skip to main content
10.1145/1597817.1597841acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding

Published:07 September 2009Publication History

ABSTRACT

This paper presents an efficient JPEG steganography method based on heuristic optimization and BCH syndrome coding. The proposed heuristic optimization technique significantly decreases total distortion by inserting and removing AC coefficients 1 or -1 in the most appropriate positions. The implemented data hiding technique is based on structured BCH syndrome coding. This method achieves multiple solutions for hiding data to a block of coefficients. The proposed data hiding method chooses the best solution with minimum distortion effect. As a result, the total distortion can be significantly reduced, which results in less detectability of the steganalysis. The experiments include the steganalysis of the proposed data hiding methods. The experiment results shows that the proposed heuristic optimization significantly decreases detectability of the steganalysis. The proposed methods also outperform the existing steganography methods.

References

  1. Upham:phhttp://www.funet.fi/pub/crypt/stegangraphy/jpeg-jsteg-v4.diff.gz.Google ScholarGoogle Scholar
  2. J. Eggers, R. Bauml, and B. Girod: A communicationsapproach to steganography. Proc. of EI SPIE, vol. 4675, San Jose, CA, 2002, 26--37.Google ScholarGoogle Scholar
  3. R. T. Chien, "Cyclic decoding produce for theBose-Chaudhuri-Hocquenghem codes," IEEE Transactions onInformation Theory, vol. 11, pp. 549--557, 1965.Google ScholarGoogle Scholar
  4. J. Fridrich: Minimizing the embedding impact in steganography. Proc. of ACM Multimedia and Security Workshop, Geneva, Switzerland, September 26-27, 2006, 2--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Fridrich: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Lecture Notes in Computer Science, vol. 3200, 2005, 67--81. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Fridrich and T. Filler: Practical methods for minimizing embedding impact in steganography. Proc. EI SPIE, vol. 6505, San Jose, CA, 2007, 2--3.Google ScholarGoogle ScholarCross RefCross Ref
  7. J. Fridrich, M. Goljan, and D. Soukal: Perturbed quantization steganography with wet paper codes. Proc. of ACM Workshop on Multimedia and Security, Magdeburg, Germany, September 20-21,2004, 4--15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Fridrich, T. Pevny, and J. Kodovsky: Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. Proc. of ACM Workshop on Multimedia and Security, Dallas, Texas, September 20-21, 2007, 3--15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Y. H. Kim, Z. Duric, and D. Richards, Modified matrix encoding technique for minimal distrotion steganography. Information Hiding, 8th International Workshop, vol. 4437 LNSC, pp. 314--327, Springer-Verlag, Berlin, 2006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. H. Noda, M. Niimi, and E. Kawaguchi: Application of QIM with dead zone for histogram preserving JPEG steeganography. Proc. of ICIP, Genova, Italy, 2005.Google ScholarGoogle Scholar
  11. T. Pevny and J. Fridrich: Multiclass blind steganalysis for JPEG images. Proc. of SPIE, vol. 6072, San Jose, CA, January 16-19, 2006, 257--269.Google ScholarGoogle Scholar
  12. T. Pevny and J. Fridrich: Merging Markov and DCT features for multi-class JPEG steganalysis. Proc. of SPIE, vol. 6505, San Jose, CA, 2007, 3--4.Google ScholarGoogle ScholarCross RefCross Ref
  13. N. Provos: Defending against statistical steganalysis. Proc. of 10th USENIX Security Symposium, Washington, DC, 2001, 24--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. V. Sachnev, H. J. Kim, R. Zhang, and Y. S. Choi: A novel approach for JPEG steganography. Proc. of 7th International Workshop on Digital Watermarking 2008, Busan, Korea, November 10-12, 2008, 216--226.Google ScholarGoogle Scholar
  15. P. Sallee. Model-based steganography. Digital Watermarking, 2nd International Workshop, IWDW 2003, Seoul, Korea, October 20-21, 2003, vol. 2939 LNCS, pages 154--167. Springer-Verlag, New York, 2004.Google ScholarGoogle Scholar
  16. D. Schönfeld and A. Winkler: Embedding with syndrome coding based on BCH codes. Proc. of ACM workshop on Multimedia and security, 2006, 214--223.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. Schönfeld and A. Winkler: Reducing the complexity of syndrome coding for embedding. Lecture Notes in Computer Science, vol. 4567, 2008, 145--158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. K. Solanki, A. Sakar, and B. S. Manjunath. YASS: Yet another steganographic scheme that resists blind steganalysis. Information Hiding, 9th International Workshop Saint Malo, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Westfeld: High capacity despite better steganalysis (F5 - a steganographic algorithm). Lecture Notes in Computer Science, vol. 2137, 2001, 289--302.Google ScholarGoogle ScholarCross RefCross Ref
  20. Z. Zhao, F. Wu, S. Yu, and J. Zhou: A lookup table based fast algorithm for finding roots of quadratic or cubic polynomials in the GF(2m). Journal of Huazhong University of Science and Technology (Nature Science Edition), vol. 33(2):70, April 2005.Google ScholarGoogle Scholar
  21. R. Zhang, V. Sachnev, and H. J. Kim: Fast BCH syndrome coding for steganography. Proc. of 11th International Workshop on Information Hiding.Google ScholarGoogle Scholar

Index Terms

  1. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MM&Sec '09: Proceedings of the 11th ACM workshop on Multimedia and security
      September 2009
      186 pages
      ISBN:9781605584928
      DOI:10.1145/1597817

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 September 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate128of318submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader