Skip to main content
Erschienen in: Annals of Telecommunications 7-8/2014

01.08.2014

Adaptive JPEG steganography with new distortion function

verfasst von: Fengyong Li, Xinpeng Zhang, Jiang Yu, Wenfeng Shen

Erschienen in: Annals of Telecommunications | Ausgabe 7-8/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper presents an adaptive steganographic scheme in JPEG images by designing a novel distortion function. While some previous works employed distortion functions based on coefficient difference, we point out that the data embedding on coefficients with larger absolute values may cause less steganalytic detectability. In the proposed scheme, the distortion function is derived from both the coefficient residual and coefficient value, which measures the risks of detection due to the modification on cover data. With an exhaustive searching method, the parameters of the proposed distortion function are optimized. Then, we may employ syndrome trellis coding to embed the secret data into JPEG images when keeping a low risk. This way, the modifications are forced into high textured areas in JPEG images, and experimental results demonstrate that the steganographic security is improved by the designed distortion function.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sallee P (1997) Model-based methods for steganography and steganalysis. Int J Image Graph 5(1):167–190CrossRef Sallee P (1997) Model-based methods for steganography and steganalysis. Int J Image Graph 5(1):167–190CrossRef
2.
Zurück zum Zitat Fridrich J, Pevny T, Kodovsky J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In: Proceedings of 9th ACM multimedia & security workshop, pp 3–14 Fridrich J, Pevny T, Kodovsky J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In: Proceedings of 9th ACM multimedia & security workshop, pp 3–14
3.
Zurück zum Zitat Solanki K, Sarkar A, Manjunath BS (2007) YASS: yet another steganographic scheme that resists blind steganalysis. Information Hiding, 9th International Workshop 4437:249–264CrossRef Solanki K, Sarkar A, Manjunath BS (2007) YASS: yet another steganographic scheme that resists blind steganalysis. Information Hiding, 9th International Workshop 4437:249–264CrossRef
4.
Zurück zum Zitat Kim Y, Duric Z, Richards D (2006) Modified matrix encoding technique for minimal distortion steganography. Information Hiding, 8th International Workshop 4437:314–327CrossRef Kim Y, Duric Z, Richards D (2006) Modified matrix encoding technique for minimal distortion steganography. Information Hiding, 8th International Workshop 4437:314–327CrossRef
5.
Zurück zum Zitat Sachnev V, Kim H, Zhang R (2009) Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In: Proceedings of the 11th ACM multimedia & security workshop, pp 131–140 Sachnev V, Kim H, Zhang R (2009) Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In: Proceedings of the 11th ACM multimedia & security workshop, pp 131–140
6.
Zurück zum Zitat Pevny T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. Information Hiding, 12th International Workshop 6387:161–177 Pevny T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. Information Hiding, 12th International Workshop 6387:161–177
8.
Zurück zum Zitat Yang X, Guo D, Li J (2013) An image steganography based on multi-layered syndrome-trellis codes in DWT domain. In: 32nd IEEE Chinese control conference (CCC), pp 3738–3743 Yang X, Guo D, Li J (2013) An image steganography based on multi-layered syndrome-trellis codes in DWT domain. In: 32nd IEEE Chinese control conference (CCC), pp 3738–3743
9.
Zurück zum Zitat Guo L, Ni J, Shi Y (2012) An efficient JPEG steganographic scheme using uniform embedding, IEEE Workshop on information forensics and security, December 2–5. Tenerife Guo L, Ni J, Shi Y (2012) An efficient JPEG steganographic scheme using uniform embedding, IEEE Workshop on information forensics and security, December 2–5. Tenerife
10.
Zurück zum Zitat Penvy T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215– 224CrossRef Penvy T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215– 224CrossRef
11.
Zurück zum Zitat Gul G, Kurugollu F (2011) A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO). Information Hiding, 13th International Workshop 6958:71–84CrossRef Gul G, Kurugollu F (2011) A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO). Information Hiding, 13th International Workshop 6958:71–84CrossRef
12.
Zurück zum Zitat Chen L, Shi Y, Sutthiwan P, Niu X (2013) A novel mapping scheme for steganalysis. Int Work Digit Water-Marking 7809:19–33 Chen L, Shi Y, Sutthiwan P, Niu X (2013) A novel mapping scheme for steganalysis. Int Work Digit Water-Marking 7809:19–33
13.
Zurück zum Zitat Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. IEEE Workshop on information forensics and security, December 2–5. Tenerife Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. IEEE Workshop on information forensics and security, December 2–5. Tenerife
14.
Zurück zum Zitat Filler T, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. In: Proceedings of SPIE, electronic imaging, media watermarking, security and forensics of multimedia XIII, vol 7880, pp 1–14 Filler T, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. In: Proceedings of SPIE, electronic imaging, media watermarking, security and forensics of multimedia XIII, vol 7880, pp 1–14
15.
Zurück zum Zitat Kodovsky J, Fridrich J, Holub V (2011) On dangers of overtraining steganography to incomplete cover model. In: Proceedings of the 13th ACM multimedia & security workshop, pp 69–76 Kodovsky J, Fridrich J, Holub V (2011) On dangers of overtraining steganography to incomplete cover model. In: Proceedings of the 13th ACM multimedia & security workshop, pp 69–76
16.
Zurück zum Zitat Huang F, Huang J, Shi Y (2012) New channel selection rule for JPEG steganography. IEEE Trans Inf Forensic Secur 7(4):1181–1191CrossRef Huang F, Huang J, Shi Y (2012) New channel selection rule for JPEG steganography. IEEE Trans Inf Forensic Secur 7(4):1181–1191CrossRef
17.
Zurück zum Zitat Pevny T, Fridrich J (2007) Merging markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE, electronic imaging, security, steganography, and watermarking of multimedia contents IX, vol 6505, pp 3 1–3 14 Pevny T, Fridrich J (2007) Merging markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE, electronic imaging, security, steganography, and watermarking of multimedia contents IX, vol 6505, pp 3 1–3 14
18.
Zurück zum Zitat Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifier for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432–444CrossRef Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifier for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432–444CrossRef
19.
Zurück zum Zitat Kodovsky J, Fridrich J (2012) Steganalysis of JPEG images using rich models. In: Proceedings of SPIE, electronic imaging, media watermarking, security, and forensics of multimedia XIV, January 22–26. San Francisco Kodovsky J, Fridrich J (2012) Steganalysis of JPEG images using rich models. In: Proceedings of SPIE, electronic imaging, media watermarking, security, and forensics of multimedia XIV, January 22–26. San Francisco
20.
Zurück zum Zitat Kodovsky J, Fridrich J (2009) Calibration revisited. In: Proceedings of 11th ACM multimedia & security workshop, pp 7–8 Kodovsky J, Fridrich J (2009) Calibration revisited. In: Proceedings of 11th ACM multimedia & security workshop, pp 7–8
Metadaten
Titel
Adaptive JPEG steganography with new distortion function
verfasst von
Fengyong Li
Xinpeng Zhang
Jiang Yu
Wenfeng Shen
Publikationsdatum
01.08.2014
Verlag
Springer Paris
Erschienen in
Annals of Telecommunications / Ausgabe 7-8/2014
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-013-0415-2

Weitere Artikel der Ausgabe 7-8/2014

Annals of Telecommunications 7-8/2014 Zur Ausgabe

Neuer Inhalt