3,749
Views
11
CrossRef citations to date
0
Altmetric
Articles

A Robust Image Steganography on Resisting JPEG Compression with No Side Information

, ORCID Icon, , &

References

  • A. D. Ker, P. Bas, R. Bohme, R. Cogranne, S. Craver, T. Filler, J. Fridrich, and T. Pevny, “Moving steganography and steganalysis from the laboratory into the real world,” in Proceedings of ACM Workshop on Information Hiding and Multimedia Security, Montpellier, 2013, pp. 45–58.
  • J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge: Cambridge University Press, 2009.
  • C. Qin, C. C. Chang, Y. H. Huang, and L. T. Liao, “An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism,” IEEE Trans. Circuits Syst. Video Technol., Vol. 23, no. 7, pp. 1109–18, 2013. doi: 10.1109/TCSVT.2012.2224052
  • C. Qin, C. C. Chang, and Y. P. Chiu, “A novel joint data-hiding and compression scheme based on SMVQ and image inpainting,” IEEE Trans. Image Process., Vol. 23, no. 3, pp. 969–78, 2014. doi: 10.1109/TIP.2013.2260760
  • C. Qin, C. C. Chang, and T. J. Hsu, “Reversible data hiding scheme based on exploiting modification direction with two steganographic images,” Multimedia Tools Appl., Vol. 74, no. 15, pp. 5861–72, 2015. doi: 10.1007/s11042-014-1894-5
  • Y. Zhang, C. Qin, W. Zhang, F. Liu, and X. Luo, “On the fault-tolerant performance for a class of robust image steganography”, Signal Process., Vol. 146, pp. 99–111, Feb. 2018. doi: 10.1016/j.sigpro.2018.01.011
  • Y. Zhang, X. Luo, C. Yang, D. Ye, and F. Liu, “A framework of adaptive steganography resisting JPEG compression and detection,” Secur. Commun. Netw., Vol. 9, no. 15, pp. 2957–71, Apr. 2016. doi: 10.1002/sec.1502
  • G. Tiwari, “A review on robust watermarking with its applications and comparative analysis,” Int. J. Signal Process. Image Process. Pattern Recognit., Vol. 8, no. 6, pp. 85–90, Jun. 2015.
  • J. S. Tsai, W. B. Huang, Y. H. Kuo, and M. F. Horng, “Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions,” Signal Process., Vol. 92, no. 6, pp. 1431–45, Jun. 2012. doi: 10.1016/j.sigpro.2011.11.033
  • E. D. Tsougenis, G. A. Papakostas, D. E. Koulouriotis, and V. D. Tourassis, “Performance evaluation of moment-based watermarking methods: A review,” J. Syst Softw., Vol. 85, no. 8, pp. 1864–84, Sep. 2012. doi: 10.1016/j.jss.2012.02.045
  • X. Y. Wang, Y. N. Liu, H. Xu, A. L. Wang, and H. Y. Yang, “Blind optimum detector for robust image watermarking in nonsubsampled shearlet domain,” Inf. Sci., Vol. 372, pp. 634–54, Apr. 2016. doi: 10.1016/j.ins.2016.08.076
  • C. C. Chang, T. S. Nguyen, and C. C. Lin, “A reversible compression code hiding using soc and smvq indices,” Inf. Sci., Vol. 300, pp. 85–99, Jul. 2015. doi: 10.1016/j.ins.2014.12.028
  • T. Filler, and J. Fridrich, “Design of adaptive steganographic schemes for digital images,” in Proc. IS&T/SPIE Electronic Imaging, Media Watermarking, Security, and Forensics XIII, Vol. 7880, pp. 0F–1–0F–14, Mar. 2011.
  • T. Filler, J. Judas, and J. Fridrich, “Minimizing embedding impact in steganography using trellis-coded quantization,” in Proc. IS&T/SPIE Electronic Imaging, Media Forensics and Security XII, Vol. 7541, pp. 05–1–05–14, Mar. 2010.
  • B. Li, S. Tan, M. Wang, and J. Huang, “Investigation on cost assignment in spatial image steganography,” IEEE Trans. Inf. Forensics Sec., Vol. 9, no. 8, 1264–77, Sep. 2014. doi: 10.1109/TIFS.2014.2326954
  • V. Holub and J. Fridrich, “Designing steganographic distortion using directional filters,” in Proceedings of IEEE International Workshop on Information Forensics & Security, Guangzhou, 2013, pp. 234–9.
  • F. Huang, J. Huang, and Y. Shi, “New channel selection rule for JPEG steganography,” IEEE Trans. Inf. Forensics Sec., Vol. 7, no. 4, pp. 1181–91, Apr. 2012. doi: 10.1109/TIFS.2012.2198213
  • L. Guo, J. Ni, and Y. Shi, “An efficient JPEG steganographic scheme using uniform embedding,” in Proceedings of the IEEE International Workshop on Information Forensics and Security, Costa Adeje, Tenerife, 2012, pp. 169–74.
  • C. Wang and J. Ni, “An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, Kyoto, 2012, pp. 1785–8.
  • V. Holub, J. Fridrich, and T. Denemark, “Universal distortion function for steganography in an arbitrary domain,” EURASIP J. Inf. Sec., Vol. 2014, no. 1, 1–13, Jan. 2014. doi: 10.1186/1687-417X-2014-1
  • J. Kodovsky, and J. Fridrich, “Calibration revisited,” in Proceedings of the 11th ACM Workshop on Multimedia and Security, Princeton, NJ, 2009, pp. 63–74.
  • J. Fridrich, and J. Kodovsky, “Rich models for steganalysis of digital images,” IEEE Trans. Inf. Forensics Sec., Vol. 7, no. 3, 868–82, Mar. 2012. doi: 10.1109/TIFS.2012.2190402
  • V. Holub, and J. Fridrich, “Low-complexity features for JPEG steganalysis using undecimated DCT,” IEEE Trans. Inf. Forensics Sec., Vol. 10, no. 2, pp. 219–28, Feb. 2015. doi: 10.1109/TIFS.2014.2364918
  • Y. Ma, X. Luo, X. Li, Z. Bao, and Y. Zhang, “Selection of rich model steganalysis features based on decision rough set-positive region reduction,” IEEE Trans. Circuits Syst. Video Technol., published online, Jun. 2018. doi:10.1109/TCSVT.2018.2799243.
  • Y. Zhang, X. Luo, C. Yang, and F. Liu, “Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection,” Multimedia Tools Appl., Vol. 76, no. 3, pp. 1–20, Mar. 2017.
  • J. Fridrich and T. Filler, “Practical methods for minimizing embedding impact in steganography,” in Proc. IS&T/SPIE Electronic Imaging, Photonics West, Vol. 6505, pp. 02–01–02–15, 2007.
  • I. S. Reed, and G. Solomon, “Polynomial codes over certain finite fields,” J. Soc. Ind. Appl. Math., Vol. 8, no. 2, pp. 300–4, Feb. 1960. doi: 10.1137/0108018
  • T. Pevny and J. Fridrich, “Merging Markov and DCT features for multi-class JPEG steganalysis,” in Proceedings of SPIE – The International Society for Optical Engineering, Vol. 6505, pp. 650503–650503–13, 2007.
  • D. Y. Chen, M. Ouhyoung, and J. L. Wu, “A shift-resisting public watermark system for protecting image processing software,” IEEE Trans. Consum. Electron., Vol. 46, no. 3, 404–14, Mar. 2000. doi: 10.1109/30.883385
  • J. Kodovsky, J. Fridrich, and V. Holub, “Ensemble classifiers for steganalysis of digital media,” IEEE Trans. Inf. Forensics Sec., Vol. 7, no. 2, pp. 432–44, Feb. 2012. doi: 10.1109/TIFS.2011.2175919