A New and Robust Steganography Method for Data Hiding in JPEG Images
Subject Areas : electrical and computer engineering
1 -
Keywords: steganographydata hidingJPEGF5POVoutguesscompatibility,
Abstract :
Data hiding is one of the effective solutions for the exchange of confidential messages in un-secure communication channels such as Internet. In this paper, we propose a new and effective steganography method for robust hiding of information in images with JPEG format. The data is hidden in DCT coefficients of JPEG conversion of a bitmap image using a low quantization rate (for instance, 75% quantization rate) and then convert back to bitmap format. The new bitmap image is converted to JPEG format again, but with a higher quantization rate (90%, for instance). This resulted JPEG image, which carries the hidden data, is robust against the known attacks such as compatibility, F5, outguess and POV attacks. The experimental results show that although the available data capacity using the proposed algorithm is reduced and limited compare to the other similar methods, but it has a more effective robustness under the these attacks.
[1] R. C. Gonzalez and R. E. Woods, Digital Image Processing, Addison Publishing Co., 1993.
[2] P. Wayner, Disaapearing Cryptography, 2nd Ed., Elsevier Science: US, 2002.
[3] R. J. Anderson and F. A. P. Petitcolas, "On the limits of steganography," IEEE J. of Selected Areas in Communication, vol. 16, no. 4, pp. 474-481, May 1998.
[4] P. A. Laplante and A. D. Stoyenko, Real Time Imaging, IEEE Press, 1996.
[5] Network Working Group, RFC 2435- Payload Format for JPEG Compressed Video, 1998.
[6] F. A. P. Petitcolas, P. J. Anderson, and M. G. Kuhn, "Information hiding: a survey," in Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, 1999.
[7] J. Fridrich and M. Goljan, Practical Steganoganalysis of Digital Image_ State of the Art, SUNY Binghamton, Department of Electrical Engineerring, 2002.
[8] N. Provos and P. Honeyman, Hide and Seek: An Introduction to Steganography, University of Michigan, IEEE Conmputer Society, 2003.
[9] N. Provos, Defending Against Statistical Steganalysis, Center of Information Technology Integration, University of Michigan, 2000.
[10] J. Fridrich, M. Goljan, and D. Hogea, Attacking the Outguess, Binghamton University Press, 2000.
[11] J. Fridrich, M. Goljan, and D. Hogea, Steganalsis of JPEG Images: Braaking the F5 Algorithm, Binghamton University Press, 2003.
[12] اعظم نادعليان، بررسي امنيت شيوههاي پنهاننگاري اطلاعات در تصوير و ارائه يك شيوه مناسب، پايان نامه كارشناسي ارشد، گروه مهندسي كامپيوتر دانشگاه اصفهان، 1383.
[13] نسرين رسولي، پنهانسازي تصوير ديجيتالي در تصاوير با فرمت JPEG، پايان نامه كارشناسي ارشد، دانشكده تحصيلات تكميلي دانشگاه آزاد نجف آباد، 1384.