Enhancing Steganography through Optimized Quantization Tables

被引:0
|
作者
Bruzgiene, Rasa [1 ]
Venckauskas, Algimantas [1 ]
Grigaliunas, Sarunas [1 ]
Petraska, Jonas [1 ]
机构
[1] Kaunas Univ Technol, Dept Comp Sci, Studentu Str 50, LT-51368 Kaunas, Lithuania
关键词
data security; privacy; digital watermarking; steganography; forensics and detection;
D O I
10.3390/electronics13122415
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses the scientific problem of enhancing the security and capacity of steganographic methods for protecting digital media. The primary aim is to develop an advanced steganographic technique that optimizes quantization tables to surpass the traditional F5 algorithm in terms of security, capacity, and robustness. The novelty of this research lies in the introduction of the F5A method, which utilizes optimized quantization tables to significantly increase the capacity for concealed information while ensuring high-quality image retention and resistance to unauthorized content recovery. The F5A method integrates cryptographic keys and features to detect and prevent copyright infringement in real time. Experimental evaluations demonstrate that the F5A method improves the mean square error and peak signal-to-noise ratio indices by 1.716 and 1.121 times, respectively, compared to the traditional F5 algorithm. Additionally, it increases the steganographic capacity by up to 1.693 times for smaller images and 1.539 times for larger images. These results underscore the effectiveness of the F5A method in enhancing digital media security and copyright protection.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] JPEG steganography: a performance evaluation of quantization tables
    Almohammad, Adel
    Ghinea, Gheorghita
    Hierons, Robert M.
    [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 471 - 478
  • [2] Enhancing the Security of a Gateway Through Steganography
    Nwanebu, Docas
    [J]. PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 287 - 293
  • [3] PERCEPTUALLY OPTIMIZED QUANTIZATION TABLES FOR H.264/AVC
    Chen, Heng
    Braeckman, Geert
    Barbarien, Joeri
    Munteanu, Adrian
    Schelkens, Peter
    [J]. APPLICATIONS OF DIGITAL IMAGE PROCESSING XXXIII, 2010, 7798
  • [4] Perturbed quantization steganography
    Fridrich, J
    Goljan, M
    Soukal, D
    [J]. MULTIMEDIA SYSTEMS, 2005, 11 (02) : 98 - 107
  • [5] Perturbed quantization steganography
    Jessica Fridrich
    Miroslav Goljan
    David Soukal
    [J]. Multimedia Systems, 2005, 11 : 98 - 107
  • [6] New quantization matrices for JPEG steganography
    Yildiz, Yesna O.
    Panetta, Karen
    Agaian, Sos
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
  • [7] Biometric Quantization through Detection Rate Optimized Bit Allocation
    C. Chen
    R. N. J. Veldhuis
    T. A. M. Kevenaar
    A. H. M. Akkermans
    [J]. EURASIP Journal on Advances in Signal Processing, 2009
  • [8] Enhancing Medical Image Security through Steganography and Ensemble Deep Authentication
    Judy, S.
    Khilar, Rashmita
    [J]. 2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [9] Biometric Quantization through Detection Rate Optimized Bit Allocation
    Chen, C.
    Veldhuis, R. N. J.
    Kevenaar, T. A. M.
    Akkermans, A. H. M.
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2009,
  • [10] Quantization Approach to Steganography Perceptual Color Spaces
    Sabti, Hussein A.
    Abduljabbar, Hameed M.
    [J]. TECHNOLOGIES AND MATERIALS FOR RENEWABLE ENERGY, ENVIRONMENT AND SUSTAINABILITY: TMREES19GR, 2019, 2190