A framework of adaptive steganography resisting JPEG compression and detection

Current typical adaptive steganography algorithms take the detection resistant capability into account adequately but usually cannot extract the embedded secret messages correctly when stego images suffer from compression attack. In order to solve this problem, a framework of adaptive steganography resisting JPEG compression and detection is proposed. Utilizing the relationship between Discrete Cosine Transformation DCT coefficients, the domain of messages embedding is determined; for the maximum of the JPEG compression resistant ability, the modifying magnitude of different DCT coefficients caused by messages embedding can be determined; in order to ensure the completely correct extraction of embedded messages after JPEG compression, error correct codes are used to encode the messages to be embedded; on the basis of the current distortion functions, the distortion value of DCT coefficients corresponding to the modifying magnitude in the embedding domain can be calculated; to improve the detection resistant ability of the stego images and realize the minimum distortion embedding, syndrome-trellis codes are used to embed the encoded messages into the DCT coefficients that have a smaller distortion value. Based on the proposed framework, an adaptive steganography algorithm resisting JPEG compression and detection is designed, which utilizes the relationship between coefficients in a DCT block and the means of that in three adjacent DCT blocks. The experimental results that demonstrate the proposed algorithm not only has a good JPEG compression resistant ability but also has a strong detection resistant performance. Comparing with current J-UNIWARD steganography under quality factor 85 of JPEG compression, the extraction error rates without pre-compression decrease from about 50% to nearly 0, while the stego images remain a good detection resistant ability comparing with a typical robust watermarking algorithm, which shows the validity of the proposed framework. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[2]  Yun Q. Shi,et al.  An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[3]  Tomás Pevný,et al.  Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.

[4]  Hefei Ling,et al.  Real-Time Compressed- Domain Video Watermarking Resistance to Geometric Distortions , 2012, IEEE MultiMedia.

[5]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[6]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[7]  Zhihua Xia,et al.  Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.

[8]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[9]  Jessica J. Fridrich,et al.  Calibration revisited , 2009, MM&Sec '09.

[10]  Gregory L. Heileman,et al.  Fast and robust watermarking of JPEG files , 2002, Proceedings Fifth IEEE Southwest Symposium on Image Analysis and Interpretation.

[11]  Yau-Hwang Kuo,et al.  Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions , 2012, Signal Process..

[12]  Jessica J. Fridrich,et al.  Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.

[13]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[14]  Ja-Ling Wu,et al.  Gradient Original Image After JPEG compression or image processing Gradient magnitude Mean of gradient magnitude Determine amount of hidden watermark bits Intensity image Mean of gradient magnitude , 2002 .

[15]  Dimitris E. Koulouriotis,et al.  Performance evaluation of moment-based watermarking methods: A review , 2012, J. Syst. Softw..

[16]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[17]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.

[18]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[19]  Jaya Sil,et al.  Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization , 2013, J. Syst. Softw..

[20]  Gang Chen,et al.  Color Image Analysis by Quaternion-Type Moments , 2014, Journal of Mathematical Imaging and Vision.

[21]  Xiangyang Wang,et al.  A new robust color image watermarking using local quaternion exponent moments , 2014, Inf. Sci..

[22]  Gaurav Tiwari A Review on Robust Watermarking with its Applications and Comparative Analysis , 2015 .