PM1 steganography in JPEG images using genetic algorithm

Plus minus 1 (PM1) is an improved method to least significant bits (LSB)-based steganography techniques, which not only foils typical attacks against LSB-based techniques, but also provides high capacity. But how to apply it to JPEG images does not appear in literatures. In this paper, PM1 steganography in JPEG images using genetic algorithm (GA) is proposed, in which the GA is used to optimize the performance, such as minimizing blockiness. Theoretical analysis to the histogram characteristics after steganography is discussed in details, which proves that PM1 used in JPEG images preserves the first-order statistical properties. Experiments show that the proposed method outperforms the other methods in terms of capacity and security.

[1]  Phil Sallee,et al.  Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..

[2]  Lakhmi C. Jain,et al.  Intelligent Multimedia Data Hiding: New Directions , 2007, Studies in Computational Intelligence.

[3]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[4]  Zbigniew Michalewicz,et al.  Genetic Algorithms + Data Structures = Evolution Programs , 1992, Artificial Intelligence.

[5]  Jeng-Shyang Pan,et al.  Robust VQ-based digital watermarking for memoryless binary symmetric channel , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[6]  David Coley,et al.  Introduction to Genetic Algorithms for Scientists and Engineers , 1999 .

[7]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[8]  Hsiang-Cheh Huang,et al.  Genetic Watermarking for Zerotree-Based Applications , 2008 .

[9]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[10]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[11]  Hsiang-Cheh Huang,et al.  Progressive Watermarking Techniques Using Genetic Algorithms , 2007 .

[12]  Jessica J. Fridrich,et al.  New methodology for breaking steganographic techniques for JPEGs , 2003, IS&T/SPIE Electronic Imaging.

[13]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[14]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[15]  David Soukal,et al.  Advanced steganographic and steganalytic methods in the spatial domain , 2006 .

[16]  Bin Li,et al.  Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images using Coefficient Symmetry , 2007, 2007 IEEE International Conference on Image Processing.

[17]  David E. Goldberg,et al.  Genetic Algorithms in Search Optimization and Machine Learning , 1988 .

[18]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[19]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[20]  J. Fridrich,et al.  Attacking the OutGuess , 2002 .

[21]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..