Perturbed quantization steganography

被引:108
|
作者
Fridrich, J [1 ]
Goljan, M
Soukal, D
机构
[1] SUNY Binghamton, Dept ECE, Binghamton, NY 13902 USA
[2] SUNY Binghamton, Dept CS, Binghamton, NY 13902 USA
关键词
perturbed quantization; wet paper code; adaptive; security; steganography;
D O I
10.1007/s00530-005-0194-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we use the recently proposed wet paper codes and introduce a new approach to passive-warden steganography called perturbed quantization. In perturbed quantization, the sender hides data while processing the cover object with an information-reducing operation that involves quantization, such as lossy compression, downsampling, or A/D conversion. The unquantized values of the processed cover object are considered as side information to confine the embedding changes to those unquantized elements whose values are close to the middle of quantization intervals. This choice of the selection channel calls for wet paper codes as they enable communication with non-shared selection channel. Heuristic is presented that indicates that the proposed method provides better steganographic security than current JPEG steganographic methods. This claim is further supported by blind steganalysis of a specific case of perturbed quantization for recompressed JPEG images.
引用
收藏
页码:98 / 107
页数:10
相关论文
共 50 条
  • [1] Perturbed quantization steganography
    Jessica Fridrich
    Miroslav Goljan
    David Soukal
    [J]. Multimedia Systems, 2005, 11 : 98 - 107
  • [2] Improving the Perturbed Quantization Steganography by Modified Matrix Encoding
    Zhu, Xuexiu
    Zhang, Weiming
    Qi, Jianqing
    Liu, Jiufen
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 437 - +
  • [3] Steganalysis of perturbed quantization steganography based on the enhanced histogram features
    Song, Xiaofeng
    Liu, Fenlin
    Luo, Xiangyang
    Lu, Jicang
    Zhang, Yi
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (24) : 11045 - 11071
  • [4] Steganalysis of perturbed quantization steganography based on the enhanced histogram features
    Xiaofeng Song
    Fenlin Liu
    Xiangyang Luo
    Jicang Lu
    Yi Zhang
    [J]. Multimedia Tools and Applications, 2015, 74 : 11045 - 11071
  • [5] Detection of Perturbed Quantization (PQ) Steganography Based on Empirical Matrix
    Abolghasemi, Mojtaba
    Aghaeinia, Hassan
    Faez, Karim
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 2 (02): : 119 - 128
  • [6] Steganalysis of perturbed quantization
    Gul, Gokhan
    Dirik, Ahmet Emir
    Avcibas, Ismail
    [J]. 2006 IEEE 14TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS, VOLS 1 AND 2, 2006, : 413 - +
  • [7] Revisiting Perturbed Quantization
    Butora, Jan
    Fridrich, Jessica
    [J]. PROCEEDINGS OF THE 2021 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH&MMSEC 2021, 2021, : 125 - 136
  • [8] New quantization matrices for JPEG steganography
    Yildiz, Yesna O.
    Panetta, Karen
    Agaian, Sos
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
  • [9] Quantization Approach to Steganography Perceptual Color Spaces
    Sabti, Hussein A.
    Abduljabbar, Hameed M.
    [J]. TECHNOLOGIES AND MATERIALS FOR RENEWABLE ENERGY, ENVIRONMENT AND SUSTAINABILITY: TMREES19GR, 2019, 2190
  • [10] Enhancing Steganography through Optimized Quantization Tables
    Bruzgiene, Rasa
    Venckauskas, Algimantas
    Grigaliunas, Sarunas
    Petraska, Jonas
    [J]. ELECTRONICS, 2024, 13 (12)