework, the discrete cosine transform (DCT) coefficients, including all direct current (DC) coefficients and alternating current (AC) coefficients, are divided into two groups: first-priority group (FPG) and second-priority group (SPG). Different strategies are established to associate the distortion values to the coefficients in FPG and SPG, respectively. In this paper, three scenarios for dividing the coefficients into FPG and SPG are exemplified, which can be utilized to form a series of new distortion functions. Experimental results demonstrate that while applying these generated distortion functions to JPEG steganography, the intrinsic statistical characteristics of the carrier image will be preserved better than the prior-art, and consequently the security performance of the corresponding JPEG steganography can be improved significantly.

References

[1]
J. Fridrich, P. Lisonek and D. Soukal, "On Steganographic embedding efficiency," in Proc. Information Hiding Workshop 2006, LNCS 4437, pp. 282--296, 2007
[2]
J. Fridrich, M. Goljan and D. Soukal, "Perturbed quantization steganography with wet paper codes," in Proc. the ACM Workshop on Multimedia & Security, Magdeburg, Germany, September 20--21, pp. 4--15, 2004.
[3]
J. Fridrich, T. Pevný and J. Kodovský, "Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities," in Proc. the ACM Workshop on Multimedia and Security, Dallas, Texas, September 20--21, pp. 3--14, 2007.
[4]
V. Sachnev, H. J. Kim, and R. Zhang, "Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding," in Proc. the ACM Workshop on Multimedia & Security, Princeton, New Jersey, Sep. 7--9, pp. 131--140, 2009.
[5]
T. Filler, J. Judas, and J. Fridrich, "Minimizing additive distortion in steganography using Syndrome-Trellis Codes," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 920--935, 2010.
[6]
V. Sachnev, H. J. Kim, "Modified BCH data hiding scheme for JPEG steganography," Eurasip Journal on advances in signal processing, vol. 2012, no. 1, pp. 89--98, 2012
[7]
C. Wang, J. Ni, "An efficient JPEG steganographic scheme based on block-entropy of DCT coefficients," in Proc. of IEEE ICASSP, Kyoto, Japan, Mar. 25--30, pp. 1785--1788, 2012
[8]
F. Huang, J. Huang, and Y. Q. Shi, "New channel selection rule for JPEG steganography," IEEE Trans. Information Forensics and Security, vol. 7, no. 4, pp. 1181--1191, 2012.
[9]
R. Crandall, "Some notes on steganography", Posted on Steganography Mailing List, 1998. http://os.inf.tu-dresden.de/~westfeld/crandall.pdf
[10]
A. Westfeld, "High capacity despite better steganalysis (F5-a steganographic algorithm)", in Proc. Information Hiding, 4th International Workshop, volume 2137 of Lecture Notes in Computer Science, pp. 289--302, 2001.
[11]
J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, "Writing on wet paper," IEEE Trans. Signal Processing, vol. 53, no. 10, pp. 3923--3935, 2005.
[12]
J. Fridrich, M. Goljan and D. Soukal, "Wet paper codes with improved embedding efficiency," IEEE Trans. Information Forensics and Security, vol. 1, no. 1, pp. 102--110, 2006.
[13]
Y. Kim, Z. Duric and D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Proc. Information Hiding Workshop 2006, LNCS 4437, pp. 314--327, 2007.
[14]
T. K. Moon, Error Correction Coding, Mathematical Methods and Algorithms. Hoboken, NJ: Wiley, 2005.
[15]
D. Schönfeld, A. Winkler, "Embedding with syndrome coding based on BCH codes," in Proc. the ACM Workshop on Multimedia & Security, Geneva, Switzerland, Sep. 26--27, pp. 214--223, 2006
[16]
R. Zhang, V. Sachnev, and H. J. Kim, "Fast BCH syndrome coding for steganography," in Proc. Information Hiding Workshop 2009, LNCS 5806, pp. 48--58, 2009.
[17]
J. Fridrich, and D. Soukal, "Matrix embedding for large payloads," IEEE Trans. Information Forensics and Security, vol. 1, no. 3, pp. 390--395, 2006.
[18]
F. Huang, J. Huang, and Y. Q. Shi, "Detecting double JPEG compression with the same quantization matrix," IEEE Trans. Information Forensics and Security, vol. 5, no. 4, pp. 848--856, 2010.
[19]
T. Filler, T. Pevny, and P. Bas. BOSS (Break Our Steganography System). http://www.agents.cz/boss, July 2010.
[20]
P. Shllee, Matlab JPEG Toolbox {Online}. Available: http://www.philsallee.com/jpegtbx/index.html
[21]
J. Kodovský and J. Fridrich, "Calibration revisited," in Proc. the ACM Multimedia & Security Workshop, Princeton, New Jersey, Sep. 7--9, pp. 63--74, 2009.
[22]
T. Pevný, P. Bas, ad J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Information Forensics and Security, vol. 52, no. 2, pp. 215--224, 2010
[23]
J. Kodovský, T. Pevný, and J. Fridrich, "Modern steganalysis can detect YASS," in Proc. SPIE, Electronic Imaging, Security Forensics of Multimedia XII, San Jose, California, Jan. 17-21, 2010, vol. 7541, pp. 0201--0211.
[24]
T. Pevný and J. Fridrich, "Merging Markov and DCT features for multi-class JPEG steganalysis," in Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, Jan. 28 - Feb. 1, 2007, vol. 6505, pp. 03.1--03.13
[25]
F. Huang, J. Huang, and Y. Q. Shi, "An experimental study on the security performance of YASS," IEEE Trans. Information Forensics and Security, vol. 5, no. 3, pp. 374--380, 2010.
[26]
J. Kodovský and J. Fridrich, "Steganalysis of JPEG images using rich models," in Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, San Francisco, CA, Jan. 23-25, 2012, vol. 8303, pp. A-1-A-13.
[27]
J. Fridrich and J. Kodovský, "Rich models for steganalysis of digital images," IEEE Trans. Information Forensics and Security, vol. 7, no. 3, pp. 868--882, 2012.
[28]
Q. Liu, A. Sung, and M. Qiao, "Neighboring joint density-based JPEG Steganalysis," ACM Transactions on Intelligent Systems and Technology, vol. 2, no. 2, pp. 1--16, 2011.
[29]
P. Sallee, "Model based methods for steganography and steganalysis," International Journal of Image Graphics, vol. 5, no. 1, pp. 167--190, 2005.
[30]
W. Luo, F. Huang, and J. Huang, "Edge adaptive image steganography based on LSB matching revisited," IEEE Trans. Information Forensics and Security, vol. 5, no. 2, pp. 201--214, 2010.
[31]
T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Proc. Information Hiding Workshop 2010, LNCS 6387, pp. 161--177, 2010
[32]
K. Solanki, A. Sarkar, and B. S. Manjunath, "YASS: Yet another steganographic scheme that resists blind steganalysis," in Proc. Information Hiding Workshop 2007, LNCS 4567, pp. 16--31, 2007.
[33]
A. Sarkar, K. Solanki, and B. S. Manjunath, "Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis," in Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, 2008, vol. 6819, pp. 17.1--17.11.
[34]
J. Kodovský, J. Fridrich and V. Holub, "Ensemble calssifiers for steganalysis of digital media," IEEE Trans. Information Forensics and Security, vol. 2, no. 7, pp. 432--444, 2012

Cited By

View all
  • (2023)Advanced Information Securing by Combining Fortified Binary Image Steganography and Asymmetric Encryption StandardInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-8089(175-178)Online publication date: 7-Feb-2023
  • (2022)JPEG Steganography Based on Successive Cancellation Decoding of Polar Codes2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)10.1109/IRASET52964.2022.9738088(1-6)Online publication date: 3-Mar-2022
  • (2020)On More Paradigms of SteganalysisCyber Warfare and Terrorism10.4018/978-1-7998-2466-4.ch045(723-740)Online publication date: 2020
  • Show More Cited By

Index Terms

  1. Distortion function designing for JPEG steganography with uncompressed side-image

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IH&MMSec '13: Proceedings of the first ACM workshop on Information hiding and multimedia security
    June 2013
    242 pages
    ISBN:9781450320818
    DOI:10.1145/2482513
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 June 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. JPEG
    2. security
    3. steganography

    Qualifiers

    • Research-article

    Conference

    IH&MMSec '13
    Sponsor:

    Acceptance Rates

    IH&MMSec '13 Paper Acceptance Rate 27 of 74 submissions, 36%;
    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 08 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Advanced Information Securing by Combining Fortified Binary Image Steganography and Asymmetric Encryption StandardInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-8089(175-178)Online publication date: 7-Feb-2023
    • (2022)JPEG Steganography Based on Successive Cancellation Decoding of Polar Codes2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)10.1109/IRASET52964.2022.9738088(1-6)Online publication date: 3-Mar-2022
    • (2020)On More Paradigms of SteganalysisCyber Warfare and Terrorism10.4018/978-1-7998-2466-4.ch045(723-740)Online publication date: 2020
    • (2019)RETRACTED ARTICLE: A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficientsJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-019-01345-811:5(1889-1901)Online publication date: 11-Jun-2019
    • (2019)Designing adaptive JPEG steganography based on the statistical properties in spatial domainMultimedia Tools and Applications10.1007/s11042-018-6747-178:7(8655-8665)Online publication date: 1-Apr-2019
    • (2018)A New Universal Steganalyzer for JPEG ImagesMachine Learning and Intelligent Communications10.1007/978-3-319-73564-1_15(145-157)Online publication date: 21-Jan-2018
    • (2018)Covert Communication by Exploring Statistical and Linguistical Distortion in TextCloud Computing and Security10.1007/978-3-030-00015-8_25(288-301)Online publication date: 13-Sep-2018
    • (2017)Improved reversible data hiding in JPEG images based on new coefficient selection strategyEURASIP Journal on Image and Video Processing10.1186/s13640-017-0206-12017:1Online publication date: 6-Sep-2017
    • (2017)Adaptive Text Steganography by Exploring Statistical and Linguistical Distortion2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)10.1109/DSC.2017.16(145-150)Online publication date: Jun-2017
    • (2016)On More Paradigms of SteganalysisInternational Journal of Digital Crime and Forensics10.4018/IJDCF.20160401018:2(1-15)Online publication date: 1-Apr-2016
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media