scispace - formally typeset
Journal ArticleDOI

Dither modulation based adaptive steganography resisting jpeg compression and statistic detection

Reads0
Chats0
TLDR
Compared with the current S-UNIWARD steganography, the message extraction error rates of the proposed algorithm after JPEG compression decrease from about 50 % to nearly 0, and the algorithm not only possesses the comparable JPEG compression resistant ability, but also has a stronger detection resistant performance and a higher operation efficiency.
Abstract
In order to improve the JPEG compression resistant performance of the current steganogrpahy algorithms resisting statistic detection, an adaptive steganography algorithm resisting JPEG compression and detection based on dither modulation is proposed. Utilizing the adaptive dither modulation algorithm based on the quantization tables, the embedding domains resisting JPEG compression for spatial images and JPEG images are determined separately. Then the embedding cost function is constructed by the embedding costs calculation algorithm based on side information. Finally, the RS coding is combined with the STCs to realize the minimum costs messages embedding while improving the correct rates of the extracted messages after JPEG compression. The experimental results demonstrate that the algorithm can be applied to both spatial images and JPEG images. Compared with the current S-UNIWARD steganography, the message extraction error rates of the proposed algorithm after JPEG compression decrease from about 50 % to nearly 0; compared with the current JPEG compression and detection resistant steganography algorithms, the proposed algorithm not only possesses the comparable JPEG compression resistant ability, but also has a stronger detection resistant performance and a higher operation efficiency.

read more

Citations
More filters
Journal ArticleDOI

On the fault-tolerant performance for a class of robust image steganography

TL;DR: Experiments demonstrate that the practical fault-tolerant results of previous robust steganography methods consist with the theoretical derivation results, which provides a theory support for coding parameter selection and message extraction integrity to the robust Steganography based on “Compression-resistant Domain Constructing + RS-STC Codes”.
Journal ArticleDOI

Towards Robust Image Steganography

TL;DR: This paper proposes a novel image steganography framework that is robust for communication channels offered by various social networks, and proposes a coefficient adjustment scheme to slightly modify the original image based on the stego-image.
Journal ArticleDOI

Improving the Robustness of Adaptive Steganographic Algorithms Based on Transport Channel Matching

TL;DR: A robust steganographic algorithm to resist the JPEG compression of transport channel based on transport channel matching is proposed and has a good performance with respect to both robustness and security.
Journal ArticleDOI

Multiple Robustness Enhancements for Image Adaptive Steganography in Lossy Channels

TL;DR: A series of experimental results demonstrate that the proposed algorithm can extract embedded messages with significantly higher accuracy after different attacks, compared with the state-of-the-art adaptive steganography, and robust watermarking algorithms, while maintaining good detection resistant performance.
Journal ArticleDOI

Robust adaptive steganography based on generalized dither modulation and expanded embedding domain

TL;DR: The purpose of this paper is to refine the robust steganographic scheme by considering asymmetric costs for different modification polarities and expanding the embedding domain for digital images, aiming to aggregate the modifications on the elements with small costs.
References
More filters
Journal ArticleDOI

Quantization index modulation: a class of provably good methods for digital watermarking and information embedding

TL;DR: It is shown that QIM is "provably good" against arbitrary bounded and fully informed attacks, and achieves provably better rate distortion-robustness tradeoffs than currently popular spread-spectrum and low-bit(s) modulation methods.
Book

Information Hiding Techniques for Steganography and Digital Watermarking

TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
Journal ArticleDOI

Review: Digital image steganography: Survey and analysis of current methods

TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Journal ArticleDOI

Steganalysis by Subtractive Pixel Adjacency Matrix

TL;DR: A method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which is least significant bit (LSB) matching.
Book ChapterDOI

Using high-dimensional image models to perform highly undetectable steganography

TL;DR: A complete methodology for designing practical and highly-undetectable stegosystems for real digital media and explains why high-dimensional models might be problem in steganalysis, and introduces HUGO, a new embedding algorithm for spatial-domain digital images and its performance with LSB matching.
Related Papers (5)