Signal and Information Processing

Adaptive JPEG Steganography Based on New Distortion Cost Function

Expand
  • 1. School of Communication and Information Engineering, Shanghai University,
    Shanghai 200444, China
    2. College of Mathematics and Computer Science, Fuzhou University,
    Fuzhou 350108, China

Received date: 2014-12-03

  Revised date: 2014-12-16

  Online published: 2014-12-16

Abstract

To improve security of steganography, this paper proposes an adaptive steganographic
scheme for JPEG images based on a new distortion cost function. As texture areas
in a cover image are more suitable for information embedding, the sum of absolute values
of all non-zero quantized DCT coefficients in a DCT block is used to measure texture of
the block. Combining the previous uniform embedding scheme, a new distortion cost function
is defined. With syndrome trellis codes, embedding modification spreads uniformly
over DCT coefficients of all possible magnitudes, embedding secret data adaptively into
the texture areas in the cover. Experimental results show that the proposed scheme out
performs the prior arts in terms of security with the same low payload.

Cite this article

XU Miao1, CHENG Hang1,2, YU Jiang1, ZHANG Xin-peng1 . Adaptive JPEG Steganography Based on New Distortion Cost Function[J]. Journal of Applied Sciences, 2015 , 33(3) : 290 -298 . DOI: 10.3969/j.issn.0255-8297.2015.03.007

References

[1] SALLEE P. Model-basedsteganography[M]. In: Proceedings of International Workshop on Digital Watermarking. Springer-Verlag, LNCS 2939, 2004: 154-167.

[2] CRANDALL R. Some notes on steganography[J]. Posted on Steganography Mailing List, 1998.

[3] WESTFELD A. F5—A steganographic algorithm high capacity despite better steganalysis[C]// In: Proceedings of Information Hiding 4th International Workshop. Springer-Verlag, LNCS 2137, 2001: 289-302.

[4] KIM Y, DURIC Z, RICHARDS D. Modified matrix encoding technique for minimal distortion steganography[C]//In: Proceedings of 6th International Workshop on Information Hiding. Springer-Verlag, LNCS 4437, 2006: 314-327.

[5] FRIDRICH J, GOLJAN M, LISONEK P, SOUKAL D. Writing on wet paper[J]. IEEE Transactions on Signal Processing,Special Issue on Media Security.2004, 54(10): 3923-3935.

[6] FRIDRICH J, PEVNY T, KODOVSKY J. Statistically undetectableJPEG steganography: dead ends, challenges, and opportunities[C]//In: Proceedings of the 9th ACM Workshop on Multimedia & Security. New York: ACM Press, 2007: 3-14.

[7] FILLER T, JUDAS J, FRIDRICH J. Minimizing embedding impact in steganography using trellis-coded quantization[C]//In: Proceedings of SPIE, Electronic Imaging, Media Forensics and Security XII. San Jose, CA, 2010, 7541(5): 1-14.

[8] SACHNEV V, KIM H, ZHANG R. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding[C]//In: Proceedings of the 11th ACM Multimedia & Security Workshop. New Jersey, 2009: 131-139.

[9] GUO L J, NI J Q, SHI Y Q.Uniform embedding for efficient JPEG steganography[J].IEEE Transactions on Information Forensics and Security. 2014, 9(5): 814-825.

[10] GUO L J, NI J Q, SHI Y Q. An efficient JPEG steganographic scheme using uniform embedding[C]//IEEE International Workshop on Information Forensics and Security, Tenerife, 2012: 169 – 174.

[11] FILLER T, FRIDRICH J. Design of adaptive steganographic schemes for digital images[C]// In: Proceedings of SPIE Electronic Imaging, Media Watermarking, Security, and Forensics XIII. Bellingham: SPIE Press, 2011, 7880: 1-14.

[12] FILLER T, PENVY T, BAS P. BOSS (Break our steganography system)[J]. 2010.

[13] PEVNY T, FRIDRICH J. Merging markov and DCT features for multi-class JPEG steganalysis[C]//In: Proceedings of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX. Bellingham, Wash, 2007: 1-13.

[14] KODOVSKY J, FRIDRICH J. Calibration revisited[C]// In: Proceedings of 11th ACM Multimedia &Security Workshop. Princeton, New Jersey, USA, 2009: 63-74.

[15] KODOVSKY J, FRIDRICH J, HOLUB V. Ensemble classifier for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444.

[16] KODOVSKY J, FRIDRICH J. Steganalysis of JPEG images using rich models[C]// In: Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, San Francisco, CA, January 22-26, 2012.
Outlines

/