skip to main content
10.1145/3206004.3206008acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Defining Joint Distortion for JPEG Steganography

Published: 14 June 2018 Publication History

Abstract

Recent studies have shown that the non-additive distortion model of Decomposing Joint Distortion ($DeJoin$) can work well for spatial image steganography by defining joint distortion with the principle of Synchronizing Modification Directions (SMD). However, no principles have yet produced to instruct the definition of joint distortion for JPEG steganography. Experimental results indicate that SMD can not be directly used for JPEG images, which means that simply pursuing modification directions clustered does not help improve the steganographic security. In this paper, we inspect the embedding change from the spatial domain and propose a principle of Block Boundary Continuity (BBC) for defining JPEG joint distortion, which aims to restrain blocking artifacts caused by inter-block adjacent modifications and thus effectively preserve the spatial continuity at block boundaries. According to BBC, whether inter-block adjacent modifications should be synchronized or desynchronized is related to the DCT mode and the adjacent direction of inter-block coefficients (horizontal or vertical). When built into $DeJoin$, experiments demonstrate that BBC does help improve state-of-the-art additive distortion schemes in terms of relatively large embedding payloads against modern JPEG steganalyzers.

References

[1]
Patrick Bas, Tomávs Filler, and Tomávs Pevnỳ . 2011. " Break Our Steganographic System": The Ins and Outs of Organizing BOSS Information Hiding. Springer, 59--70.
[2]
Tomávs Denemark and Jessica Fridrich . 2015. Improving steganographic security by synchronizing the selection channel Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. ACM, 5--14.
[3]
Tomávs Filler and Jessica Fridrich . 2010. Gibbs construction in steganography. IEEE Transactions on Information Forensics and Security Vol. 5, 4 (2010), 705--720.
[4]
Tomávs Filler, Jan Judas, and Jessica Fridrich . 2011. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security Vol. 6, 3 (2011), 920--935.
[5]
Jessica Fridrich . 2009. Steganography in digital media: principles, algorithms, and applications. Cambridge University Press.
[6]
Jessica Fridrich and Tomas Filler . 2007. Practical methods for minimizing embedding impact in steganography Electronic Imaging 2007. International Society for Optics and Photonics, 650502--650502.
[7]
Linjie Guo, Jiangqun Ni, and Yun Qing Shi . 2014. Uniform embedding for efficient JPEG steganography. IEEE transactions on Information Forensics and Security Vol. 9, 5 (2014), 814--825.
[8]
Linjie Guo, Jiangqun Ni, Wenkang Su, Chengpei Tang, and Yun-Qing Shi . 2015. Using statistical image model for JPEG steganography: uniform embedding revisited. IEEE Transactions on Information Forensics and Security Vol. 10, 12 (2015), 2669--2680.
[9]
Vojtvech Holub and Jessica Fridrich . 2015. Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Transactions on Information Forensics and Security Vol. 10, 2 (2015), 219--228.
[10]
Vojtvech Holub, Jessica Fridrich, and Tomávs Denemark . 2014. Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security Vol. 2014, 1 (2014), 1.
[11]
Andrew D Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomávs Filler, Jessica Fridrich, and Tomávs Pevnỳ . 2013. Moving steganography and steganalysis from the laboratory into the real world Proceedings of the first ACM workshop on Information hiding and multimedia security. ACM, 45--58.
[12]
Jan Kodovsky, Jessica Fridrich, and Vojtvech Holub . 2012. Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security Vol. 7, 2 (2012), 432--444.
[13]
Bin Li, Junhui He, Jiwu Huang, and Yun Qing Shi . 2011. A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing Vol. 2, 2 (2011), 142--172.
[14]
Bin Li, Ming Wang, Xiaolong Li, Shunquan Tan, and Jiwu Huang . 2015. A strategy of clustering modification directions in spatial image steganography. IEEE Transactions on Information Forensics and Security Vol. 10, 9 (2015), 1905--1917.
[15]
Yuanfeng Pan, Jiangqun Ni, and Wenkang Su . 2016. Improved Uniform Embedding for Efficient JPEG Steganography International Conference on Cloud Computing and Security. Springer, 125--133.
[16]
Tomás Pevnỳ and Jessica J Fridrich . 2008. Benchmarking for Steganography. In Information Hiding, Vol. Vol. 5284. Springer, 251--267.
[17]
Xiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, and Yi Zhang . 2015. Steganalysis of adaptive JPEG steganography using 2D Gabor filters Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. ACM, 15--23.
[18]
Zichi Wang, Xinpeng Zhang, and Zhaoxia Yin . 2016. Hybrid distortion function for JPEG steganography. Journal of Electronic Imaging Vol. 25, 5 (2016), 050501--050501.
[19]
Qingde Wei, Zhaoxia Yin, Zichi Wang, and Xinpeng Zhang . 2017. Distortion function based on residual blocks for JPEG steganography. Multimedia Tools and Applications (2017), 1--14.
[20]
Weiming Zhang, Zhuo Zhang, Lili Zhang, Hanyi Li, and Nenghai Yu . 2017. Decomposing joint distortion for adaptive steganography. IEEE Transactions on Circuits and Systems for Video Technology Vol. 27, 10 (2017), 2274--2280.

Cited By

View all
  • (2024)Image Steganography and Style Transformation Based on Generative Adversarial NetworkMathematics10.3390/math1204061512:4(615)Online publication date: 19-Feb-2024
  • (2024)Upward Robust Steganography Based on Overflow AlleviationIEEE Transactions on Multimedia10.1109/TMM.2023.326462826(299-312)Online publication date: 2024
  • (2024)An efficient steganography scheme based on wavelet transformation for side-information estimationJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2024.10210936:6(102109)Online publication date: Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IH&MMSec '18: Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security
June 2018
152 pages
ISBN:9781450356251
DOI:10.1145/3206004
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 June 2018

Permissions

Request permissions for this article.

Check for updates

Badges

  • Best Student Paper

Author Tags

  1. block boundary continuity
  2. joint distortion
  3. jpeg image
  4. non-additive model
  5. steganography

Qualifiers

  • Research-article

Funding Sources

  • Natural Science Foundation of China

Conference

IH&MMSec '18
Sponsor:

Acceptance Rates

IH&MMSec '18 Paper Acceptance Rate 18 of 40 submissions, 45%;
Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Image Steganography and Style Transformation Based on Generative Adversarial NetworkMathematics10.3390/math1204061512:4(615)Online publication date: 19-Feb-2024
  • (2024)Upward Robust Steganography Based on Overflow AlleviationIEEE Transactions on Multimedia10.1109/TMM.2023.326462826(299-312)Online publication date: 2024
  • (2024)An efficient steganography scheme based on wavelet transformation for side-information estimationJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2024.10210936:6(102109)Online publication date: Jul-2024
  • (2023)STD-NET: Search of Image Steganalytic Deep-Learning Architecture Via Hierarchical Tensor DecompositionIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.3267065(1-18)Online publication date: 2023
  • (2023)A Robust and Secure Image to Multi-Images Steganography2023 IEEE International Conference on Contemporary Computing and Communications (InC4)10.1109/InC457730.2023.10263182(1-5)Online publication date: 21-Apr-2023
  • (2023)A Resilient Approach to Robust JPEG Steganography: Ensuring Hidden Data Integrity2023 International Conference on Integrated Intelligence and Communication Systems (ICIICS)10.1109/ICIICS59993.2023.10421695(1-6)Online publication date: 24-Nov-2023
  • (2023)Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanismScience China Information Sciences10.1007/s11432-021-3453-566:3Online publication date: 21-Feb-2023
  • (2022)Efficient Steganography in JPEG Images by Minimizing Performance of Optimal DetectorIEEE Transactions on Information Forensics and Security10.1109/TIFS.2021.311171317(1328-1343)Online publication date: 2022
  • (2022)NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video SteganographyIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.3182148(1-16)Online publication date: 2022
  • (2022)Towards improving the security of image steganography via minimizing the spatial embedding impactDigital Signal Processing10.1016/j.dsp.2022.103758131:COnline publication date: 1-Nov-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media