Skip to main content
Log in

Dither modulation based adaptive steganography resisting jpeg compression and statistic detection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In order to improve the JPEG compression resistant performance of the current steganogrpahy algorithms resisting statistic detection, an adaptive steganography algorithm resisting JPEG compression and detection based on dither modulation is proposed. Utilizing the adaptive dither modulation algorithm based on the quantization tables, the embedding domains resisting JPEG compression for spatial images and JPEG images are determined separately. Then the embedding cost function is constructed by the embedding costs calculation algorithm based on side information. Finally, the RS coding is combined with the STCs to realize the minimum costs messages embedding while improving the correct rates of the extracted messages after JPEG compression. The experimental results demonstrate that the algorithm can be applied to both spatial images and JPEG images. Compared with the current S-UNIWARD steganography, the message extraction error rates of the proposed algorithm after JPEG compression decrease from about 50 % to nearly 0; compared with the current JPEG compression and detection resistant steganography algorithms, the proposed algorithm not only possesses the comparable JPEG compression resistant ability, but also has a stronger detection resistant performance and a higher operation efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Cheddad A, Condell J, Curran K et al (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90(3):727–752

    Article  MATH  Google Scholar 

  2. Chen B, Wornell GW (2001) Quantization index Modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423–1443

    Article  MathSciNet  MATH  Google Scholar 

  3. Denemark T, Fridrich J (2015) Side-informed steganography with additive distortion. In: Proceedings of International Workshop on Information Forensics and Security (WIFS), IEEE, pp 1–6

  4. Filler T, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. In: Proceedings of SPIE - The International Society for Optical Engineering, 7880:0F-0F-14

  5. Filler T, Judas J, Fridrich J (2010) Minimizing Embedding Impact in Steganography Using Trellis-coded Quantization. In: Proceedings of SPIE - The International Society for Optical Engineering, (7541): 175-178

  6. Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics Secur 6(3):920–935

    Article  Google Scholar 

  7. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Proceedings of IEEE Workshop on Information Forensic and Security, pp 234–239

  8. Holub V, Fridrich J (2013) Digital steganography using universal distortion function. In: Proceedings of the 15th ACM International Workshop on Information Hiding, pp 59–68

  9. Kodovský J, Fridrich J (2009) Calibration revisited. In: Proceedings of the 11th Workshop on Multimedia and Security. ACM, pp 63–74

  10. Katzenbeisser S, Petitcolas FA (2000) Information hiding techniques for steganography and digital watermarking. Artech House, Inc

  11. Luo W, Heileman GL, Pizano CE (2002) Fast and robust watermarking of JPEG files. In: Proceedings of the Fifth IEEE Southwest Symposium, pp 158–162

  12. Liu W, Liu G, Dai Y (2015) Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency. Security and Communication Networks 8(9):1636–1647

    Article  Google Scholar 

  13. Li B, Wang M, Huang J et al (2014) A new cost function for spatial image steganography. In: Proceedings of International Conference on Image Processing (ICIP), IEEE, pp 4206–4210

  14. Li C, Zhang Z, Wang Y et al (2015) Dither modulation of significant amplitude difference for wavelet based robust watermarking. Neurocomputing 166(C):404–415

    Article  Google Scholar 

  15. Maity SP, Maity S, Sil J et al (2013) Collusion Resilient Spread Spectrum Watermarking in M-band Wavelets Using GA-fuzzy Hybridization. J Syst Softw 86 (1):47–59

    Article  Google Scholar 

  16. Miyazaki A, Okamoto A (2002) Analysis of watermarking systems in the frequency domain and its application to design of robust watermarking systems. IEICE Trans Fundam Electron Commun Comput Sci 85(1):117–124

    Google Scholar 

  17. Pevný T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215–224

    Article  Google Scholar 

  18. Pevný T, Fridrich J (2008) Multiclass detector of current steganographic methods for JPEG format. IEEE Trans Inf Forensics Secur 3(4):635–650

    Article  Google Scholar 

  19. Pevný T, Filler T, Bas P (2010) Using High-dimensional Image Models to Perform Highly Undetectable Steganography. In: Proceedings of the 12th ACM International Workshop on Information Hiding, pp 161–177

  20. Sedighi V, Cogranne R, Fridrich J (2016) Content-Adaptive Steganography by minimizing statistical detectability. IEEE Trans Inf Forensics Secur 11(2):221–234

    Article  Google Scholar 

  21. Shen C, Zhang H, Feng D et al (2007) Survey of information security. Science in China Series F: Information Sciences 50(3):273–298

    Article  MATH  Google Scholar 

  22. Tsai JS, Huang WB, Kuo YH (2011) On the selection of optimal feature region set for robust digital image watermarking. IEEE Trans Image Process 20(3):735–743

    Article  MathSciNet  MATH  Google Scholar 

  23. Tsai J, Huang W, Kuo Y et al (2012) Joint Robustness and Security Enhancement for Feature-based Image Watermarking Using Invariant Feature Regions. Signal Process. 92(6):1431–1445

    Article  Google Scholar 

  24. Wang X, Niu P, Yang H et al (2014) A new robust color image watermarking using local quaternion exponent moments. Inf Sci 277:731–754

    Article  Google Scholar 

  25. Xiao J, Wang Y (2009) Adaptive dither modulation image watermarking algorithm. J Electron Inf Technol 31(3):552–555

    MathSciNet  Google Scholar 

  26. Zhang Y, Luo X, Yang C et al (2015) A JPEG-compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients. In: Proceedings of the IEEE 10th International Conference on Availability, Reliability and Security (ARES), pp 461–466

  27. Zhang Y, Luo X, Yang C et al (2016) Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection. Multimedia Tools and Applications, 1–20

  28. Zhang Y, Luo X, Yang C et al (2016) A framework of adaptive steganography resisting JPEG compression and detection. Security and Communication Networks 9 (15):2957–2971

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Nature Science Foundation of China (Grant No. U1636219, 61379151, 61401512, and 61572052), the Excellent Youth Foundation of Henan Province of China (No. 144100510001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangyang Luo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Y., Zhu, X., Qin, C. et al. Dither modulation based adaptive steganography resisting jpeg compression and statistic detection. Multimed Tools Appl 77, 17913–17935 (2018). https://doi.org/10.1007/s11042-017-4506-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4506-3

Keywords

Navigation