A Study on Improved JPEG Steganography Algorithm to Prevent Steganalysis

被引:1
|
作者
Kim, Jun Tae [1 ]
Kim, Sangwon [1 ]
Kim, Keechoen [2 ]
机构
[1] Konkuk Univ, Dept Comp Informat & Commun Engn, Seoul, South Korea
[2] Konkuk Univ, Dept Comp Sci & Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Steganography; Confidentiality; JPEG; Information Hiding;
D O I
10.1109/ictc46691.2019.8939763
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Video steganography is a data-hiding technology that inserts confidential messages intended to be hidden in video data at an unrecognizable level. Image steganography can be divided into spatial area techniques for inserting confidential data by manipulating the Last Significant Bit (LSB) of each image pixel and frequency domain techniques for manipulating the DCT (Discrete Cosine Transform) coefficients of images. JPEG (Joint Photographic Experts Group), which is used as the image loss compression standard, uses JPEG steganography techniques such as Jsteg, F3, F4, and F5 based on frequency domain techniques that manipulate DCT coefficients. Each technique has the characteristic that the frequency of DCT coefficient of 0 increases compared to the original. Various techniques are presented to determine JPEG Stego images by machine learning the characteristics of the relationship between image complexity and frequency of DCT coefficient 0. Therefore, this paper proposes a JPEG steganography algorithm to prevent the determination of the Stego image using DCT coefficient 0 and maintain an even coefficient distribution based on the JPEG characteristic, DCT coefficient 0.
引用
收藏
页码:960 / 963
页数:4
相关论文
共 50 条
  • [1] JPEG Steganography and Steganalysis - A Review
    Banerjee, Siddhartha
    Ghosh, Bibek Ranjan
    Roy, Pratik
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 175 - 187
  • [2] An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain
    Taburet, Theo
    Filstroff, Louis
    Bas, Patrick
    Sawaya, Wadih
    [J]. DIGITAL FORENSICS AND WATERMARKING, IWDW 2018, 2019, 11378 : 290 - 303
  • [3] Quantized Gaussian JPEG Steganography and Pool Steganalysis
    Aloraini, Mohammed
    Sharifzadeh, Mehdi
    Schonfeld, Dan
    [J]. IEEE ACCESS, 2022, 10 : 38031 - 38044
  • [4] STEGANALYSIS OF ADAPTIVE JPEG STEGANOGRAPHY BASED ON RESDET
    Huang, Xiaosa
    Wang, Shilin
    Sun, Tanfeng
    Liu, Gongshen
    Lin, Xiang
    [J]. 2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 549 - 553
  • [5] Conditional Probability Based Steganalysis for JPEG Steganography
    Wahab, Ainuddin Wahid
    Briffa, Johann A.
    Schaathun, Hans Georg
    Ho, Anthony T. S.
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 205 - 209
  • [6] Steganalysis of JPEG steganography with complementary embedding strategy
    Huang, F.
    Luo, W.
    Huang, J.
    [J]. IET INFORMATION SECURITY, 2011, 5 (01) : 10 - 18
  • [7] AN EFFECTIVE STEGANALYSIS FOR ROBUST STEGANOGRAPHY WITH REPETITIVE JPEG COMPRESSION
    Feng, Jinliu
    Wang, Yaofei
    Chen, Kejiang
    Zhang, Weiming
    Yu, Nenghai
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 3084 - 3088
  • [8] Steganalysis Features for Content-Adaptive JPEG Steganography
    Denemark, Tomas
    Boroumand, Mehdi
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1747 - 1757
  • [9] A New Methodology of Image Steganalysis including for JPEG Steganography
    Hernandez Chamorro, Alondra Gabriela
    Nakano Miyatake, Mariko
    [J]. 2010 IEEE ELECTRONICS, ROBOTICS AND AUTOMOTIVE MECHANICS CONFERENCE (CERMA 2010), 2010, : 434 - 438
  • [10] Content-independent steganography and steganalysis of JPEG images
    Rezaei, Mohammad
    Salahshoor, M. Bagher
    [J]. 2018 15TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2018, : 62 - 67