Dither modulation based adaptive steganography resisting jpeg compression and statistic detection

In order to improve the JPEG compression resistant performance of the current steganogrpahy algorithms resisting statistic detection, an adaptive steganography algorithm resisting JPEG compression and detection based on dither modulation is proposed. Utilizing the adaptive dither modulation algorithm based on the quantization tables, the embedding domains resisting JPEG compression for spatial images and JPEG images are determined separately. Then the embedding cost function is constructed by the embedding costs calculation algorithm based on side information. Finally, the RS coding is combined with the STCs to realize the minimum costs messages embedding while improving the correct rates of the extracted messages after JPEG compression. The experimental results demonstrate that the algorithm can be applied to both spatial images and JPEG images. Compared with the current S-UNIWARD steganography, the message extraction error rates of the proposed algorithm after JPEG compression decrease from about 50 % to nearly 0; compared with the current JPEG compression and detection resistant steganography algorithms, the proposed algorithm not only possesses the comparable JPEG compression resistant ability, but also has a stronger detection resistant performance and a higher operation efficiency.

[1]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[2]  Fenlin Liu,et al.  A framework of adaptive steganography resisting JPEG compression and detection , 2016, Secur. Commun. Networks.

[3]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[4]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[5]  Jessica J. Fridrich,et al.  Calibration revisited , 2009, MM&Sec '09.

[6]  Jessica J. Fridrich,et al.  Side-informed steganography with additive distortion , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[7]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.

[8]  Gregory L. Heileman,et al.  Fast and robust watermarking of JPEG files , 2002, Proceedings Fifth IEEE Southwest Symposium on Image Analysis and Interpretation.

[9]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[10]  Zhenfu Cao,et al.  Survey of information security , 2007, Science in China Series F: Information Sciences.

[11]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[12]  Xiangyang Wang,et al.  A new robust color image watermarking using local quaternion exponent moments , 2014, Inf. Sci..

[13]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[14]  Weiwei Liu,et al.  Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency , 2015, Secur. Commun. Networks.

[15]  Fenlin Liu,et al.  Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection , 2017, Multimedia Tools and Applications.

[16]  Jessica J. Fridrich,et al.  Minimizing embedding impact in steganography using trellis-coded quantization , 2010, Electronic Imaging.

[17]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[18]  Yau-Hwang Kuo,et al.  Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions , 2012, Signal Process..

[19]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[20]  Bin Ma,et al.  Dither modulation of significant amplitude difference for wavelet based robust watermarking , 2015, Neurocomputing.

[21]  Fenlin Liu,et al.  A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[22]  Yau-Hwang Kuo,et al.  On the Selection of Optimal Feature Region Set for Robust Digital Image Watermarking , 2011, IEEE Transactions on Image Processing.

[23]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[24]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[25]  Jaya Sil,et al.  Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization , 2013, J. Syst. Softw..

[26]  Akihiro Okamoto,et al.  Analysis of watermarking systems in the frequency domain and its application to design of robust watermarking systems , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[27]  Jessica J. Fridrich,et al.  Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.

[28]  Tomás Pevný,et al.  Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.

[29]  Akihiro Okamoto,et al.  Analysis of watermarking systems in the frequency domain and its application to design of robust watermarking systems , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).