Adaptive JPEG steganography with new distortion function

Annales Des Télécommunications - Tập 69 - Trang 431-440 - 2014
Fengyong Li1, Xinpeng Zhang1, Jiang Yu1, Wenfeng Shen1
1School of Communication and Information Engineering, Shanghai University, Shanghai, People’s Republic of China

Tóm tắt

This paper presents an adaptive steganographic scheme in JPEG images by designing a novel distortion function. While some previous works employed distortion functions based on coefficient difference, we point out that the data embedding on coefficients with larger absolute values may cause less steganalytic detectability. In the proposed scheme, the distortion function is derived from both the coefficient residual and coefficient value, which measures the risks of detection due to the modification on cover data. With an exhaustive searching method, the parameters of the proposed distortion function are optimized. Then, we may employ syndrome trellis coding to embed the secret data into JPEG images when keeping a low risk. This way, the modifications are forced into high textured areas in JPEG images, and experimental results demonstrate that the steganographic security is improved by the designed distortion function.

Tài liệu tham khảo

Sallee P (1997) Model-based methods for steganography and steganalysis. Int J Image Graph 5(1):167–190 Fridrich J, Pevny T, Kodovsky J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In: Proceedings of 9th ACM multimedia & security workshop, pp 3–14 Solanki K, Sarkar A, Manjunath BS (2007) YASS: yet another steganographic scheme that resists blind steganalysis. Information Hiding, 9th International Workshop 4437:249–264 Kim Y, Duric Z, Richards D (2006) Modified matrix encoding technique for minimal distortion steganography. Information Hiding, 8th International Workshop 4437:314–327 Sachnev V, Kim H, Zhang R (2009) Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In: Proceedings of the 11th ACM multimedia & security workshop, pp 131–140 Pevny T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. Information Hiding, 12th International Workshop 6387:161–177 Ryabko B, Ryabko D (2009) Asymptotically optimal perfect steganographic systems. Probl Inf Transm 45(2):184–190 Yang X, Guo D, Li J (2013) An image steganography based on multi-layered syndrome-trellis codes in DWT domain. In: 32nd IEEE Chinese control conference (CCC), pp 3738–3743 Guo L, Ni J, Shi Y (2012) An efficient JPEG steganographic scheme using uniform embedding, IEEE Workshop on information forensics and security, December 2–5. Tenerife Penvy T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215– 224 Gul G, Kurugollu F (2011) A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO). Information Hiding, 13th International Workshop 6958:71–84 Chen L, Shi Y, Sutthiwan P, Niu X (2013) A novel mapping scheme for steganalysis. Int Work Digit Water-Marking 7809:19–33 Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. IEEE Workshop on information forensics and security, December 2–5. Tenerife Filler T, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. In: Proceedings of SPIE, electronic imaging, media watermarking, security and forensics of multimedia XIII, vol 7880, pp 1–14 Kodovsky J, Fridrich J, Holub V (2011) On dangers of overtraining steganography to incomplete cover model. In: Proceedings of the 13th ACM multimedia & security workshop, pp 69–76 Huang F, Huang J, Shi Y (2012) New channel selection rule for JPEG steganography. IEEE Trans Inf Forensic Secur 7(4):1181–1191 Pevny T, Fridrich J (2007) Merging markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE, electronic imaging, security, steganography, and watermarking of multimedia contents IX, vol 6505, pp 3 1–3 14 Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifier for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432–444 Kodovsky J, Fridrich J (2012) Steganalysis of JPEG images using rich models. In: Proceedings of SPIE, electronic imaging, media watermarking, security, and forensics of multimedia XIV, January 22–26. San Francisco Kodovsky J, Fridrich J (2009) Calibration revisited. In: Proceedings of 11th ACM multimedia & security workshop, pp 7–8