Secured steganographic scheme for highly compressed color image using weighted matrix through DCT

Due to the rapid growth of internet technology and the advent of various image processing tools, people started using digital media for hidden communication to protect valuable information which is important for multimedia commercials, health-care, medical and defense applications. On the other hand, image authentication and tamper detection are essential, especially when it is utilized for evidence of legal action. In this paper, a weighted matrix based steganographic scheme has been designed for highly compressed (Quality Factor (QF) 40) color image through discrete cosine transform (DCT) to maintain a good balance between payload and imperceptibility. Here, the AC components are collected from quantized DCT coefficient matrices of YCbCr channel. Then, a series of original matrices are formed to hide secret data. The collection of AC components is controlled by 128 bits shared secret key. A predetermined weighted matrix is employed to select the embedding position within a coefficient matrix of a cover image through the sum of the entry-wise multiplication operation. The proposed scheme provides good embedding capacity with the high visual quality compared to existing state-of-the-art methods. Finally, different steganographic analysis and attacks are carried out to observe its imperceptibility and robustness.

[1]  Radu Ovidiu Preda,et al.  Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain , 2013 .

[2]  Zhe-Ming Lu,et al.  High performance reversible data hiding for block truncation coding compressed images , 2013, Signal Image Video Process..

[3]  Zhenxing Qian,et al.  Reversible fragile watermarking for locating tampered blocks in JPEG images , 2010, Signal Process..

[4]  Jiying Zhao,et al.  Adaptive Watermarking and Tree Structure Based Image Quality Estimation , 2014, IEEE Transactions on Multimedia.

[5]  Chau-Jern Cheng,et al.  A Fragile Watermarking Algorithm for Hologram Authentication , 2014, Journal of Display Technology.

[6]  Yongjian Hu,et al.  A high capacity lossless data hiding scheme for JPEG images , 2013, J. Syst. Softw..

[7]  Florent Retraint,et al.  Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm , 2014, IEEE Transactions on Image Processing.

[8]  Yu-Chee Tseng,et al.  A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..

[9]  Chin-Chen Chang,et al.  Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..

[10]  Durgesh Singh,et al.  DCT based efficient fragile watermarking scheme for image authentication and restoration , 2015, Multimedia Tools and Applications.

[11]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[12]  Safya Belghith,et al.  A new adaptive image steganography scheme based on DCT and chaotic map , 2017, Multimedia Tools and Applications.

[13]  M. Omair Ahmad,et al.  A New Statistical Detector for DWT-Based Additive Image Watermarking Using the Gauss–Hermite Expansion , 2009, IEEE Transactions on Image Processing.

[14]  Rui Yang,et al.  Geometric Invariant Audio Watermarking Based on an LCM Feature , 2011, IEEE Transactions on Multimedia.

[15]  Biswapati Jana,et al.  High payload reversible data hiding scheme using weighted matrix , 2016 .

[16]  David Gur,et al.  Joint Photographic Experts Group (JPEG) compatible data compression of mammograms , 1994, Journal of Digital Imaging.

[17]  Zhenxing Qian,et al.  Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction , 2011, IEEE Transactions on Information Forensics and Security.

[18]  Li Fan,et al.  Improving the embedding efficiency of weight matrix-based steganography for grayscale images , 2013, Comput. Electr. Eng..