Modification in spatial, extraction from transform: Keyless side-information steganography for JPEG

被引:0
作者
Hosseini, Morteza Darvish Morshedi [1 ]
Mahdavi, Mojtaba [2 ]
Borujeni, Shahram Etemadi [3 ]
机构
[1] SUNY Binghamton, Dept Elect & Comp Engn, Binghamton, NY 13902 USA
[2] Univ Isfahan, Dept Informat Technol Engn, Esfahan, Iran
[3] Univ Isfahan, Dept Comp Engn, Esfahan, Iran
关键词
JPEG steganography; Keyless; Information hiding; Inter-domain; Side-information; STEGANALYSIS; FRAMEWORK;
D O I
10.1016/j.jvcir.2024.104249
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The state of the art steganography approaches strictly assume that the receiver has access to a steganographic key. This limitation was mitigated for images in spacial domain, but the approach does not apply to JPEG images. In this paper, we introduce a keyless steganography scheme for JPEG images. Despite the spatial domain counterpart, our approach for the JPEG domain effectively preserves higher-order statistical models that are used in steganalysis. We show that our approach does not degrade image quality either. The proposed approach is a Side-Information (SI) steganography in the sense that its input is a never-compressed image. Another characteristic of the proposed approach is the separation of the embedding modification and data extraction domains, which can initiate further studies of similar approaches in the future.
引用
收藏
页数:12
相关论文
共 51 条
[1]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[2]   Advanced image steganography based on exploiting modification direction and neutrosophic set [J].
Atta, Randa ;
Ghanbari, Mohammad ;
Elnahry, Ibrahim .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (14) :21751-21769
[3]  
Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
[4]   Optimizing Additive Approximations of Non-Additive Distortion Functions [J].
Bernard, Solene ;
Bas, Patrick ;
Pevny, Tomas ;
Klein, John .
PROCEEDINGS OF THE 2021 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH&MMSEC 2021, 2021, :105-112
[5]   Explicit Optimization of min max Steganographic Game [J].
Bernard, Solene ;
Bas, Patrick ;
Klein, John ;
Pevny, Tomas .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :812-823
[6]  
Boroumand M., 2020, J ELECTRON IMAGING, V2020, P290
[7]   Deep Residual Network for Steganalysis of Digital Images [J].
Boroumand, Mehdi ;
Chen, Mo ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1181-1193
[8]   JPEG image steganalysis utilizing both intrablock and interblock correlations [J].
Chen, Chunhua ;
Shi, Yun Q. .
PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, :3029-3032
[9]  
Chen WH, 2018, ASIAPAC SIGN INFO PR, P1564, DOI 10.23919/APSIPA.2018.8659525
[10]   Task-Aware Quantization Network for JPEG Image Compression [J].
Choi, Jinyoung ;
Han, Bohyung .
COMPUTER VISION - ECCV 2020, PT XX, 2020, 12365 :309-324