New JPEG Steganographic Scheme with High Security Performance

被引:0
|
作者
Huang, Fangjun [1 ]
Shi, Yun Qing [2 ]
Huang, Jiwu [1 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510006, GD, Peoples R China
[2] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
来源
DIGITAL WATERMARKING | 2011年 / 6526卷
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
JPEG steganographic scheme; BDCT; Frequency; BREAKING; STEGANALYSIS; IMAGES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a new JPEG steganographic scheme. Three measures are taken in our method: 1) The secret message bits are not spread into the quantized block discrete cosine transform (BDCT) coefficients of all frequencies, and only those coefficients (including those of value 0) belonging to relatively low frequencies are selected for data embedding; 2) For any coefficients selected for embedding, the rounding error in JPEG quantization is utilized directly to guide the data embedding; 3) Matrix embedding. The experiments have demonstrated that these three measures can help to achieve small distortion in spatial domain, preserve the histogram of quantized block discrete cosine transform coefficients, and enhance the embedding efficiency of matrix embedding, etc. Consequently, the proposed steganographic scheme has achieved a high security performance. It can resist today's most powerful JPEG steganalyzers effectively.
引用
收藏
页码:189 / +
页数:3
相关论文
共 50 条
  • [1] Effect of JPEG Quality on Steganographic Security
    Butora, Jan
    Fridrich, Jessica
    [J]. IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2019, : 47 - 56
  • [2] High Capacity Steganographic Scheme for JPEG Compression Using Particle Swarm Optimization
    Rabevohitra, Feno Heriniaina
    Sang, Jun
    [J]. MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 5118 - 5122
  • [3] An Efficient JPEG Steganographic Scheme Using Uniform Embedding
    Guo, Linjie
    Ni, Jiangqun
    Shi, Yun Qing
    [J]. 2012 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2012, : 169 - 174
  • [4] A High_Performance Steganographic Method using JPEG and PSO Algorithm
    Fazli, Saeid
    Kiamini, Majid
    [J]. INMIC: 2008 INTERNATIONAL MULTITOPIC CONFERENCE, 2008, : 100 - 105
  • [5] Influence of embedding strategies on security of steganographic methods in the JPEG domain
    Kodovsky, Jan
    Fridrich, Jessica
    [J]. SECURITY, FORENSICS, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS X, 2008, 6819
  • [6] An Adaptive JPEG Steganographic Scheme Based on the Block Entropy of DCT Coefficients
    Wang, Chang
    Ni, Jiangqun
    Wang, Chuntao
    Zhang, Ruiyu
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2012, 4 (02) : 13 - 27
  • [7] AN EFFICIENT JPEG STEGANOGRAPHIC SCHEME BASED ON THE BLOCK ENTROPY OF DCT COEFFICIENTS
    Wang, Chang
    Ni, Jiangqun
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2012, : 1785 - 1788
  • [8] A NEW STEGANOGRAPHIC SCHEME BASED ON FIRST ORDER REED MULLER CODES A New Steganographic Scheme
    Jouhari, Houda
    Souidi, El Mamoun
    [J]. SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 351 - 356
  • [9] Reversible steganographic method with high payload for JPEG images
    Lin, Chih-Yang
    Chang, Chin-Chen
    Wang, Yu-Zheng
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (03): : 836 - 845
  • [10] High capacity steganographic method based upon JPEG
    Almohammad, Adel
    Hierons, Robert M.
    Ghinea, Gheorghita
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 544 - +