Computer Science ›› 2019, Vol. 46 ›› Issue (1): 196-200.doi: 10.11896/j.issn.1002-137X.2019.01.030

• Information Security • Previous Articles     Next Articles

Asymmetric JPEG Steganography Based on Correlation in DCT Domain

MAO Bing-hua, WANG Zi-chi, ZHANG Xin-peng   

  1. (School of Communication and Information Engineering,Shanghai University,Shanghai 200444,China)
  • Received:2017-12-18 Online:2019-01-15 Published:2019-02-25

Abstract: The current distortion functions used for JPEG steganography allocate a same embedding cost for ±1 embedding change.However,due to the correlation of DCT domain in JPEG images,the effects of ±1 to modifying the content of the image are different,so the corresponding embedding cost should also be different.Based on the DCT correlation concept,a universal cost-value optimization method suitable for JPEG steganography was proposed in this paper,which mainly considers the correlation of the coefficients in the same position of adjacent DCT blocks in the JPEG image.The current DCT coefficients are predicted by averaging the DCT coefficients of the same position in the eight neighborhood blocks.For the existing JPEG distortion function,the embedding cost for ±1 is differentiated by the principle of moving closer to the predicted value.The adjusted embedding cost can guide the stego-modified DCT coefficients to move closer to the predicted value and enhance the correlation of the DCT domain to improve steganographic security.This method can be used in combination with any existing JPEG distortion function.Experimental results show that this method can increase the security of the existing JPEG steganography by 2.4% of test error on average without increasing the time complexity of the original algorithm.

Key words: Steganography, JPEG images, Distortion cost, Eight neighborhoods

CLC Number: 

  • TP309
[1]LI B,TAN S,WANG M,et al.Investigation on Cost Assignment in Spatial Image Steganography[J].IEEE Transactions on Information Forensics & Security,2014,9(8):1264-1277.<br /> [2]ZHANG X.Behavior Steganography in Social Network[M]//Advances in Intelligent Information Hiding and Multimedia Signal Processing.Springer International Publishing,2017.<br /> [3]WEI Q,YIN Z,WANG Z,et al.Distortion function based on residual blocks for JPEG steganography[J].Multimedia Tools & Applications,2017(3):1-14.<br /> [4]FRIDRICH J,SOUKAL D.Matrix embedding for large payloads [J].IEEE Transactions on Information Forensics & Security,2006,1(3):390-395.<br /> [5]WESTFELD A.F5-A Steganographic Algorithm[C]//International Workshop on Information Hiding(IHW 2001).DBLP,2001:289-302.<br /> [6]FRIDRICH J.Statistically undetectable jpeg steganography: dead ends challenges,and opportunities[C]//The Workshop on Multimedia & Security.DBLP,2007:3-14.<br /> [7]ZHANG X,WANG S.Efficient Steganographic Embedding by Exploiting Modification Direction[J].Communications Letters IEEE,2006,10(11):781-783.<br /> [8]ZHANG W,ZHANG X,WANG S.Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes[C]//International Workshop on Information Hi-ding.2008,5284:60-71.<br /> [9]FILLER T,JUDAS J,FRIDRICH J.Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes[J].IEEE Transactions on Information Forensics & Security,2012,6(3):920-935.<br /> [10]BAS P.Using high-dimensional image models to perform highly undetectable steganography[C]//International Workshop on Information Hiding.Springer-Verlag,2010:161-177.<br /> [11]HOLUB V,FRIDRICH J.Designing steganographic distortion using directional filters[C]//IEEE International Workshop on Information Forensics and Security.IEEE,2012:234-239.<br /> [12]LI B,WANG M,HUANG J,et al.A new cost function for spatial image steganography[C]//IEEE International Conference on Image Processing.IEEE,2015:4206-4210.<br /> [13]FRIDRICH J.Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model[C]//Proceedings of SPIE-The International Society for Optical Engineering,2015.<br /> [14]VOJTEˇCH H,FRIDRICH J.Digital image steganography using universal distortion[C]//ACM Workshop on Information Hi-ding and Multimedia Security.ACM,2013:59-68.<br /> [15]GUO L,NI J,SHI Y Q.Uniform Embedding for Efficient JPEG Steganography[J].IEEE Transactions on Information Forensics &Security,2014,9(5):814-825.<br /> [16]GUO L,NI J,SU W,et al.Using Statistical Image Model for JPEG Steganography:Uniform Embedding Revisited[J].IEEE Transactions on Information Forensics & Security,2015,10(12):2669-2680.<br /> [17]WANG Z,ZHANG X,YIN Z.Hybrid distortion function for JPEG steganography[J].Journal of Electronic Imaging,2016,25(5):050501.<br /> [18]SI Y F,WEI L X,ZHANG Y N,et al.Improved Steganography Based on SI-UNIWARD Distortion Function[J].ComputerScien-ce,2016,43(5):108-112.(in Chinese)<br /> 司一帆,魏立线,张英男,等.基于SI-UNIWARD失真函数的改进隐写方案[J].计算机科学,2016,43(5):108-112<br /> [19]WANG Z,LV J,WEI Q,et al.Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change[C]//International Workshop on Digital Watermarking.Springer International Publishing,2016:487-493.<br /> [20]PENNEBAKER W B,MITCHELL J L.JPEG Still Image Data Compression Standard[M].Norwell:Kluwer AcademicPubli-shers,1992.<br /> [21]WANG Z,YIN Z,ZHANG X.Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain[J].IETE Technical Review,2017,34:1-8.<br /> [22]SCHAEFER G.UCID:an uncompressed color image database [C]//Storage & Retrieval Methods & Applications for Multimedia.DBLP,2003:472-480.<br /> [23]HOLUB V,FRIDRICH J.Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT[J].IEEE Transactions on Information Forensics & Security,2015,10(2):219-228.<br /> [24]SONG X,LIU F,YANG C,et al.Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters[C]//ACM Workshop on Information Hiding and Multimedia Security.ACM,2015:15-23.<br /> [25]KODOVSKY J,FRIDRICH J,HOLUB V.Ensemble Classifiers for Steganalysis of Digital Media[J].IEEE Transactions on Information Forensics & Security,2012,7(2):432-444.
[1] ZHANG Yao, PAN Feng, SHEN Jun-wei and LI Ning-bo. Adaptive Post-type Steganography Algorithm Based on MP3 [J]. Computer Science, 2016, 43(8): 114-117.
[2] SI Yi-fan, WEI Li-xian, ZHANG Ying-nan and LIU Jia. Revised Steganography Scheme Based on SI-UNIWARD [J]. Computer Science, 2016, 43(5): 108-112.
[3] GAO Zhan-zhan,TANG Guang-ming and ZHANG Wei-wei. Game Analysis on Statistical Characteristics Preserving Steganography [J]. Computer Science, 2014, 41(7): 206-209.
[4] . Steganographic Research for Batch Binary Images [J]. Computer Science, 2011, 38(11): 271-274.
[5] HE Jun-hui,TANG Shao-hua,XING Yi-bo. Secure Image Steganography Based on Step-varying Quantization [J]. Computer Science, 2009, 36(7): 56-59.
[6] . [J]. Computer Science, 2009, 36(6): 265-267.
[7] GE Shen ,GAO Yang, ZHOU Ru-Yi (National Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093). [J]. Computer Science, 2007, 34(1): 144-147.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .