Browse > Article
http://dx.doi.org/10.9728/dcs.2016.17.5.433

A Steganography Method Improving Image Quality and Minimizing Image Degradation  

Choi, YongSoo (Division of Liberal Arts & Teaching, Sungkyul Univ.)
Kim, JangHwan (Dept. of MediaSoftware, Sungkyul Univ.)
Publication Information
Journal of Digital Contents Society / v.17, no.5, 2016 , pp. 433-439 More about this Journal
Abstract
In this paper, we propose a optimized steganography how to improve the image degradation of the existing data hiding techniques. This method operates in the compressed domain(JPEG) of an image. Most of the current information concealment methods generally change the coefficients to hide information. And several methods have tried to improve the performance of a typical steganography method such as F5 including a matrix encoding. Those papers achieved the object of reducing the distortion which is generated as hiding data in coefficients of compressed domain. In the proposed paper we analyzed the effect of the quantization table for hiding the data in the compressed domain. As a result, it found that can decrease the distortion that occur in the application of steganography techniques. This paper provides a little (Maximum: approximately 6.5%) further improved results in terms of image quality in a data hiding on compressed domain. Developed algorithm help improve the data hiding performance of compressed image other than the JPEG.
Keywords
Steganography; Quantization; Data hiding; JPEG compression; Matrix Encoding;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 George Berg, Ian Davidson, Ming-Yuan Duan and Goutam Paul, "Searching For Hidden Message: Automatic Detection of Steganography," American Associstion of Artificial Intelligence, pp.51-56, 2003
2 J. Fridrich, M. Goljan and D. Hogea, "Attacking the OutGuess," Proc. of the ACM Workshop on Multimedia and Security. Juan-les-Pins, France, December 6, 2002.
3 J. Fridrich, M. Goljan and D. Hogea, "New Methodolo gy for Breaking Steganographic Techniques for JPEGs," Proc. SPIE Electronic Imaging, Santa Clara, CA, USA, pp.143-155, Jan 2003.
4 Andreas Westfeld, "F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis," 4th Information Hiding International Workshop, Pittsburgh,USA, April 2001.
5 Bret Dunber, "A detailed look at Steganographic Techniques and their use in an Open-Systems Environment.", SANS Institute, January 2002.
6 J. Fridrich and D. Soukal, "Matrix Embedding for Large Payload," IEEE Tran. on Information Forensics and Security. Vol 1, pp.390-295, September2006.   DOI
7 M. Chen, R. Zhang, X. Niu and Y. Yang, "Analysis of Current Steganography Tools: Classification & Features," Proc. of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Pasadena. CA, USA, December 2006.
8 Y.H. Kim, Z. Duric and D. Richards, "Modified Matrix Encoding Technique for Minimal Distortion Steganography," Proc. of Information Hiding 2006, pp.314-327, 2007
9 Y.S. Choi, H.J. Kim, and C.M.Park,"The Influence of Quantizatrion Table in view of Information Hiding Techniques Modifying Coefficients in Frequency Domain, " Journal of IEEK, Vol46, pp.56-63, January 2009.
10 Andreas Westfeld: The Steganographic Algorithm F5, 1999, http://www.wwwrn.inf.tu-dresden.de/-w estfeld/f5.html
11 Derek Upham: Jsteg, 1997, e.g. http://www.tiac.net/users/korejwa/jsteg.htm
12 Crandall, R.: Some Notes on Steganography. Posted on Steganography Mailing List http://os.inf.tu-dresden.de/westfeld /crandall.pdf, 1998
13 The USC-SIPI Image Database, http://sipi.usc.edu/database/
14 H, Y, Hwang and H. J. Kim "Reversible Watermarking for Audio Using Recompression Method," J. of Digital Contents Society, Vol. 14, No. 2, pp. 199-206, 2013   DOI