Robust Adaptive Steganography Based on Dither Modulation and Modification With Re-Compression

نویسندگان

چکیده

Traditional adaptive steganography is a technique used for covert communication with high security, but it invalid in the case of stego images are sent to legal receivers over networks which lossy, such as JPEG compression channels. To deal problem, robust proposed enable receiver extract secret messages from damaged images. Previous works utilize reverse engineering and compression-resistant domain constructing implement steganography. In this paper, we adopt modification re-compression scheme improve robustness sequences balance security robustness, move embedding low frequency region DCT (Discrete Cosine Transform) coefficients addition, add additional check codes further reduce average extraction error rate based on framework E-DMAS (Enhancing Dither Modulation Adaptive Steganography). Compared GMAS (Generalized dither Steganography) E-DMAS, experiment results show that our can achieve strong greatly when channel quality factor known.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dither and data compression

This correspondence presents entropy analyses for dithered and undithered quantized sources. Two methods are discussed that reduce the increase in entropy caused by the dither. The first method supplies the dither to the lossless encoding-decoding scheme. It is argued that this increases the complexity of the encoding-decoding scheme. A method to reduce this complexity is proposed. The second m...

متن کامل

Effective Steganography Detection Based On Data Compression

(The main idea: The compression used for stegotext detection. It is known that an embedding message breaks statistical structure of the container, increasing its entropy. Consequently, the full container will compress worse than empty. Let us consider the example: A, B empty and full container respectively. Table 1: Container size before and after compression container.. container size before c...

متن کامل

Multiple Watermarking Algorithm Based on Spread Transform Dither Modulation

Multiple watermarking technique, embedding several watermarks in one carrier, has enabled many interesting applications. In this study, a novel multiple watermarking algorithm is proposed based on the spirit of spread transform dither modulation (STDM). It can embed multiple watermarks into the same region and the same transform domain of one image; meanwhile, the embedded watermarks can be ext...

متن کامل

Robust Steganography based on Matching Pixel Locations

Steganography consist of concealing secret information in a cover object to be sent over a public communication channel. It allows two parties to share hidden information in a way that no intruder can detect the presence of hidden information. This paper presents a novel steganography approach based on pixel location matching of the same cover image. Here the information is not directly embedde...

متن کامل

Message Guided Adaptive Random Audio Steganography using LSB Modification

Steganography is an art of hiding secret messages such that its very presence can’t be identified. Techniques which hide more secret data in cover files are better and they will be more better if they doesn’t affect transparency of cover signal and make steganalysis difficult. We propose a technique which provide keyless randomization to insert secret information in multiple and variable LSBs. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Signal and Information Processing over Networks

سال: 2021

ISSN: ['2373-776X', '2373-7778']

DOI: https://doi.org/10.1109/tsipn.2021.3081373