A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients

Current typical adaptive Steganography algorithms cannot extract the embedded secret messages correctly after compression. In order to solve this problem, a JPEG-compression resistant adaptive steganography algorithm is proposed. Utilizing the relationship between DCT coefficients, the domain of messages embedding is determined. The modifying magnitude of different DCT coefficients can be determined according to the quality factors of JPEG compression. To ensure the completely correct extraction of embedded messages after JPEG compression, the RS codes is used to encode the messages to be embedded. Besides, based on the current energy function in the PQe steganography and the distortion function in J-UNIWARD Steganography, the corresponding distortion value of DCT coefficients is calculated. With the help of that, STCs is used to embed the encoded messages into the DCT coefficients, which have a smaller distortion value. The experimental results under different quality factors of JPEG compression and different payloads demonstrate that the proposed algorithm not only has a high correct rate of extracted messages after JPEG compression, which increases from about 60% to nearly 100% comparing with J-UNIWARD steganography under quality factor 75 of JPEG compression, but also has a strong detection resistant performance.

[1]  Gregory L. Heileman,et al.  Fast and robust watermarking of JPEG files , 2002, Proceedings Fifth IEEE Southwest Symposium on Image Analysis and Interpretation.

[2]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[3]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[4]  Jaya Sil,et al.  Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization , 2013, J. Syst. Softw..

[5]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[6]  Jessica J. Fridrich,et al.  Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.

[7]  Tomás Pevný,et al.  Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.

[8]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[9]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[10]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[11]  Yau-Hwang Kuo,et al.  Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions , 2012, Signal Process..