A High Capacity Steganographic Method Based on Quantization Table Modification and F5 Algorithm

被引:10
作者
Jiang, Cuiling [1 ]
Pang, Yilin [1 ]
Xiong, Shun [2 ]
机构
[1] E China Univ Sci & Technol, Sch Informat Sci & Engn, Shanghai 200237, Peoples R China
[2] PLA Informat Engn Univ, Zhengzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Steganography; Capacity; Quantization table modification; Embedding efficiency; Structural similarity (SSIM); JPEG; STEGANALYSIS; IMAGES;
D O I
10.1007/s00034-013-9703-3
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a steganographic method based on quantization table modification and the F5 algorithm. This method has a larger embedded secret message capacity and improves the embedding strategy to avoid "shrinkage" due to the use of the F5 algorithm. The experimental results show that, in comparison with the F5 algorithm and other methods, the proposed method has a higher steganographic capacity and an improved embedding efficiency. In terms of the structural similarity as well as PSNR for assessing image quality, the stego-image has better image quality and the proposed method has better anti-attack capability.
引用
收藏
页码:1611 / 1626
页数:16
相关论文
共 23 条
[1]   High capacity steganographic method based upon JPEG [J].
Almohammad, Adel ;
Hierons, Robert M. ;
Ghinea, Gheorghita .
ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, :544-+
[2]   JPEG steganography: a performance evaluation of quantization tables [J].
Almohammad, Adel ;
Ghinea, Gheorghita ;
Hierons, Robert M. .
2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, :471-478
[3]  
[Anonymous], 2001, PROC INFORM HIDING
[4]   A steganographic method based upon JPEG and quantization table modification [J].
Chang, CC ;
Chen, TS ;
Chung, LZ .
INFORMATION SCIENCES, 2002, 141 (1-2) :123-138
[5]   Improving the Modified Matrix Encoding on Steganography Method (Steganographic Methods considering The Quantization Effect on Coefficient Modification.) [J].
Choi, YongSoo ;
Kim, HyoungJoong .
FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, :205-208
[6]  
Fridrich J, 2004, LECT NOTES COMPUT SC, V3200, P67
[7]  
Fridrich J, 2003, LECT NOTES COMPUT SC, V2578, P310
[8]   Quantitative steganalysis of digital images: estimating the secret message length [J].
Fridrich, J ;
Goljan, M ;
Hogea, D ;
Soukal, D .
MULTIMEDIA SYSTEMS, 2003, 9 (03) :288-302
[9]   Secret Communication Using JPEG Double Compression [J].
Guo, Jing-Ming ;
Le, Thanh-Nam .
IEEE SIGNAL PROCESSING LETTERS, 2010, 17 (10) :879-882
[10]   Embedding image watermarks in DC components [J].
Huang, JW ;
Shi, YQ ;
Shi, Y .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2000, 10 (06) :974-979