A New Steganography Method for Embedding Message in JPEG Images

Steganography is widely applied by information security systems. The aim of steganography is to create a secret and secure channel between the sender and receiver. Steganography is basically performed in the different data types, such as image and video. Given the rapid growth of digital systems and imaging tools, the number of images and transmission of secret information is also growing. JPEG images are very popular because of their smaller size that makes them suitable for the transmission. The steganography procedure in an image can usually be performed in two domain, space domain and transform domain such as Fourier. In this preliminary study, a text steganography technique in JPEG images is presented. The text steganography is carried out on the bits with the least significant value in the discrete matrix, thus the embedded message insertion has less impact on the image quality. In the proposed method, two less significant bits of pixels are used to hide the embedded message in the image. In JPEG compression procedure before encoding, the steganography operation is applied on the image after its transformation from time into the frequency space and exactly(or right away) after the discretization of transformed data. The experimental results suggest that our approach has high capacity performance in comparison with the conventional methods.

[1]  Milav Dabgar,et al.  Resisting Blind Steganalysis in Real Time Covert Communication , 2015 .

[2]  Hardik Patel,et al.  Steganography Technique Based on DCT Coefficients , 2012 .

[3]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[4]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[5]  Hamid Hassanpour,et al.  A short-term learning framework based on relevance feedback for content-based image retrieval , 2017, 2017 3rd Iranian Conference on Intelligent Systems and Signal Processing (ICSPIS).

[6]  Jessica J. Fridrich,et al.  Natural Steganography in JPEG Compressed Images , 2018, Media Watermarking, Security, and Forensics.

[7]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[8]  A. J. Raphael,et al.  Cryptography and Steganography – A Survey , .

[9]  I.Venkata Sai Manoj Cryptography and Steganography , 2010 .

[10]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.