Modified YASS algorithm with virtual host block selection and model based embedding

Yet Another Steganography Scheme (YASS), a promising steganographic scheme for JPEG images which can resist blind steganlysis via embedding data in randomized locations. However, the randomization is not sufficient enough, as some positions are possible to hold host blocks and some are definitely not. Meanwhile, the artifacts introduced by quantization index modulation (QIM) embedding led to the weakness for its unsafety. In this paper, to overcome these drawbacks, we present a modified YASS scheme incorporated with further randomized virtual host block selection and the model based embedding which permutes secret bits by a low-density cover probability to minimize differences between the distribution of a cover image and that of the stego. Consequently, the proposed scheme can survive the attack made by the specific steganalyzer for YASS. Experimental results demonstrate that the detection probability achieved by the specific steganalyser on our proposed method is less than 59%, while is about 95% and above on YASS.

[1]  Anindya Sarkar,et al.  Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography , 2010, IEEE Transactions on Information Forensics and Security.

[2]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[3]  Anindya Sarkar,et al.  Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.

[4]  Yun Q. Shi,et al.  JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[5]  J. Fridrich,et al.  Attacking the OutGuess , 2002 .

[6]  Phil Sallee,et al.  Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..

[7]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[8]  Bin Li,et al.  Steganalysis of YASS , 2009, IEEE Trans. Inf. Forensics Secur..

[9]  Rainer Böhme,et al.  Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics , 2004, ESORICS.

[10]  Jessica J. Fridrich,et al.  Calibration revisited , 2009, MM&Sec '09.

[11]  Bin Li,et al.  Steganalysis of YASS , 2009, IEEE Transactions on Information Forensics and Security.

[12]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[13]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.

[14]  Anindya Sarkar,et al.  YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.

[15]  Yao Zhao,et al.  A high-performance YASS-like scheme using randomized big-blocks , 2010, 2010 IEEE International Conference on Multimedia and Expo.