Skip to main content
Log in

Perturbed quantization steganography

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

In this paper, we use the recently proposed wet paper codes and introduce a new approach to passive-warden steganography called perturbed quantization. In perturbed quantization, the sender hides data while processing the cover object with an information-reducing operation that involves quantization, such as lossy compression, downsampling, or A/D conversion. The unquantized values of the processed cover object are considered as side information to confine the embedding changes to those unquantized elements whose values are close to the middle of quantization intervals. This choice of the selection channel calls for wet paper codes as they enable communication with non-shared selection channel. Heuristic is presented that indicates that the proposed method provides better steganographic security than current JPEG steganographic methods. This claim is further supported by blind steganalysis of a specific case of perturbed quantization for recompressed JPEG images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Simmons, G.J.: The prisoners' problem and the subliminal channel. In: Proceedings of CRYPTO83 on Advances in Cryptology. pp. 51–67 (1984)

  2. Petitcolas, F3.A.P., Katzenbeisser, S. (eds.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Books (2000)

  3. Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE J. Selected Areas Commun. 16(4), 474–481 (1998) (Special Issue on Copyright and Privacy Protection)

    Article  Google Scholar 

  4. Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.), 2nd International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 1525, pp. 306–318. Springer-Verlag, Berlin Heidelberg New York (1998)

  5. Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In: Aucsmith, D. (ed.), 2nd International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 1525, pp. 344–354. Springer-Verlag, Berlin Heidelberg New York (1998)

  6. Katzenbeisser, S., Petitcolas, F.A.P.: Defining security in steganographic systems. In: Proceedings of Electronic Imaging, SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 50–56 (2002)

  7. Chandramouli, R., Kharrazi, M., Memon, N.: Image steganography and steganalysis: concepts and practice. In: Kalker, T., et al. (eds.), 2nd International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 2939, pp. 35–49. Springer-Verlag, Berlin Heidelberg New York (2003)

  8. Franz, E.: Steganography preserving statistical properties. In: Petitcolas, F.A.P. (ed.), 5th International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 2578, pp. 278–294. Springer-Verlag, Berlin Heidelberg New York (2002)

  9. Fridrich, J., Du, R.: Secure steganographic methods for palette images. In: Pfitzmann, A. (ed.), 2nd International Workshop Information Hiding. Lecture Notes in Computer Science, vol. 1768, pp. 47–60. Springer-Verlag, Berlin Heidelberg New York (2000)

  10. Karahan, M., Topkara, U., Atallah, M., Taskiran, C., Lin, E., Delp, E.: A hierarchical protocol for increasing the stealthiness of steganographic methods. In: Proceedings of ACM Multimedia Workshop, pp. 16–24. Magdeburg, Germany (2004)

  11. Westfeld, A., Böhme, R.: Exploiting preserved statistics for steganalysis. In: Fridrich, J. (ed.), 6th International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 3200, pp. 82–96. Springer-Verlag, Berlin Heidelberg New York (2005)

  12. Fridrich, J., Goljan, M., Soukal, D., Lisonek, P.: Writing on wet paper. In: Proceedings of Electronic Imaging, SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 328–340 (2005)

  13. Fridrich, J., Goljan, M., Soukal, D., Lisonek, P.: Writing on net paper. In: Kalker, T., Moulin, P. (eds.), IEEE Trans. Sig. Proc., Special Issue on Media Security (2005), to appear

  14. Kuznetsov, A.V., Tsybakov, B.S.: Coding in a memory with defective cells. Problems Inform. Transmission 10, 132–138 (1974)

    Google Scholar 

  15. Heegard, C., El-Gamal, A.: On the capacity of computer memory with defects. IEEE Trans. Inform. Theory IT-29, 731–739 (1983)

    Google Scholar 

  16. Zamir, R., Shamai, S., Erez, U.: Nested linear/lattice codes for structured multiterminal binning. IEEE Trans. Inform. Theory 48(6), 1250–1276 (2002)

    Article  MathSciNet  Google Scholar 

  17. Cohen, G.: Applications of coding theory to communication combinatorial problems. Discrete Math. 83(2–3), 237–248 (1990)

    MATH  MathSciNet  Google Scholar 

  18. Brent, R.P., Gao, S., Lauder, A.G.B.: Random Krylov spaces over finite fields. SIAM J. Discrete Math. 16(2), 276–287 (2003)

    Article  MathSciNet  Google Scholar 

  19. Luby, M.: LT Codes. In: Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, pp. 271–282 (2002)

  20. Dougherty, E.R.: Random processes for image and signal processing. SPIE PRESS Monograph, vol. PM44 (1998)

  21. Ore, O., Ore, Y., Number Theory and Its History. Dover Publications, New York (1998)

    Google Scholar 

  22. Lukás, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed JPEG images. In: Proceedings of DFRWS 2003. Cleveland, OH (2003)

  23. Lin, C.-Y., Chang, S.-F.: Semi-fragile watermarking for authenticating JPEG visual content. In: Proceedings of Electronic Imaging, SPIE, Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 140–151 (2000)

  24. Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.), 6th International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 3200, pp. 67–81. Springer-Verlag, Berlin Heidelberg New York (2005)

  25. Fridrich, J., Goljan, M., Hogea, D., Soukal, D.: Quantitative Steganalysis: estimating secret message length. ACM Multimedia Syst. J. 9(3), 288–302 (2003) (Special Issue on Multimedia Security)

    Google Scholar 

  26. Provos, N.: Defending Against Statistical Steganalysis, 10th USENIX Security Symposium. Washington, DC (2001)

  27. Westfeld, A.: High capacity despite better steganalysis (F5–A Steganographic Algorithm). In: Moskowitz, I.S. (ed.), 4th International Workshop Information Hiding. Lecture Notes in Computer Science, vol. 2137, pp. 289–302. Springer-Verlag, Berlin Heidelberg New York (2001)

  28. Sallee, P.: Model based steganography. In: Kalker, T., Cox, I.J., Ro, Y.M. (eds.), 2nd International Workshop on Digital Watermarking. Lecture Notes in Computer Science. vol. 2939, pp. 154–167. Springer-Verlag, Berlin Heidelberg New York (2004)

  29. Kharrazi, M., Sencar, H.T., Memon, N.: Benchmarking steganographic and steganalytic techniques. In: Proceedings of Electronic Imaging, SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 252–263 (2005)

  30. Farid, H., Siwei, L.: Detecting hidden messages using higher-order statistics and support vector machines. In: Petitcolas, F.A.P. (ed.), 5th International Workshop on Information Hiding. Lecture Notes in Computer Science. vol. 2578, pp. 340–354. Springer-Verlag, Berlin Heidelberg New York (2002)

  31. Avcibas, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. In: Proceedings of Electronic Imaging, SPIE, Security and Watermarking of Multimedia Contents II, vol. 4314, pp. 523–531 (2001)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jessica Fridrich.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fridrich, J., Goljan, M. & Soukal, D. Perturbed quantization steganography. Multimedia Systems 11, 98–107 (2005). https://doi.org/10.1007/s00530-005-0194-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-005-0194-3

Keywords

Navigation