A novel steganography algorithm based on Curvelet transform against JPEG attacks

Comparing with traditional multiscale transform, the Curvelet transform can find optimally sparse epresentations of objects, with discontinuities along C2 edges. Based on dividing blocks curvelet transform the paper present a novel steganography algorithm. Because the changes of the coefficients in detail scale layers keep energy conservation in the ridge domain, the secret message can be inserted through blocks energy quantization. The steganography algorithm is blind to extraction and robust to common attacks, especially to JPEG. The experimental results show that it can improve the secret message capacity, and suit to covert commutation against JPEG attack, which insert messages in detail1 and detail2 scale layers. It can obtain more strong robustness to semi-fragile watermarking which insert messages only in detail1 scale layers.

[1]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[2]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[3]  Changjiang Zhang,et al.  Curvelet Image Watermarking Using Genetic Algorithms , 2008, 2008 Congress on Image and Signal Processing.

[4]  Zhengding Qiu,et al.  Multipurpose Watermarking Based on Multiscale Curvelet Transform , 2008, IEEE Transactions on Information Forensics and Security.

[5]  A. Eskicioglu,et al.  Robust block-based watermarking scheme in curvelet domain , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.

[6]  E. Candès,et al.  New tight frames of curvelets and optimal representations of objects with piecewise C2 singularities , 2004 .

[7]  Deepa Kundur,et al.  Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[8]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.