• Title/Summary/Keyword: JPEG steganography

Search Result 20, Processing Time 0.018 seconds

Steganalysis of adaptive JPEG steganography by selecting DCT coefficients according to embedding distortion

  • Song, Xiaofeng;Liu, Fenlin;Yang, Chunfang;Luo, Xiangyang;Li, Zhenyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5209-5228
    • /
    • 2015
  • According to the characteristics of adaptive JPEG steganography which determines the changed DCT coefficients based on embedding distortion, a new steganalysis method by selecting the DCT coefficients with small distortion values is proposed. Firstly, the principle of adaptive JPEG steganography through minimizing distortion is introduced. Secondly, the practicability of selecting the changed DCT coefficients according to distortion values is studied. Thirdly, the proposed steganalysis method is given and the embedding sensitivity of the steganalysis feature extracted from the selected DCT coefficients is analyzed. Lastly, the implement processes of the proposed method are presented and analyzed in details. In the experiments, PQt, PQe and J-UNIWARD steganography are used as examples to verify the effect of the proposed steganalysis method for adaptive JPEG steganography. A serial experimental results show the detection accuracy can be improved obviously, especially when the payload is relatively low.

Detection for JPEG steganography based on evolutionary feature selection and classifier ensemble selection

  • Ma, Xiaofeng;Zhang, Yi;Song, Xiangfeng;Fan, Chao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5592-5609
    • /
    • 2017
  • JPEG steganography detection is an active research topic in the field of information hiding due to the wide use of JPEG image in social network, image-sharing websites, and Internet communication, etc. In this paper, a new steganalysis method for content-adaptive JPEG steganography is proposed by integrating the evolutionary feature selection and classifier ensemble selection. First, the whole framework of the proposed steganalysis method is presented and then the characteristic of the proposed method is analyzed. Second, the feature selection method based on genetic algorithm is given and the implement process is described in detail. Third, the method of classifier ensemble selection is proposed based on Pareto evolutionary optimization. The experimental results indicate the proposed steganalysis method can achieve a competitive detection performance by compared with the state-of-the-art steganalysis methods when used for the detection of the latest content-adaptive JPEG steganography algorithms.

AN IMPROVED JPEG2000 STEGANOGRAPHY USING QIM AND ITS EVALUATION BY STEGANALYSIS

  • Ishida, Takayuki;Yamawaki, Kazumi;Noda, Hideki;Niimi, Michiharu
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.466-469
    • /
    • 2009
  • This paper presents a modified QIM-JPEG2000 steganography which improves the previous JPEG2000 steganography using quantization index modulation (QIM). Post-embedding changes in file size and PSNR by the modified QIM-JPEG2000 are smaller than those by the previous QIM-JPEG2000. Steganalysis experiments to determine whether messages are embedded in given JPEG2000 images show that the modified QIM-JPEG2000 is more secure than the previous QIMJPEG2000.

  • PDF

A Study on Steganographic Methods and Its Applications (스테가노그래피 방법과 응용에 관한 연구)

  • Md, Amiruzzaman;Kim, Hyoung-Joong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.193-196
    • /
    • 2008
  • In this paper a detail study of existing steganographic methods are presented. An example is given of LSB substitution with uncompressed domain i.e., BMP image. In case of compressed domain JPEG image steganography is presented. Almost all popular steganographic algorithms, such as JPEG JSteg, F3, F4 and Selective Block Steganography (SBS) are described. The applications of steganographic methods are also presented briefly.

  • PDF

A Steganography Method Improving Image Quality and Minimizing Image Degradation (영상의 화질 개선과 열화측정 시간을 최소화하는 스테가노그라피 방법)

  • Choi, YongSoo;Kim, JangHwan
    • Journal of Digital Contents Society
    • /
    • v.17 no.5
    • /
    • pp.433-439
    • /
    • 2016
  • In this paper, we propose a optimized steganography how to improve the image degradation of the existing data hiding techniques. This method operates in the compressed domain(JPEG) of an image. Most of the current information concealment methods generally change the coefficients to hide information. And several methods have tried to improve the performance of a typical steganography method such as F5 including a matrix encoding. Those papers achieved the object of reducing the distortion which is generated as hiding data in coefficients of compressed domain. In the proposed paper we analyzed the effect of the quantization table for hiding the data in the compressed domain. As a result, it found that can decrease the distortion that occur in the application of steganography techniques. This paper provides a little (Maximum: approximately 6.5%) further improved results in terms of image quality in a data hiding on compressed domain. Developed algorithm help improve the data hiding performance of compressed image other than the JPEG.

Optimal Gabor Filters for Steganalysis of Content-Adaptive JPEG Steganography

  • Song, Xiaofeng;Liu, Fenlin;Chen, Liju;Yang, Chunfang;Luo, Xiangyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.552-569
    • /
    • 2017
  • The existing steganalysis method based on 2D Gabor filters can achieve a competitive detection performance for content-adaptive JPEG steganography. However, the feature dimensionality is still high and the time-consuming of feature extraction is relatively large because the optimal selection is not performed for 2D Gabor filters. To solve this problem, a new steganalysis method is proposed for content-adaptive JPEG steganography by selecting the optimal 2D Gabor filters. For the proposed method, the 2D Gabor filters with different parameter settings are generated first. Then, the feature is extracted by each 2D Gabor filter and the corresponding detection accuracy is used as the measure for filter selection. Next, some 2D Gabor filters are selected by a greedy strategy and the steganalysis feature is extracted by the selected filters. Last, the ensemble classifier is used to assemble the proposed steganalysis feature as well as the final steganalyzer. The experimental results show that the steganalysis feature extracted by the selected optimal 2D Gabor filters also can achieve a competitive detection performance while the feature dimensionality is reduced greatly.

Secure JPEG2000 Steganography by the Minimization of Code-block Noise Variance Changes (코드블록 노이즈 분산의 변화를 최소화하는 안전한 JPEG2000 스테가노그라피)

  • Yoon, Sang-Moon;Lee, Hae-Yeoun;Joo, Jeong-Chun;Bui, Cong-Nguyen;Lee, Heung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.149-156
    • /
    • 2008
  • JPEG2000 is the upcoming image coding standard that provides better compression rate and image quality compared with JPEG. Lazy-mode steganography guarantees the safe communication under the two information loss stages in JPEG2000. However, it causes the severe changes of the code-block noise variance sequence after embedding and that is detectable under the steganalysis using the Hilbert-Huang transform (HHT) based sequential analysis. In this paper, a JPEG2000 lazy-mode steganography method is presented. The code blocks which produce the sudden variation of the noise variance after embedding are estimated by calculating low precision code-block variance (LPV) and low precision code-block noise variance (LPNV). By avoiding those code-blocks from embedding, our algorithm preserves the sequence and makes stego images secure under the HHT-based steganalytic detection. In addition, it prevents a severe degradation of image quality by using JPEG2000 quality layer information. On various 2048 images, experiments are performed to show the effective reduction of the noise variation after message embedding and the stable performance against HHT-based steganalysis.

Recognizing F5-like stego images from multi-class JPEG stego images

  • Lu, Jicang;Liu, Fenlin;Luo, Xiangyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4153-4169
    • /
    • 2014
  • To recognize F5-like (such as F5 and nsF5) steganographic algorithm from multi-class stego images, a recognition algorithm based on the identifiable statistical feature (IDSF) of F5-like steganography is proposed in this paper. First, this paper analyzes the special modification ways of F5-like steganography to image data, as well as the special changes of statistical properties of image data caused by the modifications. And then, by constructing appropriate feature extraction sources, the IDSF of F5-like steganography distinguished from others is extracted. Lastly, based on the extracted IDSFs and combined with the training of SVM (Support Vector Machine) classifier, a recognition algorithm is presented to recognize F5-like stego images from images set consisting of a large number of multi-class stego images. A series of experimental results based on the detection of five types of typical JPEG steganography (namely F5, nsF5, JSteg, Steghide and Outguess) indicate that, the proposed algorithm can distinguish F5-like stego images reliably from multi-class stego images generated by the steganography mentioned above. Furthermore, even if the types of some detected stego images are unknown, the proposed algorithm can still recognize F5-like stego images correctly with high accuracy.

Ternary Bose - Chaudhuri - Hocquenghem (BCH) with t = 2 code for steganography (3진 BCH (Bose - Chaudhuri - Hocquenghem) 코드를 이용하는 스테가노그라피 기법)

  • Sachnev, Vasily;Choi, Yong Soo
    • Journal of Digital Contents Society
    • /
    • v.17 no.6
    • /
    • pp.461-469
    • /
    • 2016
  • A novel steganography based on ternary BCH code with t = 2 is presented in this paper. Proposed method utilizes powerful BCH code with t = 2 for data hiding to the DCT coefficients from JPEG images. The presented data hiding technique uses a proposed look up table approach for searching multiple solutions for ternary BCH code with t = 2. The proposed look up table approach enables fast and efficient search for locations of DCT coefficients, which are necessary to modify for hiding data. Presented data hiding technique is the first steganography technique based on ternary BCH code. Experimental results clearly indicate advantages of using ternary BCH compared to binary BCH.

A New Steganographic Method with Minimum Distortion (최소 왜곡을 위한 새로운 스테가노그래피 방법)

  • Zhang, Rongyue;Md, Amiruzzaman;Kim, Hyoung-Joong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.201-204
    • /
    • 2008
  • In this paper a new steganographic method is presented with minimum distortion. This paper focused on DCT rounding error and optimized that in a very easy way, resulting stego image has less distortion than other existing methods. The proposed method compared with F5 steganography algorithm, and the proposed method achieved better performance. This paper considered the DCT rounding error for lower distortion with possibly higher embedding capacity.

  • PDF