Skip to main content
Top
Published in: Annals of Telecommunications 7-8/2014

01-08-2014

Adaptive JPEG steganography with new distortion function

Authors: Fengyong Li, Xinpeng Zhang, Jiang Yu, Wenfeng Shen

Published in: Annals of Telecommunications | Issue 7-8/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper presents an adaptive steganographic scheme in JPEG images by designing a novel distortion function. While some previous works employed distortion functions based on coefficient difference, we point out that the data embedding on coefficients with larger absolute values may cause less steganalytic detectability. In the proposed scheme, the distortion function is derived from both the coefficient residual and coefficient value, which measures the risks of detection due to the modification on cover data. With an exhaustive searching method, the parameters of the proposed distortion function are optimized. Then, we may employ syndrome trellis coding to embed the secret data into JPEG images when keeping a low risk. This way, the modifications are forced into high textured areas in JPEG images, and experimental results demonstrate that the steganographic security is improved by the designed distortion function.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sallee P (1997) Model-based methods for steganography and steganalysis. Int J Image Graph 5(1):167–190CrossRef Sallee P (1997) Model-based methods for steganography and steganalysis. Int J Image Graph 5(1):167–190CrossRef
2.
go back to reference Fridrich J, Pevny T, Kodovsky J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In: Proceedings of 9th ACM multimedia & security workshop, pp 3–14 Fridrich J, Pevny T, Kodovsky J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In: Proceedings of 9th ACM multimedia & security workshop, pp 3–14
3.
go back to reference Solanki K, Sarkar A, Manjunath BS (2007) YASS: yet another steganographic scheme that resists blind steganalysis. Information Hiding, 9th International Workshop 4437:249–264CrossRef Solanki K, Sarkar A, Manjunath BS (2007) YASS: yet another steganographic scheme that resists blind steganalysis. Information Hiding, 9th International Workshop 4437:249–264CrossRef
4.
go back to reference Kim Y, Duric Z, Richards D (2006) Modified matrix encoding technique for minimal distortion steganography. Information Hiding, 8th International Workshop 4437:314–327CrossRef Kim Y, Duric Z, Richards D (2006) Modified matrix encoding technique for minimal distortion steganography. Information Hiding, 8th International Workshop 4437:314–327CrossRef
5.
go back to reference Sachnev V, Kim H, Zhang R (2009) Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In: Proceedings of the 11th ACM multimedia & security workshop, pp 131–140 Sachnev V, Kim H, Zhang R (2009) Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In: Proceedings of the 11th ACM multimedia & security workshop, pp 131–140
6.
go back to reference Pevny T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. Information Hiding, 12th International Workshop 6387:161–177 Pevny T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. Information Hiding, 12th International Workshop 6387:161–177
8.
go back to reference Yang X, Guo D, Li J (2013) An image steganography based on multi-layered syndrome-trellis codes in DWT domain. In: 32nd IEEE Chinese control conference (CCC), pp 3738–3743 Yang X, Guo D, Li J (2013) An image steganography based on multi-layered syndrome-trellis codes in DWT domain. In: 32nd IEEE Chinese control conference (CCC), pp 3738–3743
9.
go back to reference Guo L, Ni J, Shi Y (2012) An efficient JPEG steganographic scheme using uniform embedding, IEEE Workshop on information forensics and security, December 2–5. Tenerife Guo L, Ni J, Shi Y (2012) An efficient JPEG steganographic scheme using uniform embedding, IEEE Workshop on information forensics and security, December 2–5. Tenerife
10.
go back to reference Penvy T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215– 224CrossRef Penvy T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215– 224CrossRef
11.
go back to reference Gul G, Kurugollu F (2011) A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO). Information Hiding, 13th International Workshop 6958:71–84CrossRef Gul G, Kurugollu F (2011) A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO). Information Hiding, 13th International Workshop 6958:71–84CrossRef
12.
go back to reference Chen L, Shi Y, Sutthiwan P, Niu X (2013) A novel mapping scheme for steganalysis. Int Work Digit Water-Marking 7809:19–33 Chen L, Shi Y, Sutthiwan P, Niu X (2013) A novel mapping scheme for steganalysis. Int Work Digit Water-Marking 7809:19–33
13.
go back to reference Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. IEEE Workshop on information forensics and security, December 2–5. Tenerife Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. IEEE Workshop on information forensics and security, December 2–5. Tenerife
14.
go back to reference Filler T, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. In: Proceedings of SPIE, electronic imaging, media watermarking, security and forensics of multimedia XIII, vol 7880, pp 1–14 Filler T, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. In: Proceedings of SPIE, electronic imaging, media watermarking, security and forensics of multimedia XIII, vol 7880, pp 1–14
15.
go back to reference Kodovsky J, Fridrich J, Holub V (2011) On dangers of overtraining steganography to incomplete cover model. In: Proceedings of the 13th ACM multimedia & security workshop, pp 69–76 Kodovsky J, Fridrich J, Holub V (2011) On dangers of overtraining steganography to incomplete cover model. In: Proceedings of the 13th ACM multimedia & security workshop, pp 69–76
16.
go back to reference Huang F, Huang J, Shi Y (2012) New channel selection rule for JPEG steganography. IEEE Trans Inf Forensic Secur 7(4):1181–1191CrossRef Huang F, Huang J, Shi Y (2012) New channel selection rule for JPEG steganography. IEEE Trans Inf Forensic Secur 7(4):1181–1191CrossRef
17.
go back to reference Pevny T, Fridrich J (2007) Merging markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE, electronic imaging, security, steganography, and watermarking of multimedia contents IX, vol 6505, pp 3 1–3 14 Pevny T, Fridrich J (2007) Merging markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE, electronic imaging, security, steganography, and watermarking of multimedia contents IX, vol 6505, pp 3 1–3 14
18.
go back to reference Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifier for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432–444CrossRef Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifier for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432–444CrossRef
19.
go back to reference Kodovsky J, Fridrich J (2012) Steganalysis of JPEG images using rich models. In: Proceedings of SPIE, electronic imaging, media watermarking, security, and forensics of multimedia XIV, January 22–26. San Francisco Kodovsky J, Fridrich J (2012) Steganalysis of JPEG images using rich models. In: Proceedings of SPIE, electronic imaging, media watermarking, security, and forensics of multimedia XIV, January 22–26. San Francisco
20.
go back to reference Kodovsky J, Fridrich J (2009) Calibration revisited. In: Proceedings of 11th ACM multimedia & security workshop, pp 7–8 Kodovsky J, Fridrich J (2009) Calibration revisited. In: Proceedings of 11th ACM multimedia & security workshop, pp 7–8
Metadata
Title
Adaptive JPEG steganography with new distortion function
Authors
Fengyong Li
Xinpeng Zhang
Jiang Yu
Wenfeng Shen
Publication date
01-08-2014
Publisher
Springer Paris
Published in
Annals of Telecommunications / Issue 7-8/2014
Print ISSN: 0003-4347
Electronic ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-013-0415-2

Other articles of this Issue 7-8/2014

Annals of Telecommunications 7-8/2014 Go to the issue