Computer Science ›› 2024, Vol. 51 ›› Issue (5): 321-330.doi: 10.11896/jsjkx.231000036

• Information Security • Previous Articles     Next Articles

Adaptive Image Steganography Against JPEG Compression

ZHANG Jinghan, CHEN Wen   

  1. School of Cyber Science and Engineering,Sichuan University,Chengdu 610065,China
  • Received:2023-10-07 Revised:2024-03-01 Online:2024-05-15 Published:2024-05-08
  • About author:ZHANG Jinghan,born in 1998,postgraduate.Her main research interests include image steganography and data mining.
    CHEN Wen,born in 1983,Ph.D,asso-ciate professor,Ph.D supervisor.His main research interests include network security and data mining.
  • Supported by:
    National Key Research and Development Program of China(020YFB1805405,2019QY0800) and NationalNatural Science Foundation of China(62372313,62002248,U19A2068).

Abstract: Existing network communication systems often employ JPEG compression to reduce communication overhead when transmitting images.However,traditional image steganography techniques lack the ability to withstand JPEG compression.After performing lossy compression on secret images,the secret data is easily destroyed and cannot be extracted correctly.Therefore,designing secure and robust image steganography technology has important practical application value.This paper proposes an adaptive image robust steganography algorithm that is resistant to JPEG compression.Firstly,this paper analyzes the information loss caused by JPEG compression on the carrier image and identify stable texture features that can serve as robust embedding domains for secret information.Based on this,this paper present an adaptive secret information quantization embedding method that adjusts based on image block texture features,embedding the secret information into the texture mean features of image blocks with strong resistance to compression.Finally,the error feedback mechanism is used to adjust the generated confidential image until the secret information extraction error rate reaches the expected value,and a robust stego image resistant to JPEG compression is generated.Comparison experiments on BossBase1.01 demonstrate that the proposed method exhibits robust compression,resistance to detection, and maintains high image quality even after JPEG compression.In comparison to traditional least significant bit(LSB) steganography,Catalan transform-based image steganography(Catalan based Steganography),fixed neural network steganography(FNNS),and robust steganography using autoencoder latent space(RoSteALS),the proposed algorithm effectively reduces the average error rates of information extraction by 49.79%,49.73%,37.38%,and 38.85% respectively,while maintaining superior visual quality compared to Catalan based Steganography,FNNS,and RoSteALS.Additionally,our algorithm demonstrates robustness against StegExpose steganalysis.

Key words: Image steganography, Robust steganography, JPEG Compression

CLC Number: 

  • TP309.2
[1]KODOVSKY J,FRIDRICH J,HOLUB V.Ensemble classifiersfor steganalysis ofdigital media[J].IEEE Transactions on Information Forensics and Security,2011,7(2):432-444.
[2]QIN C,ZHANG W,CAO F,et al.Separable reversible data hi-ding in encrypted images via adaptive embedding strategy with block selection[J].Signal Processing,2018,153:109-122.
[3]SONG X,LIU F,YANG C,et al.Steganalysis of adaptive JPEG steganography using 2D Gabor filters[C]//Proceedings of the 3rd ACM Workshop on Information hiding and Multimedia Security.2015:15-23.
[4]HOLUB V,FRIDRICH J.Random projections of residuals fordigital image steganalysis[J].IEEE Transactions on Information Forensics and Security,2013,8(12):1996-2006.
[5]BOROUMAND M,CHEN M,FRIDRICH J.Deep residual network for steganalysis of digital images[J].IEEE Transactions on Information Forensics and Security,2018,14(5):1181-1193.
[6]VAISHNAVI D,SUBASHINI T S.Robust and invisible image watermarking in RGB color space using SVD[J].Procedia Computer Science,2015,46:1770-1777.
[7]LIN S D,SHIE S C,GUO J Y.Improving the robustness of DCT-based image watermarking against JPEG compression[J].Computer Standards & Interfaces,2010,32(1/2):54-60.
[8]PREDA R O,VIZIREANU D N.Watermarking-based image authentication robust to JPEG compression[J].Electronics Letters,2015,51(23):1873-1875.
[9]JIA Z,FANG H,ZHANG W.Mbrs:Enhancing robustness ofdnn-based watermarking by mini-batch of real and simulated jpeg compression[C]//Proceedings of the 29th ACM International Conference on Multimedia.2021:41-49.
[10]ZHANG Y,LUO X,YANG C,et al.A framework of adaptive steganography resisting JPEG compression and detection[J].Security and Communication Networks,2016,9(15):2957-2971.
[11]ZHANG Y,ZHU X,QIN C,et al.Dither modulation basedadaptive steganography resisting JPEG compression and statistic detection[J].Multimedia Tools and Applications,2018,77:17913-17935.
[12]ZHANG Y,LUO X,ZHU X,et al.Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes[J].Journal of Real-Time Image Processing,2020,17:115-123.
[13]YU X,CHEN K,WANG Y,et al.Robust adaptive steganography based on generalized dither modulation and expanded embedding domain[J].Signal Processing,2020,168:107343.
[14]LI F,WU K,QIN C,et al.Anti-compression JPEG steganography overrepetitive compression networks[J].Signal Processing,2020,170:107454.
[15]QIAO T,WANG S,LUO X,et al.Robust steganography resisting JPEG compression by improving selection of cover element[J].Signal Processing,2021,183:108048.
[16]BAO Z,GUO Y,LI X,et al.A robust image steganographybased on the concatenated error correction encoder and discrete cosine transform coefficients[J].Journal of Ambient Intelligence and Humanized Computing,2020,11:1889-1901.
[17]TAO J,LI S,ZHANG X,et al.Towards robust image steganography[J].IEEE Transactions on Circuits and Systems for Video Technology,2018,29(2):594-600.
[18]ZHAO Z,GUAN Q,ZHANG H,et al.Improving the robustness of adaptive steganographic algorithms based on transport channel matching[J].IEEE Transactions on Information Forensics and Security,2018,14(7):1843-1856.
[19]LU W,ZHANG J,ZHAO X,et al.Secure robust JPEG steganography based on autoencoder with adaptive BCH encoding[J].IEEE Transactions on Circuits and Systems for Video Technology,2020,31(7):2909-2922.
[20]BALUJA S.Hiding images within images[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2019,42(7):1685-1697.
[21]LU S P,WANG R,ZHONG T,et al.Large-capacity image steganography based on invertible neural networks[C]//Procee-dings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:10816-10825.
[22]XU Y,MOU C,HU Y,et al.Robust invertible image steganography[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2022:7875-7884.
[23]GUAN Z,JING J,DENG X,et al.DeepMIH:Deep invertible network for multiple image hiding[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2022,45(1):372-390.
[24]LI Q,WANG X,MA B,et al.Image steganography based onstyle transfer and quaternion exponent moments[J].Applied Soft Computing,2021,110:107618.
[25]HU D,WANG L,JIANG W,et al.A novel image steganography method via deep convolutional generative adversarial networks[J].IEEE Access,2018,6:38303-38314.
[26]WEI P,LI S,ZHANG X,et al.Generative steganography network[C]//Proceedings of the 30th ACM International Confe-rence on Multimedia.2022:1621-1629.
[27]LIU X,MA Z,MA J,et al.Image disentanglement autoencoder for steganography without embedding[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2022:2303-2312.
[28]BAS P,FILLER T,PEVNY' T.“Break our steganographic system”:the ins and outs of organizing BOSS[C]//International Workshop on Information Hiding.Berlin,Heidelberg:Springer,2011:59-70.
[29]TIWARI K,GANGURDE S J.LSB steganography using pixel locator sequence with AES[C]//2021 2nd International Confe-rence on Secure Cyber Computing and Communications(ICSCCC).IEEE,2021:302-307.
[30]MUKHOPADHYAY S,HOSSAIN S,GHOSAL S K,et al.Secured image steganography based on Catalan transform[J].Multimedia Tools and Applications,2021,80:14495-14520.
[31]KISHORE V,CHEN X,WANG Y,et al.Fixed neural network steganography:Train the images,not the network[C]//International Conference on Learning Representations.2021.
[32]BUI T,AGARWAL S,YU N,et al.RoSteALS:Robust Stega-nography using Autoencoder Latent Space[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2023:933-942.
[33]BOEHM B.Stegexpose-A tool for detecting LSB steganography[J].arXiv:1410.6656,2014.
[34]FRIDRICH J,KODOVSKY J.Rich models for steganalysis of digital images[J].IEEE Transactions on information Forensics and Security,2012,7(3):868-882.
[35]DUMITRESCU S,WU X,WANG Z.Detection of LSB stega-nography via sample pair analysis[C]//Information Hiding:5th International Workshop,IH 2002 Noordwijkerhout,The Netherlands,October 7-9,2002 Revised Papers 5.Berlin,Heidelberg:Springer,2003:355-372.
[36]FRIDRICH J,GOLJAN M.Practical steganalysis of digital images:state of the art[J].Security and Watermarking of Multimedia Contents IV,2002,4675:1-13.
[37]WESTFELD A.Detecting low embedding rates[C]//Interna-tionalWorkshop on Information Hiding.Berlin,Heidelberg:Springer,2002:324-339.
[38]DUMITRESCU S,WU X,MEMON N.On steganalysis of random LSB embedding in continuous-tone images[C]//Procee-dings International Conference on Image Processing.IEEE,2002,3:641-644.
[39]KODOVSKY J,FRIDRICH J,HOLUB V.Ensemble classifiers for steganalysis of digital media[J].IEEE Transactions on Information Forensics and Security,2011,7(2):432-444.
[1] SHANG Jin-yue, BI Xiu-li, XIAO Bin, LI Wei-sheng. Image Forgery Detection Based on DCT Coefficients Hashing [J]. Computer Science, 2020, 47(6): 310-315.
[2] Peng QiuMing;Yang XiaoFan;Huang Song;Li SaiJing;Bai Sen. [J]. Computer Science, 2005, 32(8): 63-66.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!