AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (2 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Fast Carrier Selection of JPEG Steganography Appropriate for Application

Weixiang RenYibo XuLiming ZhaiLina Wang( )Ju Jia
Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan 430000, China
School of Cyber Science and Engineering, Wuhan University, Wuhan 430000, China.
Micropattern Co. Ltd., Wuhan 430000, China.
Show Author Information

Abstract

In recent years, the improvement of the security of steganography mainly involves not only carrier security but also distortion function. In the actual environment, the existing method of carrier selection is limited by its complex algorithm and slow running speed, making it not appropriate for rapid communication. This study proposes a method for selecting carriers and improving the security of steganography. JPEG images are decompressed to spatial domain. Then correlation coefficients between two adjacent pixels in the horizontal, vertical, counter diagonal, and major diagonal directions are calculated. The mean value of the four correlation coefficients is used to evaluate the security of each JPEG image. The images with low correlation coefficients are considered safe carriers and used for embedding in our scheme. The experimental results indicate that the stego images generated from the selected carriers exhibit a higher anti-steganalysis capability than those generated from the randomly selected carriers. Under the premise of the same security level, the images with low correlation coefficients have a high capacity. Our algorithm has a very fast running speed, and the running time of a 2048×2048 image is less than 1 s.

References

[1]
M. C. Trivedi, S. Sharma, and V. K. Yadav, Analysis of several image steganography techniques in spatial domain: A survey, in Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, Rajasthan, India, 2016, p. 84.
[2]
M. Hussain, A. W. Wahab, Y. I. Idris, A. T. Ho, and K. Jung, Image steganography in spatial domain: A survey, Signal Processing-Image Communication, vol. 65, pp. 46-66, 2018.
[3]
Y. Zhang, M. Zhang, X. Yang, D. Guo, and L. Liu, Novel video steganography algorithm based on secret sharing and error-correcting code for H.264/AVC, Tsinghua Science & Technology, vol. 22, no. 2, pp. 198-209, 2017.
[4]
S. Xu, P. Zhang, P. Wang, and H. Yang, Performance analysis of data hiding in MPEG-4 AAC Audio, Tsinghua Science & Technology, vol. 14, no. 1, pp. 55-61, 2009.
[5]
W. Ren, Y. Liu, and J. Zhao, Provably secure information hiding via short text in social networking tools, Tsinghua Science & Technology, vol. 17, no. 3, pp. 225-231, 2012.
[6]
K. Karampidis, E. Kavallieratou, and G. Papadourakis, A review of image steganalysis techniques for digital forensics, Journal of Information Security and Applications, vol. 40, pp. 217-235, 2018.
[7]
T. Pevny, P. Bas, and J. Fridrich, Steganalysis by subtractive pixel adjacency matrix, IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 215-224, 2010.
[8]
J. Fridrich and J. Kodovsky, Rich models for steganalysis of digital images, IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868-882, 2012.
[9]
J. Kodovsky and J. Fridrich, Steganalysis of JPEG images using rich models, in Proceedings of Media Watermarking, Security, and Forensics, Burlingame, CA, USA, 2012, pp. 81-93.
[10]
J. Kodovsky, J. Fridrich, and V. Holub, Ensemble classifier for steganalysis of digital media, IEEE Transactions on Information Forensics and Security. vol. 7, no. 2, pp. 432-444, 2012.
[11]
V. Holub and J. Fridrich, Low-complexity features for JPEG steganalysis using undecimated DCT, IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, pp. 219-228, 2015.
[12]
X. Song, F. Liu, C. Yang, X. Luo, and Y. Zhang, Steganalysis of adaptive JPEG steganography using 2D Gabor filters, in Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, Portland, OR, USA, 2015, pp. 15-23.
[13]
V. Holub and J. Fridrich, Phase-aware projection model for steganalysis of JPEG images, in Proceedings of Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2015, pp. 259-269.
[14]
J. Zeng, S. Tan, B. Li, and J. Huang, Large-scale JPEG image steganalysis using hybrid deep-learning framework, IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1200-1214, 2018.
[15]
S. Wu, S. Zhong, and Y. Liu, Deep residual learning for image steganalysis, Multimedia Tools and Applications, vol. 77, no. 9, pp. 10437-10453, 2018.
[16]
M. Boroumand, M. Chen, and J. Fridrich, Deep residual network for steganalysis of digital images, IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1181-1193, 2019.
[17]
T. Filler, J. Judas, and J. Fridrich, Minimizing additive distortion in steganog-raphy using syndrome-trellis codes, IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 920-935. 2011.
[18]
T. Pevn, T. Filler, and P. Bas, Using high-dimensional image models to perform highly undetectable steganography, Information Hiding, .
[19]
C. Wang and J. Ni, An efficient JPEG steganographic scheme based on the block entropy of DCT coeffcients, in Proceedings of 2012 IEEE International Conference on Acoustics, Speech and Signal Processing, Kyoto, Japan, 2012, pp. 1785-1788.
[20]
L. Guo, J. Ni, and Y. Shi, Uniform embedding for efficient JPEG steganography, IEEE Transactions on Information Forensics and Security, vol. 9, no. 5, pp. 814-825, 2014.
[21]
V. Holub and J. Fridrich, Digital image steganography using universal distortion, in Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, 2013, pp. 59-68.
[22]
V. Sedighi, R. Cogranne, and J. Fridrich, Content-adaptive steganography by minimizing statistical detectability, IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 221-234, 2015.
[23]
J. Kodovsky, V. Sedighi, and J. Fridrich, Study of cover source mismatch in steganalysis and ways to mitigate its impact, in Proceedings of Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014, pp. 204-215.
[24]
Q. Gibouloto, R. Cogranneo, and P. Bas, Steganalysis into the wild: How to define a source? Electronic Imaging, vol. 2018, no. 7, p. 318, 2018.
[25]
M. Yedroudj, M. Chaumont, and F. Comby, How to augment a small learning set for improving the performances of a CNN-based steganalyzer? Electronic Imaging, vol. 2018, no. 7, p. 317, 2018.
[26]
L. Wang, Y. Xu, L. Zhai, Y. Ren, and B. Du, A posterior evaluation algorithm of steganalysis accuracy inspired by residual co-occurrence probability, Pattern Recognition, vol. 87, pp. 106-117, 2019.
[27]
M. S. Subhedar and V. H. Mankar, Curvelet transform and cover selection for secure steganography, Multimedia Tools and Applications, vol. 77, no. 7, pp. 8115-8138, 2018.
[28]
Z. Wang, X. Zhang, and Z. Yin, Joint cover-selection and payload-allocation by steganographic distortion optimization, IEEE Signal Processing Letters, vol. 25, no. 10, pp. 1530-1534, 2018.
[29]
J. Kodovsky and J. Fridrich, Calibration revisited, in Proceedings of the 11th ACM Workshop on Multimedia and Security, Princeton, NJ, USA, 2009, pp. 63-74.
[30]
F. Li, K. Wu, J. Lei, M. Wen, and Y. Ren, Unsupervised steganalysis over social networks based on multi-reference sub-image sets, Multimedia Tools and Applications, vol. 77, no. 14, pp. 17953-17971, 2018.
[31]
X. Song, F. Liu, L. Chen, C. Yang, and X. Luo, Optimal Gabor filters for steganalysis of content-adaptive JPEG steganography, KSII Transactions on Internet and Information Systems, vol. 11, no. 1, pp. 552-569, 2017.
[32]
B. Li, Z. Li, S. Zhou, S. Tan, and X. Zhang, New steganalytic features for spatial image steganography based on derivative filters and threshold LBP operator, IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1242-1257, 2018.
[33]
P. Bas, T. Filler, and T. Pevny, Break our steganographic system: The ins and outs of organizing BOSS, Information Hiding, vol. 6958, pp. 59-70, 2011.
Tsinghua Science and Technology
Pages 614-624
Cite this article:
Ren W, Xu Y, Zhai L, et al. Fast Carrier Selection of JPEG Steganography Appropriate for Application. Tsinghua Science and Technology, 2020, 25(5): 614-624. https://doi.org/10.26599/TST.2019.9010069

900

Views

96

Downloads

1

Crossref

N/A

Web of Science

4

Scopus

0

CSCD

Altmetrics

Received: 24 October 2019
Accepted: 13 November 2019
Published: 16 March 2020
© The author(s) 2020

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return