High-performance JPEG steganography using quantization index modulation in DCT domain

نویسندگان

  • Hideki Noda
  • Michiharu Niimi
  • Eiji Kawaguchi
چکیده

This paper presents two JPEG steganographic methods using quantization index modulation (QIM) in the discrete cosine transform (DCT) domain. The two methods approximately preserve the histogram of quantized DCT coefficients, aiming at secure JPEG steganography against histogram-based attacks. In comparison with F5 as a representative JPEG steganography, the proposed methods show high performance with regard to embedding rate, PSNR of stego image, and particularly histogram preservation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Estimating the Redundancy Factor for RA-encoded sequences and also Studying Steganalysis Performance of YASS

Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform (DCT) domain in randomly chosen image blocks. To maximize the embedding rate for a given image and a specified attack channel, the redundancy factor used by the repeat-accumulate (RA) code based error correction frame...

متن کامل

Data Hiding in Color Images Using Modified Quantization Table

With the rapid growth of of internet and wireless networks, information security becomes significant to protect e-commerce and personal privacy. Data Hiding is an important issue for information security.There has been number of steganographic embedding techniques proposed over last few years. This paper presents a novel steganographic method based on the JPEG quantization table modification. I...

متن کامل

Statistical Steganalysis Scheme of Using Block DCT

Steganalysis is the process of cracking to identifying steganography by scrutinizing different Statistical parameter of a stego media. First of all a mathematical analysis may disclose statistical discrepancy in the stego medium. After that steganalysis process determines whether that media contains hidden message or not and then try to recover the message from it. The information hiding proces...

متن کامل

Detection of perturbed quantization (PQ) steganography based on empirical matrix

Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...

متن کامل

A Ne JPEG Resistant Color Image Watermarki g Algorithm Based on Quantization Index odulation

A new color image watermarking algorithm with resistance to JPEG lossy compression based on Quantization Index Modulation (QIM) is proposed in this paper. As it is known, QIM method can achieve a good balance between the embedding bit rate, robustness and distortion between the original image and the composited image by modulating the source signal into different clusters. The corresponding DCT...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Pattern Recognition Letters

دوره 27  شماره 

صفحات  -

تاریخ انتشار 2006