Abstract
In this paper, we use the recently proposed wet paper codes and introduce a new approach to passive-warden steganography called perturbed quantization. In perturbed quantization, the sender hides data while processing the cover object with an information-reducing operation that involves quantization, such as lossy compression, downsampling, or A/D conversion. The unquantized values of the processed cover object are considered as side information to confine the embedding changes to those unquantized elements whose values are close to the middle of quantization intervals. This choice of the selection channel calls for wet paper codes as they enable communication with non-shared selection channel. Heuristic is presented that indicates that the proposed method provides better steganographic security than current JPEG steganographic methods. This claim is further supported by blind steganalysis of a specific case of perturbed quantization for recompressed JPEG images.
Similar content being viewed by others
References
Simmons, G.J.: The prisoners' problem and the subliminal channel. In: Proceedings of CRYPTO83 on Advances in Cryptology. pp. 51–67 (1984)
Petitcolas, F3.A.P., Katzenbeisser, S. (eds.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Books (2000)
Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE J. Selected Areas Commun. 16(4), 474–481 (1998) (Special Issue on Copyright and Privacy Protection)
Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.), 2nd International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 1525, pp. 306–318. Springer-Verlag, Berlin Heidelberg New York (1998)
Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In: Aucsmith, D. (ed.), 2nd International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 1525, pp. 344–354. Springer-Verlag, Berlin Heidelberg New York (1998)
Katzenbeisser, S., Petitcolas, F.A.P.: Defining security in steganographic systems. In: Proceedings of Electronic Imaging, SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 50–56 (2002)
Chandramouli, R., Kharrazi, M., Memon, N.: Image steganography and steganalysis: concepts and practice. In: Kalker, T., et al. (eds.), 2nd International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 2939, pp. 35–49. Springer-Verlag, Berlin Heidelberg New York (2003)
Franz, E.: Steganography preserving statistical properties. In: Petitcolas, F.A.P. (ed.), 5th International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 2578, pp. 278–294. Springer-Verlag, Berlin Heidelberg New York (2002)
Fridrich, J., Du, R.: Secure steganographic methods for palette images. In: Pfitzmann, A. (ed.), 2nd International Workshop Information Hiding. Lecture Notes in Computer Science, vol. 1768, pp. 47–60. Springer-Verlag, Berlin Heidelberg New York (2000)
Karahan, M., Topkara, U., Atallah, M., Taskiran, C., Lin, E., Delp, E.: A hierarchical protocol for increasing the stealthiness of steganographic methods. In: Proceedings of ACM Multimedia Workshop, pp. 16–24. Magdeburg, Germany (2004)
Westfeld, A., Böhme, R.: Exploiting preserved statistics for steganalysis. In: Fridrich, J. (ed.), 6th International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 3200, pp. 82–96. Springer-Verlag, Berlin Heidelberg New York (2005)
Fridrich, J., Goljan, M., Soukal, D., Lisonek, P.: Writing on wet paper. In: Proceedings of Electronic Imaging, SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 328–340 (2005)
Fridrich, J., Goljan, M., Soukal, D., Lisonek, P.: Writing on net paper. In: Kalker, T., Moulin, P. (eds.), IEEE Trans. Sig. Proc., Special Issue on Media Security (2005), to appear
Kuznetsov, A.V., Tsybakov, B.S.: Coding in a memory with defective cells. Problems Inform. Transmission 10, 132–138 (1974)
Heegard, C., El-Gamal, A.: On the capacity of computer memory with defects. IEEE Trans. Inform. Theory IT-29, 731–739 (1983)
Zamir, R., Shamai, S., Erez, U.: Nested linear/lattice codes for structured multiterminal binning. IEEE Trans. Inform. Theory 48(6), 1250–1276 (2002)
Cohen, G.: Applications of coding theory to communication combinatorial problems. Discrete Math. 83(2–3), 237–248 (1990)
Brent, R.P., Gao, S., Lauder, A.G.B.: Random Krylov spaces over finite fields. SIAM J. Discrete Math. 16(2), 276–287 (2003)
Luby, M.: LT Codes. In: Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, pp. 271–282 (2002)
Dougherty, E.R.: Random processes for image and signal processing. SPIE PRESS Monograph, vol. PM44 (1998)
Ore, O., Ore, Y., Number Theory and Its History. Dover Publications, New York (1998)
Lukás, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed JPEG images. In: Proceedings of DFRWS 2003. Cleveland, OH (2003)
Lin, C.-Y., Chang, S.-F.: Semi-fragile watermarking for authenticating JPEG visual content. In: Proceedings of Electronic Imaging, SPIE, Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 140–151 (2000)
Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.), 6th International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 3200, pp. 67–81. Springer-Verlag, Berlin Heidelberg New York (2005)
Fridrich, J., Goljan, M., Hogea, D., Soukal, D.: Quantitative Steganalysis: estimating secret message length. ACM Multimedia Syst. J. 9(3), 288–302 (2003) (Special Issue on Multimedia Security)
Provos, N.: Defending Against Statistical Steganalysis, 10th USENIX Security Symposium. Washington, DC (2001)
Westfeld, A.: High capacity despite better steganalysis (F5–A Steganographic Algorithm). In: Moskowitz, I.S. (ed.), 4th International Workshop Information Hiding. Lecture Notes in Computer Science, vol. 2137, pp. 289–302. Springer-Verlag, Berlin Heidelberg New York (2001)
Sallee, P.: Model based steganography. In: Kalker, T., Cox, I.J., Ro, Y.M. (eds.), 2nd International Workshop on Digital Watermarking. Lecture Notes in Computer Science. vol. 2939, pp. 154–167. Springer-Verlag, Berlin Heidelberg New York (2004)
Kharrazi, M., Sencar, H.T., Memon, N.: Benchmarking steganographic and steganalytic techniques. In: Proceedings of Electronic Imaging, SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 252–263 (2005)
Farid, H., Siwei, L.: Detecting hidden messages using higher-order statistics and support vector machines. In: Petitcolas, F.A.P. (ed.), 5th International Workshop on Information Hiding. Lecture Notes in Computer Science. vol. 2578, pp. 340–354. Springer-Verlag, Berlin Heidelberg New York (2002)
Avcibas, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. In: Proceedings of Electronic Imaging, SPIE, Security and Watermarking of Multimedia Contents II, vol. 4314, pp. 523–531 (2001)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Fridrich, J., Goljan, M. & Soukal, D. Perturbed quantization steganography. Multimedia Systems 11, 98–107 (2005). https://doi.org/10.1007/s00530-005-0194-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-005-0194-3