High capacity steganographic method based upon JPEG

被引:10
|
作者
Almohammad, Adel [1 ]
Hierons, Robert M. [1 ]
Ghinea, Gheorghita [1 ]
机构
[1] Brunel Univ, Uxbridge UB8 3PH, Middx, England
关键词
D O I
10.1109/ARES.2008.72
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The two most important aspects of any image-based steganographic system are the quality of the stego-image and the capacity of the cover image. This paper proposes a novel and high capacity steganographic approach based on Discrete Cosine Transformation (DCT) and JPEG compression. JPEG technique divides the input image into non-overlapping blocks of 8x8 pixels and uses the DCT transformation. However, our proposed method divides the cover image into non-overlapping blocks of 16&16 pixels. For each quantized DCT block, the least two-significant bits (2-LSBs) of each middle frequency coefficient are modified to embed two secret bits. Our aim is to investigate the data hiding efficiency using larger blocks for JPEG compression. Our experiment result shows that the proposed approach can provide a higher information-hiding capacity than Jpeg-Jsteg and Chang et al. methods based on the conventional blocks of 8x8 pixels. Furthermore, the produced stego-images are almost identical to the original cover images.
引用
收藏
页码:544 / +
页数:3
相关论文
共 50 条
  • [31] A steganographic embedding undetectable by JPEG compatibility steganalysis
    Newman, RE
    Moskowitz, IS
    Chang, LW
    Brahmadesam, MM
    INFORMATION HIDING, 2003, 2578 : 258 - 277
  • [32] A Novel High-Capacity Behavioral Steganographic Method Combining Timestamp Modulation and Carrier Selection Based on Social Networks
    Zhang, Mingliang
    Li, Zhenyu
    Zhang, Pei
    Zhang, Yi
    Luo, Xiangyang
    SYMMETRY-BASEL, 2022, 14 (01):
  • [33] An Adaptive JPEG Steganographic Scheme Based on Run-Length Statistical Complexity
    WEN Juan
    ZHANG Jie
    ZHOU Jie
    LI Yan
    XUE Yiming
    ChineseJournalofElectronics, 2018, 27 (01) : 52 - 59
  • [34] High Capacity and Reversible Steganographic Technique with Authentication Capability
    Ansari, Iffat Rehman
    Hurrah, Nasir N.
    Khan, Mohd Ayyub
    Khan, Ekram
    COMPUTER VISION AND IMAGE PROCESSING, CVIP 2023, PT III, 2024, 2011 : 337 - 349
  • [35] An Adaptive JPEG Steganographic Scheme Based on Run-Length Statistical Complexity
    Wen Juan
    Zhang Jie
    Zhou Jie
    Li Yan
    Xue Yiming
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (01) : 52 - 59
  • [36] Data hiding method based upon JPEG and k-Fibonacci matrix
    Wang, Jian-Jun
    Wang, Ying
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2006, 28 (08): : 1252 - 1257
  • [37] Toward High Capacity and Robust JPEG Steganography Based on Adversarial Training
    Yang J.
    Shang F.
    Liao Y.
    Chen Y.
    Security and Communication Networks, 2023, 2023
  • [38] Capacity of Steganographic Channels
    Harnisen, Jeremiah J.
    Pearlman, William A.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (04) : 1775 - 1792
  • [39] The High Embedding Steganographic Method Based on General Multi-EMD
    Kuo, Wen-Chung
    Wuu, Lih-Chyau
    Kuo, Shao-Hung
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND INTELLIGENT CONTROL (ISIC 2012), 2012, : 286 - 289
  • [40] A High Embedding Capacity Steganographic Method Using Maximum and Minimum pixels Difference Adaptive Strategy
    Lai, Pei-Chun
    Shen, Jau-Ji
    Chou, Yung-Chen
    22ND IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2021-FALL), 2021, : 202 - 207