Abstract
This study introduces J-HMMSteg, an adaptive and secure JPEG image steganography technique designed for data embedding with minimal distortion. J-HMMSteg employed a block-wise analysis approach to detect shifts in image statistics and was performed in three phases. Firstly, it constructed statistical features of the images by analyzing intra-interblock correlations of quantized Discrete Cosine Transform (DCT) coefficients. Secondly, it utilized these features to create the Hidden Markov Model (HMM) of the images to capture complex characteristics such as smoothness, regularity, continuity, consistency, and periodicity. Finally, JHMMSteg utilized a maximum likelihood embedder driven by a threshold using Kullback-Leibler Divergence (KLD). The embedder maintained an optimal correlation by limiting the number of coefficients changed within a block according to its threshold; this ensured that only permissible distortions were introduced. This resulted in a stego image with minimal deviation from the HMM of the cover image’s statistical distribution. The experimental analysis of J-HMMSteg was conducted on a database of 85000 JPEG images against four state-of-the-art approaches; the results demonstrated that J-HMMSteg was highly imperceptible, robust against RS steganalysis, and enhanced security against ensemble steganalysis.
Similar content being viewed by others
Availability of data and materials
The images supporting this study’s findings consist of two disjoint sets that are freely available. The BOSSbase 1.01 is available at https://dde.binghamton.edu/download and consists of 10,000 grayscale images of size 512\(\times \)512. The ALASKA2 is available at www.kaggle.com/alaska2images and comprises 75,000 color images of size 256\(\times \)256. These 85,000 images are compressed in the JPEG domain with a quality factor of 75 and resized to 512\(\times \)512 for analysis during this study.
References
Laishram D, Tuithung T (2018) A survey on digital image steganography: current trends and challenges. SSRN Electron J 10:2139. https://doi.org/10.2139/ssrn.3171494
Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: Survey and analysis of current methods. Signal Proc 90:727–752. https://doi.org/10.1016/j.sigpro.2009.08.010
Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. Inf Hid 161–177. https://doi.org/10.1007/978-3-642-16435-4_13
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. IEEE Int Workshop Inf Forensic Sec 234–239. https://doi.org/10.1109/WIFS.2012.6412655
Holub V, Fridrich J (2013) Digital image steganography using universal distortion. ACM Inf Hid Multimed Sec Workshop 59–68. https://doi.org/10.1145/2482513.2482514
Li B, Wang M, Huang J, Li X (2015) A new cost function for spatial image steganography. IEEE Int Conf Image Process 4206–4210. https://doi.org/10.1109/ICIP.2014.7025854
Guo L, Ni J, Shi YQ (2014) Uniform embedding for efficient JPEG steganography. IEEE Trans Inf Forensic Sec 9:814–825. https://doi.org/10.1109/TIFS.2014.2312817
Guo L, Ni J, Su W, Tang C, Shi YQ (2015) Using statistical image model for JPEG steganography: Uniform embedding revisited. IEEE Trans Inf Forensic Sec 10:669–2680. https://doi.org/10.1109/TIFS.2015.2473815
Pan Y, Ni J, Su W (2016) Improved uniform embedding for efficient jpeg steganography. Lect Notes Comput Sci 10039:125–132. https://doi.org/10.1007/978-3-319-48671-0_12
Wang Z, Zhang X, Zhaoxia Y (2016) Hybrid distortion function for JPEG steganography. J Electron Imaging 25:050501. https://doi.org/10.1117/1.JEI.25.5.050501
Qingde W, Zhaoxia Y, Zichi W, Zhang X (2018) Distortion function based on residual blocks for JPEG steganography. Multimed Tool Appl 77:17875–17888. https://doi.org/10.1007/s11042-017-5053-7
Butora J, Yousfi Y, Fridrich J (2020) Turning cost-based steganography into model-based. ACM Workshop Inf Hid Multimed Sec 151–159. https://doi.org/10.1145/3369412.3395065
Sallee P (2013) Model-based steganography. Digit Watermark Lect Notes Comp Sci 2939:154–167. https://doi.org/10.1007/978-3-540-24624-4_12
Fridrich J, Kodovsky J (2013) Multivariate Gaussian model for designing additive distortion for steganography. Int Conf Acoust Speech Signal Process 2949–2953. https://doi.org/10.1109/ICASSP.2013.6638198
Sedighi V, Fridrich J, Cogranne R (2015) Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model. In: Proceedings of Media Watermarking, Security, and Forensics 4909, p 94090H. https://doi.org/10.1117/12.2080272
Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensic Sec 11:221–234. https://doi.org/10.1109/TIFS.2015.2486744
Laishram D, Tuithung T (2021) A novel minimal distortion-based edge adaptive image steganography scheme using local complexity. Multimed Tool Appl 80:831–854. https://doi.org/10.1007/s11042-020-09519-9
Laishram D, Tuithung T, Jeneetaa T (2021) Fuzzy edge image steganography using hybrid LSB method. Springer Adv Intell Sys Comp 1382:249–258. https://doi.org/10.1007/978-3-030-76736-5_23
Wang Z, Yin ZZ, Zhang X (2017) Distortion function for JPEG steganography based on image texture and correlation in DCT domain. IETE Techn Rev 35:351–358. https://doi.org/10.1080/02564602.2017.1304289
Su A, Ma S, Zhao X (2020) Fast and secure steganography based on J-UNIWARD. IEEE Signal Process Lett 27:221–225. https://doi.org/10.1109/LSP.2020.2964485
Tang W, Li B, Barni M, Li J, Huang J (2022) Improving cost learning for JPEG steganography by exploiting JPEG domain knowledge. IEEE Trans Circ Sys Video Tech 32:4081–4095. https://doi.org/10.1109/TCSVT.2021.3115600
Wang Y, Zhang W, Li W, Yu N (2021) Non-additive cost functions for JPEG steganography based on block boundary maintenance. IEEE Trans Inf Forensic Sec 16:1117–1130. https://doi.org/10.1109/TIFS.2020.3029908
Chen C, Shi YQ (2008) JPEG image steganalysis utilizing both intrablock and interblock correlations. IEEE Int Symp Circ Sys (ISCAS) 3029–3032. https://doi.org/10.1109/ISCAS.2008.4542096
Rabee AM, Mohamed, Mahdy YB (2018) Blind JPEG steganalysis based on DCT coefficients differences. Multimed Tool Appl 77:7763–7777. https://doi.org/10.1007/s11042-017-4676-z
Sallee P (2005) Model-based methods for steganography and steganalysis, international journal of image and graphics 5:167–189. https://doi.org/10.1142/S0219467805001719
Wang Z, Yin Z, Zhang X (2017) Distortion function for JPEg steganography based on image texture and correlations in DCT domain. IETE Techn Rev 35:351–358. https://doi.org/10.1080/02564602.2017.1304289
Holub V, Fridrich J (2015) Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forensic Sec 10:219–228. https://doi.org/10.1109/TIFS.2014.2364918
Kontorovich A, Nadler B, Weiss R (2013) On learning parametric-output HMMs. In: Proceedings of the 30th International Conference on Machine Learning 28, pp 702–710
Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13:285–287. https://doi.org/10.1109/LSP.2006.870357
Piyathilaka L, Kodagoda S (2013) Gaussian mixture-based HMM for human daily activity recognition using 3D skeleton features. In: Proceedings of the IEEE 8th conference on industrial electronics and applications. https://doi.org/10.1109/ICIEA.2013.6566433
Setiadi DIM (2021) PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tool Appl 80:8423–8444. https://doi.org/10.1007/s11042-020-10035-z
Fridrich J, Goljan M (2002) Practical steganalysis of digital images: state of the art. Sec Watermark Multimed Contents IV 4675:1–13. https://doi.org/10.1117/12.465263
Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensic Sec 7:432–444. https://doi.org/10.1109/TIFS.2011.2175919
Fawcett T (2004) Roc graphs: Notes and practical considerations for researchers. Mach Learn 31:1–38. https://doi.org/10.1007/s10994-020-05909-0
Sedighi V, Cogranne R, Fridrich J (2015) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensic Sec 11:221–234. https://doi.org/10.1109/TIFS.2015.2486744
Funding
None of the authors of this paper has a financial or personal relationship with other people or organizations that could inappropriately influence or bias the paper’s content.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing interests
It is to specifically state that “No Competing interests are at stake and there is No Conflict of Interest” with other people or organizations that could inappropriately influence or bias the paper’s content.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Laishram, D., Tuithung, T. A secure adaptive Hidden Markov Model-based JPEG steganography method. Multimed Tools Appl 83, 38883–38908 (2024). https://doi.org/10.1007/s11042-023-17152-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-17152-5