Anti-compression JPEG steganography over repetitive compression networks

Abstract Existing work on steganography mostly assumes that an image remains unchanged during transmission from the sender to the receiver. This assumption, however, may not hold in the era of the Internet due to unknown compression from the network service providers. As a result, the hidden information cannot be correctly recovered at the receiver. To address the problem, we design a new JPEG steganographic method that can resist repetitive compression during network transmission, without even knowing the compression process controlled by the network service providers. Our method uses a simulated repetitive compression network, and based on its feedback performs adaptive dither adjustment to dynamically modify the DCT coefficients disturbed by the compression process. Stego images generated with our method can be used to successfully extract the original secret messages, even after the stego images pass through multiple unknown compression processes during network transmission. Extensive experiments demonstrate that compared with existing JPEG steganographic methods, our method can effectively resist repetitive compression, while maintaining a lower bit error rate and strong anti-steganalysis capability.

[1]  Jessica J. Fridrich,et al.  Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.

[2]  Andrew D. Ker Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.

[3]  Xinpeng Zhang,et al.  Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization , 2018, IEEE Signal Processing Letters.

[4]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[5]  Sam Kwong,et al.  An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix , 2014, IEEE Transactions on Information Forensics and Security.

[6]  Yi Zhang,et al.  Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.

[7]  Xinpeng Zhang,et al.  Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition , 2018, IEEE Access.

[8]  Jiangqun Ni,et al.  Uniform Embedding for Efficient Steganography of H.264 Video , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).

[9]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[10]  Mo Chen,et al.  Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.

[11]  Chuan Qin,et al.  Dither modulation based adaptive steganography resisting jpeg compression and statistic detection , 2017, Multimedia Tools and Applications.

[12]  Reza Safabakhsh,et al.  High-capacity method for hiding data in the discrete cosine transform domain , 2013, J. Electronic Imaging.

[13]  Ibrahim Kamel,et al.  High-capacity steganography: a global-adaptive-region discrete cosine transform approach , 2017, Multimedia Tools and Applications.

[14]  Chia-Chen Lin,et al.  HighCapacity Data Hiding Scheme for DCT-based Images , 2010, J. Inf. Hiding Multim. Signal Process..

[15]  Jiwu Huang,et al.  New Channel Selection Rule for JPEG Steganography , 2012, IEEE Transactions on Information Forensics and Security.

[16]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[17]  Weiming Zhang,et al.  On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..

[18]  Jerry M. Mendel,et al.  Blind deconvolution (equalization): Some new results , 1996, Signal Process..

[19]  Jie Ding,et al.  Normalized Correlation-Based Quantization Modulation for Robust Watermarking , 2014, IEEE Transactions on Multimedia.

[20]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[21]  Wei Zhang,et al.  Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection , 2018, Signal Process..

[22]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[23]  Xianfeng Zhao,et al.  AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model , 2019, IEEE Transactions on Information Forensics and Security.

[24]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[25]  Yau-Hwang Kuo,et al.  Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions , 2012, Signal Process..

[26]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[27]  Xinpeng Zhang,et al.  Towards Robust Image Steganography , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[28]  Joan L. Mitchell,et al.  JPEG: Still Image Data Compression Standard , 1992 .