Distortion function based on residual blocks for JPEG steganography

Steganography aims to embed additional data into digital media secretly and minimize the distortion caused by data embedding. Up to now, the key point of minimal distortion embedding framework is to design proper distortion function. In this paper, a distortion function for JPEG steganography based on residual blocks is proposed. To obtain less statistical detectability, Residual Block Values (termed as RBVs for short) and quantization steps are both involved in the proposed distortion function. RBVs are exploited to determine the embedding risk caused by modifications in corresponding DCT block while quantization steps are exploited to determine the embedding risk of the selection channel in a block. By implementing the syndrome trellis coding (STC) to embed secret data, the modifications are constrained in hard-to-detect religions. Experiments show that the proposed method performs better than current state-of-the-art methods of JPEG steganography.

[1]  Xingming Sun,et al.  Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.

[2]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[3]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[4]  Chin-Chen Chang,et al.  An adaptive reversible steganographic scheme based on the just noticeable distortion , 2013, Multimedia Tools and Applications.

[5]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[6]  Yun Q. Shi,et al.  Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.

[7]  Xinpeng Zhang,et al.  Hybrid distortion function for JPEG steganography , 2016, J. Electronic Imaging.

[8]  Hang Zhou,et al.  Separable Reversible Data Hiding in Encrypted JPEG Bitstreams , 2018, IEEE Transactions on Dependable and Secure Computing.

[9]  Jessica J. Fridrich,et al.  Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.

[10]  Zhihua Xia,et al.  Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.

[11]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[12]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[13]  Shiguo Lian,et al.  Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics , 2017, Multimedia Tools and Applications.

[14]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[15]  Chin-Chen Chang,et al.  Reversible data hiding scheme based on exploiting modification direction with two steganographic images , 2014, Multimedia Tools and Applications.

[16]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[17]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.

[18]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[19]  Chuan Qin,et al.  Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism , 2016, Signal Process..

[20]  Yi Zhang,et al.  Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.

[21]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[22]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[23]  Jiangqun Ni,et al.  An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[24]  Jessica J. Fridrich,et al.  Wet paper codes with improved embedding efficiency , 2006, IEEE Trans. Inf. Forensics Secur..