JPEG Steganography with Dual Histogram Compensation using Theoretical Estimation Techniques

نویسندگان

  • Mahendra Kumar
  • Richard Newman
چکیده

Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. Many algorithms have been proposed, but so far each has had some weakness that has allowed its effects to be detected, usually through first or second order statistical analysis of the image. Our algorithm, named J4, is a new steganographic technique that improves on our previous system, J3. J4 uses dual histogram restoration along with matrix encoding to minimize detection by first as well as second order steganalysis, whereas J3 only restored the global histogram. J4 embeds data efficiently by theoretical estimation of the optimal value of matrix encoding and payload for each coefficient pair, which is also done by the receiver, so that the stopping points do not need to be included as they were in J3. Existing blind steganalysis tests performed on J4 show that it has a detection rate of 50-60% at 0.05-0.1 bit per non-zero coefficient (bpnz), as compared to 80-90% for F5, OutGuess, Steghide, MB1, MB2 and PQ. Its performance is comparable to the best known algorithm, nsF5, slightly outperforming it at embedding rates of 0.1 bpnz and higher. Since 50% detection rate is classified as random guess using an SVM classifier, J4 is an ideal candidate for a steganographic algorithm.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

J4: JPEG Steganography using Dual Histogram Compensation

Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. Many algorithms have been proposed, but so far each has had some weakness that has allowed its effects to be detected, usually through first or sec...

متن کامل

Steganography and Steganalysis of JPEG Images

My research motivation came from a project supported by Naval Research Laboratory (NRL) where I was working on an algorithm to provide better stealthiness for hiding data inside JPEG images. As a result, with the guidance of my advisor, Dr. Newman, and Ira S. Moskowitz from Center for High Assurance Computer Systems, NRL, we developed J2 steganography algorithm which was based on hiding data in...

متن کامل

PM1 steganography in JPEG images using genetic algorithm

Plus minus 1 (PM1) is an improved method to least significant bits (LSB)-based steganography techniques, which not only foils typical attacks against LSB-based techniques, but also provides high capacity. But how to apply it to JPEG images does not appear in literatures. In this paper, PM1 steganography in JPEG images using genetic algorithm (GA) is proposed, in which the GA is used to optimize...

متن کامل

Undercover Communication Using Image and Text as Disguise and Countermeasures

A brief survey of some representative techniques of steganography and steganalysis is presented. Various methods developed in the authors’ laboratory are introduced, including symmetric LSB embedding, secure steganography in JPEG, palette, and uncompressed color images, histogram-based analysis and least histogram abnormality steganography, multiple-base notational system based embedding, stego...

متن کامل

High-performance JPEG steganography using quantization index modulation in DCT domain

This paper presents two JPEG steganographic methods using quantization index modulation (QIM) in the discrete cosine transform (DCT) domain. The two methods approximately preserve the histogram of quantized DCT coefficients, aiming at secure JPEG steganography against histogram-based attacks. In comparison with F5 as a representative JPEG steganography, the proposed methods show high performanc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011