Multimedia Tools and Applications

, Volume 76, Issue 3, pp 3649–3668 | Cite as

Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection

  • Yi Zhang
  • Xiangyang Luo
  • Chunfang Yang
  • Fenlin Liu
Article

Abstract

Since it is difficult to acquire a strong JPEG compression resistant ability while achieving a good detection resistant performance for current information hiding algorithms, a JPEG compression and detection resistant adaptive steganography algorithm using feature regions is proposed. Based on the proposed feature region extraction and selection algorithms, the embedding domain robust to JPEG compression and containing less embedding distortion can be obtained. Utilizing the current distortion functions, the distortion value of DCT coefficients in the embedding domain can be calculated. Combined with error correct coding and STCs, the messages are embedded into the cover images with minimum embedding distortion, and can be extracted with high accuracy after JPEG compression, hence, the JPEG compression and detection resistant performance are enhanced at the same time. The experimental results demonstrate that comparing with current J-UNIWARD steganography under quality factor 85 of JPEG compression, the extraction error rates decrease from above 20 % to nearly 0, while the stego images remain a better detection resistant performance comparing with the current JPEG compression and detection resistant adaptive steganography algorithm.

Keywords

Adaptive steganography JPEG-compression resistant Detection resistant Feature regions selection Genetic algorithm 

References

  1. 1.
    Denemark T, Fridrich J (2015) Side-informed steganography with additive distortion. In: Proceedings of international workshop on information forensics and security. IEEE, pp 1–6Google Scholar
  2. 2.
    Filler T, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. IS&T/SPIE electronic imaging. Int Soc Optics Photon 78800F–78800F-14Google Scholar
  3. 3.
    Filler T, Judas J, Fridrich J (2010) Minimizing embedding impact in steganography using trellis-coded quantization. IS&T/SPIE electronic imaging. Int Soc Optics Photon:754105–754105-14Google Scholar
  4. 4.
    Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forens Secur 6(3):920–935CrossRefGoogle Scholar
  5. 5.
    Fridrich J, Pevný T, Kodovský J (2007) Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: Proceedings of the 9th workshop on multimedia & security. ACM, pp 3–14Google Scholar
  6. 6.
    Galand F, Kabatiansky G (2003) Information hiding by coverings. In: Proceedings of the workshop on information theory. IEEE, pp 151–154Google Scholar
  7. 7.
    Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Proceedings of the international workshop on information forensics and security. IEEE, pp 234–239Google Scholar
  8. 8.
    Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the 1st ACM workshop on information hiding and multimedia security. ACM, pp 59–68Google Scholar
  9. 9.
    Kodovský J, Fridrich J (2009) Calibration revisited. In: Proceedings of the 11th workshop on multimedia and security. ACM, pp 63–74Google Scholar
  10. 10.
    Li B, Tan S, Wang M et al (2014) Investigation on cost assignment in spatial image steganography. IEEE Trans Inf Forens Secur 9(8):1264–1277CrossRefGoogle Scholar
  11. 11.
    Li B, Wang M, Huang J et al (2014) A new cost function for spatial image steganography. In: Proceedings of international conference on image processing. IEEE, pp 4206–4210Google Scholar
  12. 12.
    Li C, Zhang Z, Wang Y et al (2015) Dither modulation of significant amplitude difference for wavelet based robust watermarking. Neurocomputing 166:404–415CrossRefGoogle Scholar
  13. 13.
    Liu W, Liu G, Dai Y (2015) Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency. Secur Commun Netw 8(9):1636–1647CrossRefGoogle Scholar
  14. 14.
    Luo W, Heileman G L, Pizano C E (2002) Fast and robust watermarking of JPEG files. In: s Proceedings of the 5th Southwest symposium on image analysis and interpretation. IEEE, pp 158–162Google Scholar
  15. 15.
    Makbol N M, Khoo B E (2014) A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. Digit Signal Process 10(33):134–147CrossRefGoogle Scholar
  16. 16.
    Mikolajczyk K, Schmid C (2001) Indexing based on scale invariant interest points. In: Proceedings of the 8th international conference on computer vision, vol 1. IEEE, pp 525–531Google Scholar
  17. 17.
    Mikolajczyk K, Schmid C (2004) Scale & affine invariant interest point detectors. Int J Comput Vis 60(1):63–86CrossRefGoogle Scholar
  18. 18.
    Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: International workshop on information hiding. Springer Berlin Heidelberg, pp 161–177Google Scholar
  19. 19.
    Pevný T, Fridrich J (2008) Multiclass detector of current steganographic methods for JPEG format. IEEE Trans Inf Forens Secur 3(4):635–650CrossRefGoogle Scholar
  20. 20.
    Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forens Secur 11(2):221–234CrossRefGoogle Scholar
  21. 21.
    Tsai J S, Huang W B, Kuo Y H (2011) On the selection of optimal feature region set for robust digital image watermarking. IEEE Trans Image Process 20(3):735–743MathSciNetCrossRefGoogle Scholar
  22. 22.
    Tsai J S, Huang W B, Kuo Y H et al (2012) Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions. Signal Process 92(6):1431–1445CrossRefGoogle Scholar
  23. 23.
    Wang X, Niu P, Yang H et al (2014) A new robust color image watermarking using local quaternion exponent moments. Inf Sci 277:731–754CrossRefGoogle Scholar
  24. 24.
    Zhang Y, Luo X, Yang C et al A framework of adaptive steganography resisting JPEG compression and detection. Secur Commun Netw. in press. 10.1002/sec.1502
  25. 25.
    Zhang Y, Luo X, Yang C et al (2015) A JPEG-compression resistant adaptive steganography based on relative relationship between DCT coefficients. In: Proceedings of the 10th international conference on availability, reliability and security. IEEE, pp 461–466Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.State Key Laboratory of Mathematical Engineering and Advanced ComputingZhengzhouChina
  2. 2.Zhengzhou Science and Technology InstituteZhengzhouChina
  3. 3.Key Laboratory of Science and Technology on Information AssuranceBeijingChina

Personalised recommendations