Improved Uniform Embedding for Efficient JPEG Steganography

With the wide application of the minimal distortion embedding framework, a well-designed distortion function is of vital importance. In this paper, we propose an improved distortion function for the generalized uniform embedding strategy, called improved UERD (IUERD). Although the UERD has made great success, there still exists room for improvement in designing the distortion function. As a result, the mutual correlations among DCT blocks are utilized more efficiently in the proposed distortion function, which leads to less statistical detectability. The effectiveness of the proposed IUERD is verified with the state-of-the-art steganalyzer - JRM on the BOSSbase database. Compared with prior arts, the proposed scheme gains favorable performance in terms of secure embedding capacity against steganalysis.

[1]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.

[2]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[4]  Jessica J. Fridrich,et al.  Steganalysis of JPEG images using rich models , 2012, Other Conferences.

[5]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[6]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[7]  Yun Q. Shi,et al.  Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Hyoung Joong Kim,et al.  Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding , 2009, MM&Sec '09.

[9]  D. J. Allerton,et al.  Book Review: GPS theory and practice. Second Edition, HOFFMANNWELLENHOFF B., LICHTENEGGER H. and COLLINS J., 1993, 326 pp., Springer, £31.00 pb, ISBN 3-211-82477-4 , 1995 .

[10]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[11]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[12]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[13]  Dana S. Richards,et al.  Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.

[14]  Zhihua Xia,et al.  Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.