JPEG2000 Steganography Possibly Secure Against Histogram-Based Attack

  • Hideki Noda
  • Yohsuke Tsukamizu
  • Michiharu Niimi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4261)


This paper presents two steganographic methods for JPEG2000 still images which preserve histograms of discrete wavelet transform (DWT) coefficients. The first one is a histogram quasi- preserving method using quantization index modulation (QIM) with a dead zone in DWT domain. The second one is a histogram preserving method based on histogram matching using two quantizers with a dead zone. Comparing with a conventional JPEG2000 steganography, the two methods show better histogram preservation. The proposed methods are promising candidates for secure JPEG2000 steganography against histogram-based attack.


Discrete Cosine Transform Discrete Wavelet Transform Cover Image Dead Zone Secret Data 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
  2. 2.
    Westfeld, A.: F5 - A steganographic algorithm: high capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium (2001)Google Scholar
  4. 4.
    Eggers, J.J., Bauml, R., Girod, B.: A communications approach to image steganography. In: Proceedings of SPIE, vol. 4675, pp. 26–37 (2002)Google Scholar
  5. 5.
    Sallee, F.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Noda, H., Niimi, M., Kawaguchi, E.: High performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognition Letters 27, 455–461 (2006)CrossRefGoogle Scholar
  7. 7.
    Fridrich, J., Goljan, M., Hogea, D.: New methodology for breaking steganographic techniques for JPEGs. In: Proceedings of SPIE, vol. 5020, pp. 143–155 (2003)Google Scholar
  8. 8.
    Noda, H., Spaulding, J., Shirazi, M.N., Kawaguchi, E.: Application of bit-plane decomposition steganography to JPEG 2000 encoded images. IEEE Signal Processing Letters 9(12), 410–413 (2002)CrossRefGoogle Scholar
  9. 9.
    Su, P.C., Kuo, C.C.J.: Steganography in JPEG 2000 compressed images. IEEE Trans. on Consumer Electronics 49(4), 824–832 (2003)CrossRefGoogle Scholar
  10. 10.
    Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory 47(4), 1423–1443 (2001)MATHCrossRefMathSciNetGoogle Scholar
  11. 11.
    Rabbani, M., Joshi, R.: An overview of JPEG 2000 still image compression standard. Signal Processing: Image Communication 17, 3–48 (2002)CrossRefGoogle Scholar
  12. 12.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Hideki Noda
    • 1
  • Yohsuke Tsukamizu
    • 2
  • Michiharu Niimi
    • 1
  1. 1.Dept. of Systems Innovation and InformaticsKyushu Institute of TechnologyIizukaJapan
  2. 2.Dept. of Electrical, Electronic and Computer EngineeringKyushu Institute of TechnologyKitakyushuJapan

Personalised recommendations