An algorithm for information embedding into compressed digital images based on replacement procedures with use of optimization
O.O. Evsutin, A.A. Shelupanov, R.V. Meshcheryakov, D.O. Bondarenko
Tomsk State University of Control Systems and Radioelectronics, Tomsk, Russia
Full text of article: Russian language.
PDF
Abstract:
In the paper, we consider a particular direction of digital steganography — information embedding into the compressed JPEG images. A scheme of information embedding based on procedures of DCT-coefficients replacement is introduced. Variants of the scheme algorithmic implementation are offered and investigated. A genetic algorithm is used for the improvement of the embedding quality. The main result of the investigation is a steganographic algorithm of information embedding into the compressed JPEG images. This algorithm utilizes an unstable region of embedding at the level of one block of DCT-coefficients. The choice of an optimum region of embedding is performed by the genetic algorithm.
Keywords:
information security, digital steganography, data hiding, digital images, JPEG.
Citation:
Evsutin OO, Shelupanov AA, Meshcheryakov RV, Bondarenko DO. An algorithm for information embedding into compressed digital images based on replacement procedures with use of optimization. Computer Optics 2017; 41(3): 412-421. DOI: 10.18287/2412-6179-2017-41-3-412-421.
References:
- Fridrich J. Steganography in digital media: Principles, algorithms, and applications. Cambridge: Cambridge University Press; 2010. ISBN: 978-0-521-19019-0.
- Fedoseev VA. A unified model for information hiding systems [In Russian]. Computer Optics 2016; 40(1): 87-98. DOI: 10.18287/2412-6179-2016-40-1-87-98.
- Yu L, Zhao Y, Ni R, Zhu Z. PM1 steganography in JPEG images using genetic algorithm. Soft Computing 2009; 13(4): 393-400. DOI: 10.1007/s00500-008-0327-7.
- Evsutin OO, Kokurina AS, Shelupanov AA, Shepelev II. Improved algorithm for data hiding in compressed digital images based on PM1 method [In Russian]. Computer Optics 2015; 39(4): 572-581. DOI: 10.18287/0134-2452-2015-39-4-572-581.
- Li F, Zhang X, Yu J, Shen W. Adaptive JPEG steganography with new distortion function. Annals of Telecommunications 2014; 69(7): 431-440. DOI: 10.1007/s12243-013-0415-2.
- Nikolaidis A. Low overhead reversible data hiding for color JPEG images. Multimedia Tools and Applications 2016; 75(4): 1869-1881. DOI: 10.1007/s11042-014-2377-4.
- Noda H, Niimi M, Kawaguchi E. High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognition Letters 2006; 27(5): 455-461. DOI: 10.1016/j.patrec.2005.09.008.
- Chen B, Wornell GW. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 2001; 47(4): 1423-1443. DOI: 10.1109/18.923725.
- Glumov NI, Mitekin VS. A new semi-fragile watermarking algorithm for image authentication and information hiding [In Russian]. Computer Optics 2011; 35(2): 262-267.
- Wang K, Lu ZM, Hu YJ. A high capacity lossless data hiding scheme for JPEG images. The Journal of Systems and Software 2013; 86(7): 1965-1975. DOI: 10.1016/j.jss.2013.03.083.
- Jiang C, Pang Y, Xiong S. A high capacity steganographic method based on quantization table modification and F5 algorithm. Circuits, Systems, and Signal Processing 2013; 33(5): 1611-1626. DOI: 10.1007/s00034-013-9703-3.
- Westfeld A. F5 – a steganographic algorithm. High capacity despite better steganalysis. Proceedings of the 4th International Workshop on Information Hiding (IH 2001), USA, PA, Pittsburgh. 2001: 289-302.
- Chang C-C, Chen T-S, Chung L-Z. A steganographic method based upon JPEG and quantization table modi?cation. Information Sciences 2002; 141(1-2): 123-138. DOI: 10.1016/S0020-0255(01)00194-3.
- Li X, Wang J. A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Sciences 2007; 177(15): 3099-3109. DOI: 10.1016/j.ins.2007.02.008.
- Jiang C, Pang Y, Guo L, Jing B, Gong X. A high capacity steganographic method based on quantization table modification. Wuhan University Journal of Natural Sciences 2011; 16(3): 223-227. DOI: 10.1007/s11859-011-0740-0.
- The USC-SIPI image database. Source: <http://sipi.usc.edu/database/>.
- Andriotis P, Oikonomou G, Tryfonas T. JPEG steganography detection with Benford’s Law. Digital Investigation 2013: 9(3-4); 246-257. DOI: 10.1016/j.diin.2013.01.005.
© 2009, IPSI RAS
Institution of Russian Academy of Sciences, Image Processing Systems Institute of RAS, Russia, 443001, Samara, Molodogvardeyskaya Street 151; E-mail: journal@computeroptics.ru; Phones: +7 (846) 332-56-22, Fax: +7 (846) 332-56-20