283Accesses
2Citations
Abstract
Steganography is an important branch of information hiding, which is an effective way to solve the problem of communication security. Steganography can hide specific secret information in some kind of public information, such as images, documents, audio and video, without any suspicion. Joint Photographic Experts Group (JPEG) compressed image is the most widely used image format on the Internet. Recently, a series of JPEG image steganographic algorithms have been proposed. However, the existing JPEG steganography usually designs the cost function based on the statistical distribution in the DCT domain. In this paper, with the help of a “Microscope”, which can enhance the JPEG images in the spatial domain and highlight the texture regions, we design the steganographic cost function based on the statistical distribution of JPEG images in spatial domain and work out a JPEG image steganography with high security performance. Experimental results demonstrate that the proposed designing strategy is a practical approach to against several existing state-of-the-art steganalytic tools.
This is a preview of subscription content,log in via an institution to check access.
Access this article
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Price includes VAT (Japan)
Instant access to the full article PDF.



Similar content being viewed by others
References
Bas P, Pevný T (2011) Break our steganographic system: The ins and outs of organizing boss, Information Hiding, Springer, pp. 59–70
Chen K, Zhang W, Zhou H, Yu N, Feng G (2016) Defining cost functions for adaptive steganography at the microscale. In: Proc. IEEE Workshop Inf. Forensics Secur., pp. 1–6
Crandall R (1998) Some notes on steganography. Steganography Mailing List [Online]. Available:http://os.inf.tu-dresden.de/westfeld/crandall.pdf, 1998
Filler T, Judas J, Fridrich J (2010) Minimizing additive distortion in steganography using Syndrome-Trellis Codes. IEEE Transactions on Information Forensics and Security 6(3):920–935
Fridrich J, Goljan M, Soukal D (2004) Perturbed quantization steganography with wet paper codes. Proc. the ACM Workshop on Multimedia and Security, Magdeburg, pp 4–15
Fridrich J, Goljan M, Soukal D (2006) Wet paper codes with improved embedding efficiency. IEEE Trans Information Forensics and Security 1(1):102–110
Fridrich J, Pevný T, Kodovský J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. Proc. the ACM Workshop on Multimedia and Security, Dallas, pp 3–14
Guo L, Ni J, Shi YQ (2014) Uniform Embedding for Efficient JPEG Steganography. IEEE Trans Information Forensics and Security 9(5):814–825
Guo L, Ni J, Su W, Tang C, Shi YQ (2015) Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited. IEEE Trans Information Forensics and Security 4(3):873–884
Holub V, Fridrich J (2015) Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT[J]. IEEE Transactions on Information Forensics & Security 10(2):219–228
Holub V, Fridrich J, Denemark T (2014) Universal Distortion Function for Steganography in an Arbitrary Domain, EURASIP Journal on Information Security, (Section: SI: Revised Selected Papers of ACM IH and MMS 2013)
Huang F, Huang J, Shi YQ (2012) New channel selection rule for JPEG steganography. IEEE Trans Information Forensics and Security 7(4):1181–1191
Huang F, Luo W, Huang J, Shi YQ (2013) Distortion Function Designing for JPEG Steganography with Uncompressed Side-image. Proc. 1th ACM Information Hiding and Multimedia Security Workshop, Montpellier
Kim Y, Duric Z, Richards D (2007) Modified matrix encoding technique for minimal distortion steganography. In: Proc. Information Hiding, 8th International Workshop, Old Town Alexandria, Virginia, July 10–12, 2006, volume 4437 of Lecture Notes in Computer Science, pp. 314–327
Kodovský J, Fridrich J, Holub V (2012) Ensemble Classifiers for Steganalysis of Digital Media. IEEE Transactions on Information Forensics and Security 7(2):432–444
Sallee P (2005) Model based methods for steganography and steganalysis. Int J Image Graphics 5(1):167–190
Solanki K, Sarkar A, Manjunath BS (2007) YASS: Yet another steganographic scheme that resists blind steganalysis. In: Proc. Information Hiding, 9th International Workshop, Palais du Grand Large, Saint Malo, the corsair town, Brittany, volume 4567 of Lecture Notes in Computer Science, pp. 16–31
Song X, Liu F, Yang C et al (2015) Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters. The, ACM Workshop. ACM, pp. 15–23
Westfeld A (2001) F5—a steganographic algorithm. Information hiding. Springer, Berlin Heidelberg, pp 289–302
Zhang R, Sachnev V, Kim HJ (2009) Fast BCH syndrome coding for steganography. Proc. Information Hiding, 11th International Workshop, Darmstadt, volume 5806 of Lecture Notes in Computer Science, pp. 48–58
Zhang X, Wang S (2006) Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Commun Lett 10(11):781–783
Zhang W, Wang X (2009) Generalization of the ZZW embedding construction for steganography. IEEE Trans Information Forensics and Security 4(3):564–568
Zhang W, Zhang X, Wang S (2010) Near-optimal codes for information embedding in gray-scale signals. IEEE Trans Information Forensics and Security 56(3):1262–1269
Acknowledgments
This work is partially supported by the National Natural Science Foundation of China (61772572), the NSFC-NRF Scientific Cooperation Program (61811540409), the Natural Science Foundation of Guangdong Province of China (2017A030313366), and the Fundamental Research Funds for Central Universities (17lgjc45).
Author information
Authors and Affiliations
School of Electronics and Information Technology, Sun Yat-Sen University, Guangzhou, 510006, China
Ge Liu & Zhonghua Li
School of Data and Computer Science, Sun Yat-Sen University, Guangzhou, 510006, China
Fangjun Huang
State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China
Fangjun Huang
- Ge Liu
You can also search for this author inPubMed Google Scholar
- Fangjun Huang
You can also search for this author inPubMed Google Scholar
- Zhonghua Li
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toFangjun Huang.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Liu, G., Huang, F. & Li, Z. Designing adaptive JPEG steganography based on the statistical properties in spatial domain.Multimed Tools Appl78, 8655–8665 (2019). https://doi.org/10.1007/s11042-018-6747-1
Received:
Revised:
Accepted:
Published:
Issue Date:
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative