New JPEG Steganographic Scheme with High Security Performance

  • Fangjun Huang
  • Yun Qing Shi
  • Jiwu Huang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6526)


In this paper, we present a new JPEG steganographic scheme. Three measures are taken in our method: 1) The secret message bits are not spread into the quantized block discrete cosine transform (BDCT) coefficients of all frequencies, and only those coefficients (including those of value 0) belonging to relatively low frequencies are selected for data embedding; 2) For any coefficients selected for embedding, the rounding error in JPEG quantization is utilized directly to guide the data embedding; 3) Matrix embedding. The experiments have demonstrated that these three measures can help to achieve small distortion in spatial domain, preserve the histogram of quantized block discrete cosine transform coefficients, and enhance the embedding efficiency of matrix embedding, etc. Consequently, the proposed steganographic scheme has achieved a high security performance. It can resist today’s most powerful JPEG steganalyzers effectively.


JPEG steganographic scheme BDCT Frequency 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
  2. 2.
  3. 3.
    Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington DC, USA (2001)Google Scholar
  4. 4.
    Westfeld, A.: High capacity despite better steganalysis (F5-a steganographic algorithm). In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Sallee, P.: Model based methods for steganography and steganalysis. International Journal of Image Graphics 5(1), 167–190 (2005)CrossRefGoogle Scholar
  6. 6.
    Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography with wet paper codes. In: Proc. the ACM Workshop on Multimedia and Security, Magdeburg, Germany, September 20-21, pp. 4–15 (2004)Google Scholar
  7. 7.
    Kim, Y., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314–327. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  8. 8.
    Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16–31. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  9. 9.
    Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–75. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  10. 10.
    Provos, N., Honeyman, P.: Detecting steganographic content on the Internet. CITI Technical Report 01-11 (August 2001)Google Scholar
  11. 11.
    Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. In: IEEE Security and Privacy, May/June, pp. 32–44 (2003)Google Scholar
  12. 12.
    Fridrich, J., Goljan, M., Du, R.: Attacking the OutGuess. In: Proc. the ACM Workshop on Multimedia and Security, Juan-les-Pins, France, December 6, pp. 3–6 (2002)Google Scholar
  13. 13.
    Böhme, R., Westfeld, A.: Breaking Cauchy model-based JPEG steganography with first order statistics. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 125–140. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  14. 14.
    Crandall, R.: Some notes on steganography. Steganography Mailing List (1998),
  15. 15.
    Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  16. 16.
    Fridrich, J., Pevny, T., Kodovsky, J.: Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities. In: Proc. the ACM Workshop on Multimedia and Security, Dallas, TX, September 20-21, pp. 3–14 (2007)Google Scholar
  17. 17.
    Pevny, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, vol. 6505, pp. 650503.1–650503.13 (2007)Google Scholar
  18. 18.
    Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  19. 19.
    Fu, D., Shi, Y.Q., Zou, D., Xuan, G.: JPEG steganalysis using empirical transition matrix in blick DCT domain. In: Proc. IEEE International Workshop on Multimedia Signal Processing, Victoria, BC, Canada (2006)Google Scholar
  20. 20.
    Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  21. 21.
    Chen, C., Shi, Y.Q.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Proc. IEEE International Symposium on Circuits and Systems, Seattle, WA, May 18-21 (2008)Google Scholar
  22. 22.
    Huang, F., Li, B., Huang, J.: Universal JPEG steganalysis based on microscopic and macroscopic calibration. In: Proc. IEEE International Conference on Image Processing, San Diego, California, U.S.A, October 12-15 (2008)Google Scholar
  23. 23.
    Huang, F., Huang, J.: Calibration based JPEG steganalysis. Science in China Series F: Information Sciences 52(2), 260–268 (2009)CrossRefzbMATHGoogle Scholar
  24. 24.
    Huang, F., Shi, Y.Q., Huang, J.: A study on the security performance of YASS. In: Proc. IEEE International Conference on Image Processing, San Diego, California, U.S.A, October 12-15 (2008)Google Scholar
  25. 25.
    Huang, F., Huang, J., Shi, Y.Q.: An experimental study on the security performance of YASS. IEEE Trans. Informaiton Forensics and Security 5(3), 374–380 (2010)CrossRefGoogle Scholar
  26. 26.
    Li, B., Huang, J., Shi, Y.Q.: Steganalysis of YASS. IEEE Trans. Information Forensics and Security 4(3), 369–382 (2009)CrossRefGoogle Scholar
  27. 27.
    Moon, T.K.: Error correction coding. Mathematical methods and algorithms. John Wiley & Sons, Inc., Hoboken (2005)CrossRefzbMATHGoogle Scholar
  28. 28.
  29. 29.
    CorelDraw Image CD,
  30. 30.
    Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines (2001),

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Fangjun Huang
    • 1
  • Yun Qing Shi
    • 2
  • Jiwu Huang
    • 1
  1. 1.School of Information Science and TechnologySun Yat-Sen UniversityGuangzhouChina
  2. 2.Department of Electrical and Computer EngineeringNew Jersey Institute of TechnologyNewarkUSA

Personalised recommendations