New JPEG steganographic scheme with high security performance

Fangjun Huang, Yun-Qing Shi, Jiwu Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we present a new JPEG steganographic scheme. Three measures are taken in our method: 1) The secret message bits are not spread into the quantized block discrete cosine transform (BDCT) coefficients of all frequencies, and only those coefficients (including those of value 0) belonging to relatively low frequencies are selected for data embedding; 2) For any coefficients selected for embedding, the rounding error in JPEG quantization is utilized directly to guide the data embedding; 3) Matrix embedding. The experiments have demonstrated that these three measures can help to achieve small distortion in spatial domain, preserve the histogram of quantized block discrete cosine transform coefficients, and enhance the embedding efficiency of matrix embedding, etc. Consequently, the proposed steganographic scheme has achieved a high security performance. It can resist today's most powerful JPEG steganalyzers effectively.

Original languageAmerican English
Title of host publicationDigital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers
Pages189-201
Number of pages13
DOIs
StatePublished - Feb 1 2011
Event9th International Workshop on Digital Watermarking, IWDW 2010 - Seoul, Korea, Republic of
Duration: Oct 1 2010Oct 3 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6526 LNCS

Other

Other9th International Workshop on Digital Watermarking, IWDW 2010
Country/TerritoryKorea, Republic of
CitySeoul
Period10/1/1010/3/10

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Keywords

  • BDCT
  • Frequency
  • JPEG steganographic scheme

Fingerprint

Dive into the research topics of 'New JPEG steganographic scheme with high security performance'. Together they form a unique fingerprint.

Cite this