Abstract
In this paper, we present several methods to improve performance of the existing data hiding method for JPEG steganography. Recent JPEG steganographic methods usually exploit minimum distortion strategy, where each DCT coefficients has predefined distortion value. Such strategy uses the best solution for data hiding with minimum cumulative distortion. Steganographic methods based on hiding data using the best solution with minimum distortion have better chance to pass powerful steganalysis presented in literature. Thus, the key point for such methods is a way to compute distortion for each DCT coefficient. In this paper, we present three different ways to compute distortion and search for parameters, where proposed functions show the best results. BCH-based method has been used as a tool for data hiding. Experimental results show that the presented distortion functions with the best parameters show better results compared to traditional approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chen, C., Shi, Y.Q.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Proceedings of the IEEE Internernational Symposium on Circuits and Systems, pp. 3029–3032 (2008)
Chien, R.T.: Cyclic decoding produce for the Bose-Chaudhuri-Hocquenghem codes. IEEE Transactions on Information Theory 11, 549–557 (1965)
Eggers, J., Bauml, R., Girod, B.: A communications approach to image steganography. In: Proceedings of SPIE: Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 26–37 (2002)
Filler, T., Fridrich, J.: Steganography using Gibbs random fields. In: Proceedings of ACM Multimedia and Security Workshop, pp. 199–212 (2010)
Filler, T., Judas, J., Fridrich, J.: Minimizing embedding impact in steganography using trellis-coded quantization. In: Proceedings of SPIE, vol. 7541, pp. 1–14 (2010)
Fridrich, J.: Minimizing the embedding impact in steganography. In: Proceedings of ACM Multimedia and Security Workshop, pp. 2–10 (2006)
Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)
Fridrich, J., Filler, T.: Practical methods for minimizing embedding impact in steganography. In: Proceedings of SPIE, vol. 6505, pp. 2–3 (2007)
Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography using wet paper codes. In: Proceedings of ACM Workshop on Multimedia and Security, pp. 4–15 (2004)
Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography. ACM Multimedia and Security Journal 11(2), 98–107 (2005)
Fridrich, J., Pevny, T., Kodovsky, J.: Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In: Proceedings of ACM Workshop on Multimedia and Security, pp. 3–15 (2007)
Fridrich, J., Goljan, M., Soukal, D.: Wet paper coding with improved embedding efficiency. IEEE Transactions on Information Security and Forensics 1(1), 102–110 (2005)
Kim, Y.H., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314–327. Springer, Heidelberg (2007)
Kodovsky, J., Fridrich, J.: Calibration revisited. In: Dittmann, J., Craver, S., Fridrich, J. (eds.) Proceedings of the 11th ACM Multimedia & Security Workshop, Princeton, NJ, September 7-8 (2009)
Kodovsk, J., Fridrich, J.: Steganalysis in high dimensions: fusing classifiers built on random subspaces. In: SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, San Francisco, CA, January 23-26 (2011)
Lin, S., Costello, D.J.: Error Control Coding, 2nd edn. Prentice-Hall (2004)
Noda, H., Niimi, M., Kawaguchi, E.: Application of QIM with dead zone for histogram preserving JPEG steeganography. In: Proceedings of Initernational Conference on Image Processing, vol. II, pp. 1082–1085 (2005)
Pevny, T., Fridrich, J.: Multiclass blind steganalysis for JPEG images. In: Proceedings of SPIE, vol. 6072, pp. 257–269 (2006)
Pevny, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE, San Jose, CA, vol. 6505, pp. 311–314 (2007)
Provos, N.: Defending against statistical steganalysis. In: Proceedings of 10th USENIX Security Symposium, Washington, DC, pp. 24–24 (2001)
Sachnev, V., Kim, H.J., Zhang, R., Choi, Y.S.: A novel approach for JPEG steganography. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T.S. (eds.) IWDW 2008. LNCS, vol. 5450, pp. 209–217. Springer, Heidelberg (2009)
Sachnev, V., Kim, H.J., Zhang, R.: Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In: Proceedings of ACM Workshop on Multimedia and Security, pp. 131–139 (2009)
Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)
Schöfeld, D., Winkler, A.: Embedding with syndrome coding based on BCH codes. In: Proceedings of ACM Workshop on Multimedia and Security, pp. 214–223 (2006)
Schönfeld, D., Winkler, A.: Reducing the complexity of syndrome coding for embedding. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 145–158. Springer, Heidelberg (2008)
Shi, Y.Q., Chen, C.-H., Chen, W.: A markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)
Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16–31. Springer, Heidelberg (2008)
Westfeld, A.: F5–A steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Zhao, Z., Wu, F., Yu, S., Zhou, J.: A lookup table based fast algorithm for finding roots of quadratic or cubic polynomials in the GF(2m). Journal of Huazhong University of Science and Technology (Nature Science Edition)Â 33, xx-xx (2005)
Zhang, R., Sachnev, V., Kim, H.J.: Fast BCH syndrome coding for steganography. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol. 5806, pp. 48–58. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sachnev, V., Kim, H.J. (2013). An Attempt to Generalize Distortion Measure for JPEG Steganography. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-40099-5_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40098-8
Online ISBN: 978-3-642-40099-5
eBook Packages: Computer ScienceComputer Science (R0)