Abstract
Robust JPEG steganographic algorithms are proposed to protect the embedded message when the covert JPEG image is JPEG-compressed in some lossy channel. They usually perform much better on anti-compression ability than the traditional adaptive JPEG steganographic algorithms. However, massive recent experimental results reveal that the message extraction accuracy of the present robust JPEG steganographic methods are not high enough in some JPEG compressing channels. Thus, this paper proposes a new robust JPEG steganographic algorithm with high message extraction accuracy with equivalent detection resistance. First, the robust channel for the JPEG compression and steganographic embedding are analyzed. Second, a new error correction encoder that can protect the message in lossy channel is proposed. The structure and inside codes of the proposed encoder are different to the traditional codes used in adaptive steganography. Last, the proposed code, the relationship between coefficients and the minimal distortion model are combined to build new steganography. 10,000 images in the popular BOSSbase 1.01 image library are selected for magnanimous experiments. Compared with the adaptive JPEG steganographic algorithm and some current robust JPEG steganographic algorithms, the experimental results show that proposed method can not only resist detection efficiently, but also obtain higher extracting accuracy on resisting JPEG compression.
Similar content being viewed by others
Change history
27 June 2019
The article “A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients” written by Zhenkun Bao et al. was originally published electronically on the publisher’s internet portal (currently SpringerLink) on 11 June 2019 with open access.
Notes
Proposed by Patrick Bas, Tomas Filler, Tomas Pevny at ICASSP 2013, containing 10, 000 images of size \(512 \times 512\), download: http://agents.fel.cvut.cz/stegodata/.
References
Agarwal N, Singh AK, Singh PK (2019) Survey of robust and imperceptible watermarking. Multimed Tools Appl 78(7):8603–8633
Berlekamp ER (1968) Algebraic coding theory. McGraw-Hill, New York
Chang CC, Nguyen TS, Lin CC (2015) A reversible compression code hiding using SOC and SMVQ indices. Inf Sci 300:85–99
Chen YY, Hsia CH, Jhong SY et al (2018) Data hiding method for AMBTC compressed images. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-1048-0
Chen DY, Ouhyoung M, Wu JL (2000) A shift-resisting public watermark system for protecting image processing software. IEEE Trans Consum Electron 46(3):404–414
Fan L, Sun W, Feng G (2018) Image steganalysis via random subspace fisher linear discriminant vector functional link network and feature mapping. Mob Netw Appl. https://doi.org/10.1007/s11036-018-1167-z
Feng G, Zhang X, Ren Y, Qian Z, Li S (2019) Diversity-based cascade filters for JPEG steganalysis. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2019.2891778
Filler T, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. In: Proceedings of the ISandT/SPIE electronic imaging, media forensics and security XIII, San Jose, CA, USA
Filler T, Judas J, Fridrich J (2010) Minimizing embedding impact in steganography using trellis-coded quantization. In: Proceedings of the ISandT/SPIE electronic imaging, media forensics and security XII, San Jose, CA, USA
Fridrich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, Cambridge
Fridrich J, Kodovský J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868–882
Fridrich J, Filler T (2007) Practical methods for minimizing embedding impact in steganography. In: Proceedings of IS&T/SPIE electronic imaging, Bellingham, WA, USA
Guo L, Ni J, Shi Y (2013) An efficient JPEG steganographic scheme using uniform embedding. In: Proceedings of the IEEE international workshop on information forensics and security, Guangzhou, China, pp 169-174
Holub V, Fridrich J (2015) Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forensics Secur 10(2):219–228
Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inf Secur 1(1):1–13
Holub V, Fridrich J (2013) Designing steganographic distortion using directional filters. In Proceedings of the first ACM workshop on information hiding and multimedia security, Montpellier, France, pp 234–239
Huang F, Huang J, Shi Y (2012) New channel selection rule for JPEG steganography. IEEE Trans Inf Forensics Secur 7(4):1181–1191
Huang F, Luo W, Huang J et al (2013) Distortion function designing for JPEG steganography with uncompressed side-image. In: Proceedings of the first ACM workshop on information hiding and multimedia security, Montpellier, France, pp 69–76
Ker AD, Bas P, Böhme R et al (2013) Moving steganography and steganalysis from the laboratory into the real world. In: Proceedings of the first ACM workshop on information hiding and multimedia security, pp 45–58
Kodovský J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432–444
Kodovský J, Fridrich J (2009) Calibration revisited. In: Proceedings of ACM workshop on multimedia and security, Princeton, NJ, USA, pp 63–74
Li B, Tan S, Wang J et al (2014) Investigation on cost assignment in spatial image steganography. IEEE Trans Inf Forensics Secur 9(8):1264–1277
Luo X, Song X, Li X, Zhang W, Jicang L, Yang C, Liu F (2016) Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75(21):13557–13583
Ma Y, Luo X, Li X et al (2018) Selection of rich model steganalysis features based on decision rough set-positive region reduction. IEEE Trans Circuits Syst Video Technol 29(2):336–350
Massey J (1969) Shift-register synthesis and BCH decoding. IEEE Press, Piscataway
Pevný T, Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE-the international society for optical engineering, Bellingham, WA, USA, pp 650503-1-650503-13
Proakis JG, Salehi M (2008) Digital communications, 5th edn. McGraw-Hill, New York
Qiao T, Shi R, Luo X, Xu M, Zheng N, Wu Y (2018) Statistical model-based detector via texture weight map: application in re-sampling authentication. IEEE Trans Multimed. https://doi.org/10.1109/TMM.2018.2872863
Reed IS, Solomon G (1960) Polynomial codes over certain finite fields. J Soc Ind Appl Math 8(2):300–304
Shaheen AM, Sheltami TR, Al-Kharoubi TM et al (2018) Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0850-z
Singh AK, Kumar B, Singh SK et al (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Gener Comput Syst 86:926–939
Sriti T, Kumar SA, Prakash GS et al (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6263-3
Srivastava R, Kumar B, Singh AK et al (2018) Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach. Multimed Tools Appl 77(13):16447–16459
Tiwari G (2015) A review on robust watermarking with its applications and comparative analysis. Int J Signal Process Image Process Pattern Recognit 8(6):85–90
Tsai JS, Huang WB, Kuo YH et al (2012) Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions. Signal Process 92(6):1431–1445
Tsougenis ED, Papakostas A, Koulouriotis DE et al (2012) Performance evaluation of moment-based watermarking methods: a review. J Syst Softw 85(8):1864–1884
Wang XY, Liu YN, Xu H et al (2016) Blind optimum detector for robust image watermarking in nonsubsampled shearlet domain. Inf Sci 372:634–654
Wang J, Li T, Luo X, Shi Y-Q, Jha SK (2018) Identifying computer generated images based on quaternion central moments in color quaternion wavelet domain. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2018.2867786
Wang C, Ni J (2012) An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients. In: Proceedings of the IEEE international conference on acoustics, speech and signal processing, Kyoto, Japan, pp 1785–1788
Zhang Y, Luo X, Yang C et al (2013) A framework of adaptive steganography resisting JPEG compression and detection. Secur Commun Netw 9(15):2957–2971
Zhang Y, Qin C, Zhang W et al (2018) On the fault-tolerant performance for a class of robust image steganograph. Signal Process 146:99–111
Zhong K, Feng G, Shen L et al (2018) Deep learning for steganalysis based on filter diversity selection. Sci Chin Inf Sci 61(12):196–198
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China (Grant nos. U1636219, U1736119, 61572052, 61772549, U1804263, and U1736214), the National Key R&D Program of China (Grant nos. 2016YFB0801303 and 2016QY 01W0105), Plan for Scientific Innovation Talent of Henan Province (Grant no. 2018JR0018) and the Key Technologies R&D Program of Henan Province (Grant no. 162102210032).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The original version of this article was revised due to cancellation of retrospective Open Access order.
Rights and permissions
About this article
Cite this article
Bao, Z., Guo, Y., Li, X. et al. A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients. J Ambient Intell Human Comput 11, 1889–1901 (2020). https://doi.org/10.1007/s12652-019-01345-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-019-01345-8