ABSTRACT
This paper presents an efficient JPEG steganography method based on heuristic optimization and BCH syndrome coding. The proposed heuristic optimization technique significantly decreases total distortion by inserting and removing AC coefficients 1 or -1 in the most appropriate positions. The implemented data hiding technique is based on structured BCH syndrome coding. This method achieves multiple solutions for hiding data to a block of coefficients. The proposed data hiding method chooses the best solution with minimum distortion effect. As a result, the total distortion can be significantly reduced, which results in less detectability of the steganalysis. The experiments include the steganalysis of the proposed data hiding methods. The experiment results shows that the proposed heuristic optimization significantly decreases detectability of the steganalysis. The proposed methods also outperform the existing steganography methods.
- Upham:phhttp://www.funet.fi/pub/crypt/stegangraphy/jpeg-jsteg-v4.diff.gz.Google Scholar
- J. Eggers, R. Bauml, and B. Girod: A communicationsapproach to steganography. Proc. of EI SPIE, vol. 4675, San Jose, CA, 2002, 26--37.Google Scholar
- R. T. Chien, "Cyclic decoding produce for theBose-Chaudhuri-Hocquenghem codes," IEEE Transactions onInformation Theory, vol. 11, pp. 549--557, 1965.Google Scholar
- J. Fridrich: Minimizing the embedding impact in steganography. Proc. of ACM Multimedia and Security Workshop, Geneva, Switzerland, September 26-27, 2006, 2--10. Google ScholarDigital Library
- J. Fridrich: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Lecture Notes in Computer Science, vol. 3200, 2005, 67--81. Google ScholarDigital Library
- J. Fridrich and T. Filler: Practical methods for minimizing embedding impact in steganography. Proc. EI SPIE, vol. 6505, San Jose, CA, 2007, 2--3.Google ScholarCross Ref
- J. Fridrich, M. Goljan, and D. Soukal: Perturbed quantization steganography with wet paper codes. Proc. of ACM Workshop on Multimedia and Security, Magdeburg, Germany, September 20-21,2004, 4--15. Google ScholarDigital Library
- J. Fridrich, T. Pevny, and J. Kodovsky: Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. Proc. of ACM Workshop on Multimedia and Security, Dallas, Texas, September 20-21, 2007, 3--15. Google ScholarDigital Library
- Y. H. Kim, Z. Duric, and D. Richards, Modified matrix encoding technique for minimal distrotion steganography. Information Hiding, 8th International Workshop, vol. 4437 LNSC, pp. 314--327, Springer-Verlag, Berlin, 2006 Google ScholarDigital Library
- H. Noda, M. Niimi, and E. Kawaguchi: Application of QIM with dead zone for histogram preserving JPEG steeganography. Proc. of ICIP, Genova, Italy, 2005.Google Scholar
- T. Pevny and J. Fridrich: Multiclass blind steganalysis for JPEG images. Proc. of SPIE, vol. 6072, San Jose, CA, January 16-19, 2006, 257--269.Google Scholar
- T. Pevny and J. Fridrich: Merging Markov and DCT features for multi-class JPEG steganalysis. Proc. of SPIE, vol. 6505, San Jose, CA, 2007, 3--4.Google ScholarCross Ref
- N. Provos: Defending against statistical steganalysis. Proc. of 10th USENIX Security Symposium, Washington, DC, 2001, 24--24. Google ScholarDigital Library
- V. Sachnev, H. J. Kim, R. Zhang, and Y. S. Choi: A novel approach for JPEG steganography. Proc. of 7th International Workshop on Digital Watermarking 2008, Busan, Korea, November 10-12, 2008, 216--226.Google Scholar
- P. Sallee. Model-based steganography. Digital Watermarking, 2nd International Workshop, IWDW 2003, Seoul, Korea, October 20-21, 2003, vol. 2939 LNCS, pages 154--167. Springer-Verlag, New York, 2004.Google Scholar
- D. Schönfeld and A. Winkler: Embedding with syndrome coding based on BCH codes. Proc. of ACM workshop on Multimedia and security, 2006, 214--223.Google ScholarDigital Library
- D. Schönfeld and A. Winkler: Reducing the complexity of syndrome coding for embedding. Lecture Notes in Computer Science, vol. 4567, 2008, 145--158. Google ScholarDigital Library
- K. Solanki, A. Sakar, and B. S. Manjunath. YASS: Yet another steganographic scheme that resists blind steganalysis. Information Hiding, 9th International Workshop Saint Malo, 2007. Google ScholarDigital Library
- A. Westfeld: High capacity despite better steganalysis (F5 - a steganographic algorithm). Lecture Notes in Computer Science, vol. 2137, 2001, 289--302.Google ScholarCross Ref
- Z. Zhao, F. Wu, S. Yu, and J. Zhou: A lookup table based fast algorithm for finding roots of quadratic or cubic polynomials in the GF(2m). Journal of Huazhong University of Science and Technology (Nature Science Edition), vol. 33(2):70, April 2005.Google Scholar
- R. Zhang, V. Sachnev, and H. J. Kim: Fast BCH syndrome coding for steganography. Proc. of 11th International Workshop on Information Hiding.Google Scholar
Index Terms
- Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
Recommendations
A JPEG-based statistically invisible steganography
ICIMCS '11: Proceedings of the Third International Conference on Internet Multimedia Computing and ServiceThe objective of steganography is to implement covert communication by hiding data in digital files such that there is no indication of the existence of hidden data; so an ideal steganographic system should be able to withstand all steganalysis methods--...
A steganographic method based upon JPEG and quantization table modification
Special issue: Intelligent multimedia computing and networkingIn this paper, a novel steganographic method based on joint photographic expert-group (JPEG) is proposed. The proposed method modifies the quantization table first. Next, the secret message is hidden in the cover-image with its middle-frequency of the ...
An improved matrix encoding scheme for JPEG steganography
IWDW'11: Proceedings of the 10th international conference on Digital-Forensics and WatermarkingThis paper presents an efficient JPEG steganography method based on improved matrix encoding. Compared to the original matrix encoding (ME), the proposed improved matrix encoding uses two intersected ME blocks of the DCT coefficients as a single ...
Comments