JPEG Steganography with Dual Histogram Compensation using Theoretical Estimation Techniques
نویسندگان
چکیده
Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. Many algorithms have been proposed, but so far each has had some weakness that has allowed its effects to be detected, usually through first or second order statistical analysis of the image. Our algorithm, named J4, is a new steganographic technique that improves on our previous system, J3. J4 uses dual histogram restoration along with matrix encoding to minimize detection by first as well as second order steganalysis, whereas J3 only restored the global histogram. J4 embeds data efficiently by theoretical estimation of the optimal value of matrix encoding and payload for each coefficient pair, which is also done by the receiver, so that the stopping points do not need to be included as they were in J3. Existing blind steganalysis tests performed on J4 show that it has a detection rate of 50-60% at 0.05-0.1 bit per non-zero coefficient (bpnz), as compared to 80-90% for F5, OutGuess, Steghide, MB1, MB2 and PQ. Its performance is comparable to the best known algorithm, nsF5, slightly outperforming it at embedding rates of 0.1 bpnz and higher. Since 50% detection rate is classified as random guess using an SVM classifier, J4 is an ideal candidate for a steganographic algorithm.
منابع مشابه
J4: JPEG Steganography using Dual Histogram Compensation
Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. Many algorithms have been proposed, but so far each has had some weakness that has allowed its effects to be detected, usually through first or sec...
متن کاملSteganography and Steganalysis of JPEG Images
My research motivation came from a project supported by Naval Research Laboratory (NRL) where I was working on an algorithm to provide better stealthiness for hiding data inside JPEG images. As a result, with the guidance of my advisor, Dr. Newman, and Ira S. Moskowitz from Center for High Assurance Computer Systems, NRL, we developed J2 steganography algorithm which was based on hiding data in...
متن کاملPM1 steganography in JPEG images using genetic algorithm
Plus minus 1 (PM1) is an improved method to least significant bits (LSB)-based steganography techniques, which not only foils typical attacks against LSB-based techniques, but also provides high capacity. But how to apply it to JPEG images does not appear in literatures. In this paper, PM1 steganography in JPEG images using genetic algorithm (GA) is proposed, in which the GA is used to optimize...
متن کاملUndercover Communication Using Image and Text as Disguise and Countermeasures
A brief survey of some representative techniques of steganography and steganalysis is presented. Various methods developed in the authors’ laboratory are introduced, including symmetric LSB embedding, secure steganography in JPEG, palette, and uncompressed color images, histogram-based analysis and least histogram abnormality steganography, multiple-base notational system based embedding, stego...
متن کاملHigh-performance JPEG steganography using quantization index modulation in DCT domain
This paper presents two JPEG steganographic methods using quantization index modulation (QIM) in the discrete cosine transform (DCT) domain. The two methods approximately preserve the histogram of quantized DCT coefficients, aiming at secure JPEG steganography against histogram-based attacks. In comparison with F5 as a representative JPEG steganography, the proposed methods show high performanc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011