Browse > Article

The Influence of Quantization Table in view of Information Hiding Techniques Modifying Coefficients in Frequency Domain  

Choi, Yong-Soo (Graduate School of Information Management & Security, Korea University)
Kim, Hyoung-Joong (Department of Computer Engineering, ChungJu University)
Park, Chun-Myoung (Graduate School of Information Management & Security, Korea University)
Publication Information
Abstract
Nowdays, Most of Internet Contents delivered as a compressed file. It gives many advantages like deduction of communication bandwidth and transmission time etc. In case of JPEG Compression, Quantization is the most important procedure which accomplish the compression. In general signal processing, Quantization is the process which converts continuous analog signal to discrete digital signal. As you known already, Quantization over JPEG compression is to reduce magnitude of pixel value in spatial domain or coefficient in frequency domain. A lot of Data Hiding algorithms also developed to applicable for those compressed files. In this paper, we are going to unveil the influence of quantization table which used in the process of JPEG compression. Even thought most of algorithm modify frequency coefficients with considering image quality, they are ignoring the influence of quantization factor corresponding with the modified frequency coefficient. If existing algorithm adapt this result, they can easily evaluate their performances.
Keywords
Quantization; Information Hiding; PSNR; Image Degradation; Steganography;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Fridrich, M. Goljan and D. Hogea, 'New Methodology for Breaking Steganographic Techniques for JPEGs,' Proc. SPIE Electronic Imaging, SantaClara, CA, USA, pp.143-155, Jan 2003
2 M. Chen, R. Zhang, X. Niu and Y. Yang, 'Analysis of Current Steganography Tools: Classification & Features,' Proc. of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Pasadena. CA, USA, December 2006
3 Bret Dunber, 'A detailed look at Steganographic Techniques and their use in an Open-Systems Environment.', SANS Institute, January 2002
4 Andreas Westfeld, 'F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis,' 4th Information Hiding International Workshop, Pittsburgh, USA, April 2001
5 Derek Upham: Jeteg, 1997, e.g. http://www.tiac.net/users/korejwa/jsteg.htm
6 J. Fridrich, M. Goljan and D. Hogea, 'Attacking the OutGuess,' Proc. Of the ACM Workshop on Multimedia and Security. 2002, Juan-les- Pins,France, December 6, 2002
7 J. Fridrich and D. Soukal, 'Matrix Embedding for Large Payload,' IEEE Tran on Information Forensics and Security. Vol 1, pp.390-295, September 2006   DOI   ScienceOn
8 Andreas Westfeld: The Steganographic Algorithm F5, 1999, http://www.wwwrn.inf.tu-dresden.de/-westfeld/f5.html
9 The USC-SIPI Image Database, http://sipi.usc.edu/database/