Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2008.15-C.3.149

Secure JPEG2000 Steganography by the Minimization of Code-block Noise Variance Changes  

Yoon, Sang-Moon (금융결제원)
Lee, Hae-Yeoun (국립금오공과대학교 컴퓨터공학부)
Joo, Jeong-Chun (한국과학기술원 전자전산학과)
Bui, Cong-Nguyen (한국과학기술원 전자전산학과)
Lee, Heung-Kyu (한국과학기술원 전자전산학과)
Abstract
JPEG2000 is the upcoming image coding standard that provides better compression rate and image quality compared with JPEG. Lazy-mode steganography guarantees the safe communication under the two information loss stages in JPEG2000. However, it causes the severe changes of the code-block noise variance sequence after embedding and that is detectable under the steganalysis using the Hilbert-Huang transform (HHT) based sequential analysis. In this paper, a JPEG2000 lazy-mode steganography method is presented. The code blocks which produce the sudden variation of the noise variance after embedding are estimated by calculating low precision code-block variance (LPV) and low precision code-block noise variance (LPNV). By avoiding those code-blocks from embedding, our algorithm preserves the sequence and makes stego images secure under the HHT-based steganalytic detection. In addition, it prevents a severe degradation of image quality by using JPEG2000 quality layer information. On various 2048 images, experiments are performed to show the effective reduction of the noise variation after message embedding and the stable performance against HHT-based steganalysis.
Keywords
JPEG2000; Steganography; Lazy-Mode; Steganalysis; Hilbert-Huang Transform;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. Noda, J. Spaulding, M. N. Shirazi, and E. Kawaguchi, “Application of Bit-Plane Decomposition Steganography to JPEG2000 Encoded Images,” IEEE Signal Processing Letters, Vol.9(12), 2002, pp.410-413   DOI   ScienceOn
2 P.-C. Su and C.-C. Jay Juo, “Steganography in JPEG2000 Compressed Images,” IEEE Trans. on Consumer Electronics, Vol.49(4), 2003, pp.824-832   DOI   ScienceOn
3 H. Jin, M. Fujiyoshi, Y. Seki, and H. Kiya, “A Data Hiding Method for JPEG 2000 Coded Images Using Modulo Arithmetic,” Electronics and Communications in Japan, Vol. 90(7), 2007   DOI   ScienceOn
4 J. Spaulding, H. Noda, M. N. Shirazi, and E. Kawaguchi, “BPCS Steganography using EZW lossy compressed images,” Pattern Recognition Letters, Vol.23(13), 2002, pp.1579-1587   DOI   ScienceOn
5 N. E. Huang, Z. Shen, S. R. Long, M. C. Wu, H. H. Shih, Q. Zheng, N.-C. Yen, C. C. Tung, and H. H. Liu, “The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis,” Proc. of the Royal Society of London, Vol.454, 1998, pp.903-995
6 R. Duda, P. Hart, and D. Stork, “Pattern Classification”, 2nd edition. Wiley-Interscience, 2001
7 K. Rank, M. Lendl, and R. Unbehauen, “Estimation of image noise variance,” IEE Proc. of Vision, Image and Signal Processing, Vol.146(2), 1999, pp.80-84   DOI   ScienceOn
8 M. Kharrazi, H. T. Sencar, and N. Memon, “Performance study of common image steganography and steganalysis techniques,” J. of Electronic Imaging, Vol.15(4), 2006   DOI   ScienceOn
9 A. Skodras, C. Christopoulos, and T. Ebrahimi, “The JPEG2000 Still Image Compression Standard,” IEEE Signal Processing Magazine, Vol.18(1), 2001, pp.36-58   DOI   ScienceOn
10 S. Tan, J. Huang, Z. Yang, and Y. Q. Shi, “Steganalysis of JPEG2000 Lazy-Mode Steganography Using the Hilbert-Huang Transform Based Sequential Analysis,” Proc. of Int. Conf. on Image Processing, 2006, pp.101-104
11 H. Noda, Y. Tsukamizu, and M. Niimi, “JPEG2000 Steganography which Preserves Histograms of DWT Coefficients,” IEICE Trans. on Information Systems, Vol. E90-D(4), 783-786   DOI