Journal ArticleDOI
Dither modulation based adaptive steganography resisting jpeg compression and statistic detection
Reads0
Chats0
TLDR
Compared with the current S-UNIWARD steganography, the message extraction error rates of the proposed algorithm after JPEG compression decrease from about 50 % to nearly 0, and the algorithm not only possesses the comparable JPEG compression resistant ability, but also has a stronger detection resistant performance and a higher operation efficiency.Abstract:
In order to improve the JPEG compression resistant performance of the current steganogrpahy algorithms resisting statistic detection, an adaptive steganography algorithm resisting JPEG compression and detection based on dither modulation is proposed. Utilizing the adaptive dither modulation algorithm based on the quantization tables, the embedding domains resisting JPEG compression for spatial images and JPEG images are determined separately. Then the embedding cost function is constructed by the embedding costs calculation algorithm based on side information. Finally, the RS coding is combined with the STCs to realize the minimum costs messages embedding while improving the correct rates of the extracted messages after JPEG compression. The experimental results demonstrate that the algorithm can be applied to both spatial images and JPEG images. Compared with the current S-UNIWARD steganography, the message extraction error rates of the proposed algorithm after JPEG compression decrease from about 50 % to nearly 0; compared with the current JPEG compression and detection resistant steganography algorithms, the proposed algorithm not only possesses the comparable JPEG compression resistant ability, but also has a stronger detection resistant performance and a higher operation efficiency.read more
Citations
More filters
Journal ArticleDOI
On the fault-tolerant performance for a class of robust image steganography
TL;DR: Experiments demonstrate that the practical fault-tolerant results of previous robust steganography methods consist with the theoretical derivation results, which provides a theory support for coding parameter selection and message extraction integrity to the robust Steganography based on “Compression-resistant Domain Constructing + RS-STC Codes”.
Journal ArticleDOI
Towards Robust Image Steganography
TL;DR: This paper proposes a novel image steganography framework that is robust for communication channels offered by various social networks, and proposes a coefficient adjustment scheme to slightly modify the original image based on the stego-image.
Journal ArticleDOI
Improving the Robustness of Adaptive Steganographic Algorithms Based on Transport Channel Matching
TL;DR: A robust steganographic algorithm to resist the JPEG compression of transport channel based on transport channel matching is proposed and has a good performance with respect to both robustness and security.
Journal ArticleDOI
Multiple Robustness Enhancements for Image Adaptive Steganography in Lossy Channels
TL;DR: A series of experimental results demonstrate that the proposed algorithm can extract embedded messages with significantly higher accuracy after different attacks, compared with the state-of-the-art adaptive steganography, and robust watermarking algorithms, while maintaining good detection resistant performance.
Journal ArticleDOI
Robust adaptive steganography based on generalized dither modulation and expanded embedding domain
TL;DR: The purpose of this paper is to refine the robust steganographic scheme by considering asymmetric costs for different modification polarities and expanding the embedding domain for digital images, aiming to aggregate the modifications on the elements with small costs.
References
More filters
Journal ArticleDOI
Quantization index modulation: a class of provably good methods for digital watermarking and information embedding
Brian Chen,Gregory W. Wornell +1 more
TL;DR: It is shown that QIM is "provably good" against arbitrary bounded and fully informed attacks, and achieves provably better rate distortion-robustness tradeoffs than currently popular spread-spectrum and low-bit(s) modulation methods.
Book
Information Hiding Techniques for Steganography and Digital Watermarking
TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
Journal ArticleDOI
Review: Digital image steganography: Survey and analysis of current methods
TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Journal ArticleDOI
Steganalysis by Subtractive Pixel Adjacency Matrix
TL;DR: A method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which is least significant bit (LSB) matching.
Book ChapterDOI
Using high-dimensional image models to perform highly undetectable steganography
TL;DR: A complete methodology for designing practical and highly-undetectable stegosystems for real digital media and explains why high-dimensional models might be problem in steganalysis, and introduces HUGO, a new embedding algorithm for spatial-domain digital images and its performance with LSB matching.