Errorless Robust JPEG Steganography using Outputs of JPEG Coders

نویسندگان

چکیده

Robust steganography is a technique of hiding secret messages in images so that the message can be recovered after additional image processing. One most popular processing operations JPEG recompression. Unfortunately, today's steganographic methods addressing this issue only provide probabilistic guarantee recovering and are consequently not errorless. That unacceptable since even single unexpected change make whole unreadable if it encrypted. We propose to create robust set DCT coefficients by inspecting their behavior during recompression, which requires access targeted compressor. This done dividing into 64 non-overlapping lattices because one embedding potentially affect many other from same block The robustness then combined with standard costs creating lattice scheme against Through experiments, we show size scheme's security depends on ordering embedding. verify validity proposed method three typical compressors Slack instant messaging application. benchmark its for various payloads, different ways lattices, range Quality Factors. Finally, errorless construction, meaning embedded will always readable.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparison of Jpeg Image Coders

In this paper we report results from our comparative study of JPEG and JPEG2000 image coders using two image quality measures: Peak Signal to Noise Ratio (PSNR) as traditional objective picture quality measure, and Picture Quality Scale as perception based quantitative picture quality measure. Coders are evaluated in ratedistortion sense. The influences of different image contents and compressi...

متن کامل

J4: JPEG Steganography using Dual Histogram Compensation

Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. Many algorithms have been proposed, but so far each has had some weakness that has allowed its effects to be detected, usually through first or sec...

متن کامل

Universal Detection of JPEG Steganography

In this paper, we present a novel universal approach which consists in exploring statistics in the compressed frequency domain. This approach is motivated by two main characteristics of the lossless compression step of the JPEG format. First, this step can be considered as a bijective mapping and then, when only few bits are flipped at its input, half the bits are flipped at the output. These p...

متن کامل

A Performance Evaluation of Jpeg Steganography Techniques

With the rapid application growing of internet and wireless network, information security becomes significant to protect commerce secret and personal privacy. Steganography plays crucial role for information security guarantee. There have been number of steganography embedding techniques proposed over last few years. In this paper, our goal is to evaluate number of JPEG steganography techniques...

متن کامل

Challenging the doctrines of JPEG steganography

The design of both steganography and steganalysis methods for digital images heavily relies on empirically justified principles. In steganography, the domain in which the embedding changes are executed is usually the preferred domain in which to measure the statistical impact of embedding (to construct the distortion function). Another principle almost exclusively used in steganalysis states th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2023

ISSN: ['1941-0018', '1545-5971', '2160-9209']

DOI: https://doi.org/10.1109/tdsc.2023.3306379