JPEG Based Conditional Entropy Coding for Correlated Steganography

Correlated steganography considers the case in which the cover work is chosen to be correlated with the covert message that is to be hidden. The advantage of this is that, at least theoretically, the number of bits needed to encode the hidden message can be considerably reduced since it is based on the conditional entropy of the message given the cover. This may be much less than the entropy of the message itself. And if the number of bits needed to embed the hidden message is significantly reduced, then it is more likely that the steganographic algorithm will be secure, i.e. undetectable. In this paper, we describe an example of correlated steganography. Specifically, we are interested in embedding a covert image into a cover image. Comparative experiments indicate that selecting a cover Work that is correlated with the covert message can reduce the number of bits needed to represent the covert image below that needed by standard JPEG compression, provided the two images are sufficiently correlated.

[1]  Ingemar J. Cox,et al.  Information Transmission and Steganography , 2005, IWDW.

[2]  Phil Sallee,et al.  Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..

[3]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1992 .

[4]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[5]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[6]  En-Hui Yang,et al.  On Information Embedding When Watermarks and Covertexts Are Correlated , 2006, ISIT.

[7]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[8]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[9]  Lee-Ming Cheng,et al.  Image hiding based on block difference , 2004, ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..

[10]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[11]  Jessica J. Fridrich,et al.  Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.