High-capacity method for hiding data in the discrete cosine transform domain

Abstract. Steganography is the art and science of hiding data in different media such as texts, audios, images, and videos. Data hiding techniques are generally divided into two groups: spatial and frequency domain techniques. Spatial domain methods generally have low security and, as a result, are less attractive to researchers. Discrete cosine transform (DCT) is the most common transform domain used in steganography and JPEG compression. Since a large number of the DCT coefficients of JPEG images are zero, the capacity of DCT domain-based steganography methods is not very high. We present a high-capacity method for hiding messages in the DCT domain. We describe the method in two classes where the receiver has and where the receiver does not have the cover image. In each class, we consider three cases for each coefficient. By considering n coefficients, there are 3n different situations. The method embeds ⌊log2 3n⌋ bits in these n coefficients. We show that the maximum reachable capacity by our method is 58% higher than the other general steganography methods. Experimental results show that the histogram-based steganalysis methods cannot detect the stego images produced by the proposed method while the capacity is increased significantly.

[1]  Jean-Luc Dugelay,et al.  A Data Mapping Method for Steganography and Its Application to Images , 2008, Information Hiding.

[2]  Amir Hossein Farzaneh,et al.  Eigenvalue Steganography based on eigen characteristics of quantized DCT matrices , 2011, ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia.

[3]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[4]  Hung-Min Sun,et al.  A LSB substitution compatible steganography , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[5]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[6]  Jiangqun Ni,et al.  An Adaptive JPEG Steganographic Scheme Based on the Block Entropy of DCT Coefficients , 2012, Int. J. Digit. Crime Forensics.

[7]  Jiangqun Ni,et al.  An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[8]  Chiang-Lung Liu,et al.  High-performance JPEG steganography using complementary embedding strategy , 2008, Pattern Recognit..

[9]  Yun Q. Shi,et al.  An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[10]  Jessica J. Fridrich,et al.  New methodology for breaking steganographic techniques for JPEGs , 2003, IS&T/SPIE Electronic Imaging.

[11]  Reza Safabakhsh,et al.  Adaptive method for hiding data in images , 2012, J. Electronic Imaging.

[12]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[13]  Shahrokh Ghaemmaghami,et al.  LSB++: An improvement to LSB+ steganography , 2011, TENCON 2011 - 2011 IEEE Region 10 Conference.

[14]  Jessica J. Fridrich,et al.  Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.

[15]  D. Levicky,et al.  A novel JPEG steganography method secure against histogram steganalysis , 2012, Proceedings ELMAR-2012.

[16]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[17]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego , Jsteg , Steganos , and STools — and Some Lessons Learned , 2000 .

[18]  Jiri Fridrich,et al.  Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).