Skip to main content

An Attempt to Generalize Distortion Measure for JPEG Steganography

  • Conference paper
The International Workshop on Digital Forensics and Watermarking 2012 (IWDW 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7809))

Included in the following conference series:

  • 2087 Accesses

Abstract

In this paper, we present several methods to improve performance of the existing data hiding method for JPEG steganography. Recent JPEG steganographic methods usually exploit minimum distortion strategy, where each DCT coefficients has predefined distortion value. Such strategy uses the best solution for data hiding with minimum cumulative distortion. Steganographic methods based on hiding data using the best solution with minimum distortion have better chance to pass powerful steganalysis presented in literature. Thus, the key point for such methods is a way to compute distortion for each DCT coefficient. In this paper, we present three different ways to compute distortion and search for parameters, where proposed functions show the best results. BCH-based method has been used as a tool for data hiding. Experimental results show that the presented distortion functions with the best parameters show better results compared to traditional approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, C., Shi, Y.Q.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Proceedings of the IEEE Internernational Symposium on Circuits and Systems, pp. 3029–3032 (2008)

    Google Scholar 

  2. Chien, R.T.: Cyclic decoding produce for the Bose-Chaudhuri-Hocquenghem codes. IEEE Transactions on Information Theory 11, 549–557 (1965)

    Article  Google Scholar 

  3. Eggers, J., Bauml, R., Girod, B.: A communications approach to image steganography. In: Proceedings of SPIE: Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 26–37 (2002)

    Google Scholar 

  4. Filler, T., Fridrich, J.: Steganography using Gibbs random fields. In: Proceedings of ACM Multimedia and Security Workshop, pp. 199–212 (2010)

    Google Scholar 

  5. Filler, T., Judas, J., Fridrich, J.: Minimizing embedding impact in steganography using trellis-coded quantization. In: Proceedings of SPIE, vol. 7541, pp. 1–14 (2010)

    Google Scholar 

  6. Fridrich, J.: Minimizing the embedding impact in steganography. In: Proceedings of ACM Multimedia and Security Workshop, pp. 2–10 (2006)

    Google Scholar 

  7. Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Fridrich, J., Filler, T.: Practical methods for minimizing embedding impact in steganography. In: Proceedings of SPIE, vol. 6505, pp. 2–3 (2007)

    Google Scholar 

  9. Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography using wet paper codes. In: Proceedings of ACM Workshop on Multimedia and Security, pp. 4–15 (2004)

    Google Scholar 

  10. Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography. ACM Multimedia and Security Journal 11(2), 98–107 (2005)

    Article  Google Scholar 

  11. Fridrich, J., Pevny, T., Kodovsky, J.: Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In: Proceedings of ACM Workshop on Multimedia and Security, pp. 3–15 (2007)

    Google Scholar 

  12. Fridrich, J., Goljan, M., Soukal, D.: Wet paper coding with improved embedding efficiency. IEEE Transactions on Information Security and Forensics 1(1), 102–110 (2005)

    Article  Google Scholar 

  13. Kim, Y.H., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314–327. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  14. Kodovsky, J., Fridrich, J.: Calibration revisited. In: Dittmann, J., Craver, S., Fridrich, J. (eds.) Proceedings of the 11th ACM Multimedia & Security Workshop, Princeton, NJ, September 7-8 (2009)

    Google Scholar 

  15. Kodovsk, J., Fridrich, J.: Steganalysis in high dimensions: fusing classifiers built on random subspaces. In: SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, San Francisco, CA, January 23-26 (2011)

    Google Scholar 

  16. Lin, S., Costello, D.J.: Error Control Coding, 2nd edn. Prentice-Hall (2004)

    Google Scholar 

  17. Noda, H., Niimi, M., Kawaguchi, E.: Application of QIM with dead zone for histogram preserving JPEG steeganography. In: Proceedings of Initernational Conference on Image Processing, vol. II, pp. 1082–1085 (2005)

    Google Scholar 

  18. Pevny, T., Fridrich, J.: Multiclass blind steganalysis for JPEG images. In: Proceedings of SPIE, vol. 6072, pp. 257–269 (2006)

    Google Scholar 

  19. Pevny, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE, San Jose, CA, vol. 6505, pp. 311–314 (2007)

    Google Scholar 

  20. Provos, N.: Defending against statistical steganalysis. In: Proceedings of 10th USENIX Security Symposium, Washington, DC, pp. 24–24 (2001)

    Google Scholar 

  21. Sachnev, V., Kim, H.J., Zhang, R., Choi, Y.S.: A novel approach for JPEG steganography. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T.S. (eds.) IWDW 2008. LNCS, vol. 5450, pp. 209–217. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  22. Sachnev, V., Kim, H.J., Zhang, R.: Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In: Proceedings of ACM Workshop on Multimedia and Security, pp. 131–139 (2009)

    Google Scholar 

  23. Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  24. Schöfeld, D., Winkler, A.: Embedding with syndrome coding based on BCH codes. In: Proceedings of ACM Workshop on Multimedia and Security, pp. 214–223 (2006)

    Google Scholar 

  25. Schönfeld, D., Winkler, A.: Reducing the complexity of syndrome coding for embedding. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 145–158. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  26. Shi, Y.Q., Chen, C.-H., Chen, W.: A markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  27. Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16–31. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  28. Westfeld, A.: F5–A steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  29. Zhao, Z., Wu, F., Yu, S., Zhou, J.: A lookup table based fast algorithm for finding roots of quadratic or cubic polynomials in the GF(2m). Journal of Huazhong University of Science and Technology (Nature Science Edition) 33, xx-xx (2005)

    Google Scholar 

  30. Zhang, R., Sachnev, V., Kim, H.J.: Fast BCH syndrome coding for steganography. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol. 5806, pp. 48–58. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sachnev, V., Kim, H.J. (2013). An Attempt to Generalize Distortion Measure for JPEG Steganography. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40099-5_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40098-8

  • Online ISBN: 978-3-642-40099-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics