J4: JPEG Steganography using Dual Histogram Compensation

نویسندگان

  • Mahendra Kumar
  • Richard E. Newman
چکیده

Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. Many algorithms have been proposed, but so far each has had some weakness that has allowed its effects to be detected, usually through first or second order statistical analysis of the image. In this paper, we propose a new approach to JPEG steganography that provides good stealthiness with global and dual histogram restoration. Our algorithm, named J4, is a new steganographic technique that improves on our previous system, J3. J4 uses dual histogram restoration along with matrix encoding to minimize detection by first as well as second order steganalysis. Existing blind steganalysis tests performed on J4 shows that it has a detection rate of 50-60% at 0.05-0.1 bit per non-zero coefficient (bpnz), as compared to 80-90% for F5, OutGuess, Steghide, MB1 and PQ. Since 50% detection rate is classified as random guess using a SVM classifier, J4 would be an ideal candidate for a steganographic algorithm. keywords: Steganography, J4, Dual-Histogram Compensation, Information Hiding, JPEG Steganography, Steganalysis, Matrix Encoding.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

JPEG Steganography with Dual Histogram Compensation using Theoretical Estimation Techniques

Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. Many algorithms have been proposed, but so far each has had some weakness that has allowed its effects to be detected, usually through first or sec...

متن کامل

Steganography and Steganalysis of JPEG Images

My research motivation came from a project supported by Naval Research Laboratory (NRL) where I was working on an algorithm to provide better stealthiness for hiding data inside JPEG images. As a result, with the guidance of my advisor, Dr. Newman, and Ira S. Moskowitz from Center for High Assurance Computer Systems, NRL, we developed J2 steganography algorithm which was based on hiding data in...

متن کامل

High-performance JPEG steganography using quantization index modulation in DCT domain

This paper presents two JPEG steganographic methods using quantization index modulation (QIM) in the discrete cosine transform (DCT) domain. The two methods approximately preserve the histogram of quantized DCT coefficients, aiming at secure JPEG steganography against histogram-based attacks. In comparison with F5 as a representative JPEG steganography, the proposed methods show high performanc...

متن کامل

Undercover Communication Using Image and Text as Disguise and Countermeasures

A brief survey of some representative techniques of steganography and steganalysis is presented. Various methods developed in the authors’ laboratory are introduced, including symmetric LSB embedding, secure steganography in JPEG, palette, and uncompressed color images, histogram-based analysis and least histogram abnormality steganography, multiple-base notational system based embedding, stego...

متن کامل

A Novel JPEG Steganography Method Based on Modulus Function with Histogram Analysis

In this paper, we present a novel steganographic method for embedding of a secret data in still grayscale JPEG image. In order to provide large capacity of pro– posed method while maintaining good visual quality of stego-image, the embedding process is performed in quan– tized transform coefficients of Discrete Cosine transform (DCT) by modifying coefficients according to modulo function, what ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011