Multiple Messages Embedding Using DCT-Based Mod4 Steganographic Method

  • KokSheik Wong
  • Kiyoshi Tanaka
  • Xiaojun Qi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4105)


This paper proposes an extension of DCT-based Mod4 steganographic method to realize multiple messages embedding (MME). To implement MME, we utilize the structural feature of Mod4 that uses vGQC ( valid group of 2 ×2 adjacent quantized DCT coefficients) as message carrier. vGQC’s can be partitioned into several disjoint sets by differentiating the parameters where each set could serve as an individual secret communication channel. A maximum number of 14 independent messages can be embedded into a cover image without interfering one message and another. We can generate stego images with image quality no worse than conventional Mod4. Results for blind steganalysis are also shown.


Cover Image Secret Message Stego Image JPEG Image Steganographic Method 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Katzenbeisser, S., Petitcolas, F.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers (2000)Google Scholar
  2. 2.
    Matsui, K., Tanaka, K.: Video steganography: - how to secretly embed a signature in a picture. In: IMA Intellectual Property Project Proceedings, vol. 1, pp. 187–206 (1994)Google Scholar
  3. 3.
    Provos, N.: Defending against statistical steganalysis. In: Proceeding of the 10th USENIX Security Symposium, pp. 323–335 (2001)Google Scholar
  4. 4.
    Westfeld, A.: F5-A steganographic algorithm - high capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Iwata, M., Miyake, K., Shiozaki, A.: Digital steganography utilizing features of JPEG images. IEICE Transaction Fundamentals E87-A, 929–936 (2004)Google Scholar
  7. 7.
    Qi, X., Wong, K.: A novel mod4-based steganographic method. In: International Conference Image Processing ICIP, Genova, Italy, pp. 297–300 (2005)Google Scholar
  8. 8.
    Fridrich, J.: Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Wang, Z., Bovik, A.: A universal image quality index. IEEE Signal Processing Letters 9, 81–84 (2002)CrossRefGoogle Scholar
  10. 10.
    Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  11. 11.
    Fridrich, J., Goljan, M., Hogea, D.: Attacking the outguess. In: Proceeding of the ACM Workshop on Multimedia and Security, Juan-les-Pins, France, pp. 967–982 (2002)Google Scholar
  12. 12.
    Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • KokSheik Wong
    • 1
  • Kiyoshi Tanaka
    • 1
  • Xiaojun Qi
    • 2
  1. 1.Faculty of EngineeringShinshu UniversityNaganoJapan
  2. 2.Department of Computer ScienceUtah State UniversityLoganUSA

Personalised recommendations