Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain

ABSTRACT This paper proposes a novel distortion function for JPEG steganography, which depends on the magnitude of discrete cosine transformation (DCT) coefficients, the first- and second-order residuals, and the amount of zeros in a DCT block. The magnitude of a DCT coefficient indicates the ability of the current coefficient to conceal modification trace. The first- and second-order residuals make sufficient use of the correlation in DCT domain, and the amount of zeros in a DCT block illustrates the block texture well. These elements are combined together to measure the risks of detection due to the modification on the cover data. By using this proposed distortion function, the embedding changes are limited in texture regions when employing the syndrome trellis coding to embed secret data. Thus less detectable artefacts could be found in stego images. The experimental results demonstrate that the proposed scheme performs less statistical detectability when comparing to current state-of-the-art steganographic methods for JPEG images.

[1]  Bin Li,et al.  Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[2]  Yi Zhang,et al.  Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.

[3]  Hang Zhou,et al.  Separable Reversible Data Hiding in Encrypted JPEG Bitstreams , 2018, IEEE Transactions on Dependable and Secure Computing.

[4]  Jiwu Huang,et al.  New Channel Selection Rule for JPEG Steganography , 2012, IEEE Transactions on Information Forensics and Security.

[5]  Tomás Pevný,et al.  Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[6]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[7]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[8]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[9]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[10]  Weiming Zhang,et al.  Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes , 2008, Information Hiding.

[11]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[12]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[13]  Tomás Pevný,et al.  Novelty detection in blind steganalysis , 2008, MM&Sec '08.

[14]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[15]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[16]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[17]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[18]  Jessica J. Fridrich,et al.  Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.

[19]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[20]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[21]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[22]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.

[23]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.