Skip to main content
Log in

A secure adaptive Hidden Markov Model-based JPEG steganography method

(J-HMMSteg)

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This study introduces J-HMMSteg, an adaptive and secure JPEG image steganography technique designed for data embedding with minimal distortion. J-HMMSteg employed a block-wise analysis approach to detect shifts in image statistics and was performed in three phases. Firstly, it constructed statistical features of the images by analyzing intra-interblock correlations of quantized Discrete Cosine Transform (DCT) coefficients. Secondly, it utilized these features to create the Hidden Markov Model (HMM) of the images to capture complex characteristics such as smoothness, regularity, continuity, consistency, and periodicity. Finally, JHMMSteg utilized a maximum likelihood embedder driven by a threshold using Kullback-Leibler Divergence (KLD). The embedder maintained an optimal correlation by limiting the number of coefficients changed within a block according to its threshold; this ensured that only permissible distortions were introduced. This resulted in a stego image with minimal deviation from the HMM of the cover image’s statistical distribution. The experimental analysis of J-HMMSteg was conducted on a database of 85000 JPEG images against four state-of-the-art approaches; the results demonstrated that J-HMMSteg was highly imperceptible, robust against RS steganalysis, and enhanced security against ensemble steganalysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Availability of data and materials

The images supporting this study’s findings consist of two disjoint sets that are freely available. The BOSSbase 1.01 is available at https://dde.binghamton.edu/download and consists of 10,000 grayscale images of size 512\(\times \)512. The ALASKA2 is available at www.kaggle.com/alaska2images and comprises 75,000 color images of size 256\(\times \)256. These 85,000 images are compressed in the JPEG domain with a quality factor of 75 and resized to 512\(\times \)512 for analysis during this study.

References

  1. Laishram D, Tuithung T (2018) A survey on digital image steganography: current trends and challenges. SSRN Electron J 10:2139. https://doi.org/10.2139/ssrn.3171494

    Article  Google Scholar 

  2. Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: Survey and analysis of current methods. Signal Proc 90:727–752. https://doi.org/10.1016/j.sigpro.2009.08.010

    Article  Google Scholar 

  3. Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. Inf Hid 161–177. https://doi.org/10.1007/978-3-642-16435-4_13

  4. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. IEEE Int Workshop Inf Forensic Sec 234–239. https://doi.org/10.1109/WIFS.2012.6412655

  5. Holub V, Fridrich J (2013) Digital image steganography using universal distortion. ACM Inf Hid Multimed Sec Workshop 59–68. https://doi.org/10.1145/2482513.2482514

  6. Li B, Wang M, Huang J, Li X (2015) A new cost function for spatial image steganography. IEEE Int Conf Image Process 4206–4210. https://doi.org/10.1109/ICIP.2014.7025854

  7. Guo L, Ni J, Shi YQ (2014) Uniform embedding for efficient JPEG steganography. IEEE Trans Inf Forensic Sec 9:814–825. https://doi.org/10.1109/TIFS.2014.2312817

    Article  Google Scholar 

  8. Guo L, Ni J, Su W, Tang C, Shi YQ (2015) Using statistical image model for JPEG steganography: Uniform embedding revisited. IEEE Trans Inf Forensic Sec 10:669–2680. https://doi.org/10.1109/TIFS.2015.2473815

    Article  Google Scholar 

  9. Pan Y, Ni J, Su W (2016) Improved uniform embedding for efficient jpeg steganography. Lect Notes Comput Sci 10039:125–132. https://doi.org/10.1007/978-3-319-48671-0_12

    Article  Google Scholar 

  10. Wang Z, Zhang X, Zhaoxia Y (2016) Hybrid distortion function for JPEG steganography. J Electron Imaging 25:050501. https://doi.org/10.1117/1.JEI.25.5.050501

    Article  Google Scholar 

  11. Qingde W, Zhaoxia Y, Zichi W, Zhang X (2018) Distortion function based on residual blocks for JPEG steganography. Multimed Tool Appl 77:17875–17888. https://doi.org/10.1007/s11042-017-5053-7

    Article  Google Scholar 

  12. Butora J, Yousfi Y, Fridrich J (2020) Turning cost-based steganography into model-based. ACM Workshop Inf Hid Multimed Sec 151–159. https://doi.org/10.1145/3369412.3395065

  13. Sallee P (2013) Model-based steganography. Digit Watermark Lect Notes Comp Sci 2939:154–167. https://doi.org/10.1007/978-3-540-24624-4_12

    Article  Google Scholar 

  14. Fridrich J, Kodovsky J (2013) Multivariate Gaussian model for designing additive distortion for steganography. Int Conf Acoust Speech Signal Process 2949–2953. https://doi.org/10.1109/ICASSP.2013.6638198

  15. Sedighi V, Fridrich J, Cogranne R (2015) Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model. In: Proceedings of Media Watermarking, Security, and Forensics 4909, p 94090H. https://doi.org/10.1117/12.2080272

  16. Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensic Sec 11:221–234. https://doi.org/10.1109/TIFS.2015.2486744

    Article  Google Scholar 

  17. Laishram D, Tuithung T (2021) A novel minimal distortion-based edge adaptive image steganography scheme using local complexity. Multimed Tool Appl 80:831–854. https://doi.org/10.1007/s11042-020-09519-9

    Article  Google Scholar 

  18. Laishram D, Tuithung T, Jeneetaa T (2021) Fuzzy edge image steganography using hybrid LSB method. Springer Adv Intell Sys Comp 1382:249–258. https://doi.org/10.1007/978-3-030-76736-5_23

    Article  Google Scholar 

  19. Wang Z, Yin ZZ, Zhang X (2017) Distortion function for JPEG steganography based on image texture and correlation in DCT domain. IETE Techn Rev 35:351–358. https://doi.org/10.1080/02564602.2017.1304289

    Article  Google Scholar 

  20. Su A, Ma S, Zhao X (2020) Fast and secure steganography based on J-UNIWARD. IEEE Signal Process Lett 27:221–225. https://doi.org/10.1109/LSP.2020.2964485

    Article  Google Scholar 

  21. Tang W, Li B, Barni M, Li J, Huang J (2022) Improving cost learning for JPEG steganography by exploiting JPEG domain knowledge. IEEE Trans Circ Sys Video Tech 32:4081–4095. https://doi.org/10.1109/TCSVT.2021.3115600

    Article  Google Scholar 

  22. Wang Y, Zhang W, Li W, Yu N (2021) Non-additive cost functions for JPEG steganography based on block boundary maintenance. IEEE Trans Inf Forensic Sec 16:1117–1130. https://doi.org/10.1109/TIFS.2020.3029908

    Article  Google Scholar 

  23. Chen C, Shi YQ (2008) JPEG image steganalysis utilizing both intrablock and interblock correlations. IEEE Int Symp Circ Sys (ISCAS) 3029–3032. https://doi.org/10.1109/ISCAS.2008.4542096

  24. Rabee AM, Mohamed, Mahdy YB (2018) Blind JPEG steganalysis based on DCT coefficients differences. Multimed Tool Appl 77:7763–7777. https://doi.org/10.1007/s11042-017-4676-z

  25. Sallee P (2005) Model-based methods for steganography and steganalysis, international journal of image and graphics 5:167–189. https://doi.org/10.1142/S0219467805001719

  26. Wang Z, Yin Z, Zhang X (2017) Distortion function for JPEg steganography based on image texture and correlations in DCT domain. IETE Techn Rev 35:351–358. https://doi.org/10.1080/02564602.2017.1304289

    Article  Google Scholar 

  27. Holub V, Fridrich J (2015) Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forensic Sec 10:219–228. https://doi.org/10.1109/TIFS.2014.2364918

    Article  Google Scholar 

  28. Kontorovich A, Nadler B, Weiss R (2013) On learning parametric-output HMMs. In: Proceedings of the 30th International Conference on Machine Learning 28, pp 702–710

  29. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13:285–287. https://doi.org/10.1109/LSP.2006.870357

    Article  Google Scholar 

  30. Piyathilaka L, Kodagoda S (2013) Gaussian mixture-based HMM for human daily activity recognition using 3D skeleton features. In: Proceedings of the IEEE 8th conference on industrial electronics and applications. https://doi.org/10.1109/ICIEA.2013.6566433

  31. Setiadi DIM (2021) PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tool Appl 80:8423–8444. https://doi.org/10.1007/s11042-020-10035-z

  32. Fridrich J, Goljan M (2002) Practical steganalysis of digital images: state of the art. Sec Watermark Multimed Contents IV 4675:1–13. https://doi.org/10.1117/12.465263

    Article  Google Scholar 

  33. Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensic Sec 7:432–444. https://doi.org/10.1109/TIFS.2011.2175919

    Article  Google Scholar 

  34. Fawcett T (2004) Roc graphs: Notes and practical considerations for researchers. Mach Learn 31:1–38. https://doi.org/10.1007/s10994-020-05909-0

  35. Sedighi V, Cogranne R, Fridrich J (2015) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensic Sec 11:221–234. https://doi.org/10.1109/TIFS.2015.2486744

    Article  Google Scholar 

Download references

Funding

None of the authors of this paper has a financial or personal relationship with other people or organizations that could inappropriately influence or bias the paper’s content.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Debina Laishram.

Ethics declarations

Competing interests

It is to specifically state that “No Competing interests are at stake and there is No Conflict of Interest” with other people or organizations that could inappropriately influence or bias the paper’s content.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Laishram, D., Tuithung, T. A secure adaptive Hidden Markov Model-based JPEG steganography method. Multimed Tools Appl 83, 38883–38908 (2024). https://doi.org/10.1007/s11042-023-17152-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17152-5

Keywords

Navigation