Professional Documents
Culture Documents
RESEARCH ARTICLE
OPEN ACCESS
Abstract:
Secure steganographic algorithms hide confidential messages within other, more extensive data
(carrier media). An attacker should not be able to find out, that something is embedded in the
steganogram (i. e., a steganographically modified carrier medium). The existing distortion functions are
minimal distortion function is used for both side-informed and non-side-informed secure JPEG
steganography. UED tries to spread the embedding modification uniformly to quantized discrete cosine
transform (DCT) coefficients of all possible magnitudes and achieves statistical detectability. The
inappropriate use of DC and zero AC coefficients in JPEG steganography may lead to additional block
artifacts in stego image and decrease in the efficiency of JPEG compression. That is why the most
existing JPEG steganography schemes use only non-zero AC coefficients as possible cover elements to
make the embedding naturally content-adaptive. In our proposed system, certain DC and zero AC
coefficients in the texture regions could indeed be incorporated to further data embedding without
decreasing, even increasing the security performance. It is proposed to embed the payload while
minimizing a suitably defined distortion function. The embedding distortion is computed as a sum of
relative changes of coefficients in a cover image.
Keywords: Uniform Embedding Distortion (UED), JPEG Steganography
-------------------------------------------------------*****************************---------------------------------------------------
I. INTRODUCTION
Since the rise of the Internet one of the most
important factors of information technology and
communication has been security of message
transmission. Steganography is the art and science of
Invisible communication. Steganography means is
not alter the structure of the secret message, but
hides it inside a cover object (original image). After
hiding process, cover object and stego object
(carrying hidden information object) are same.
Steganography differs from cryptography in the
sense that where cryptography focuses on keeping
the contents of a message secret, steganography
focuses on keeping the existence of a message
secret.
Steganography mainly focus on two
conflicting objectives, i.e., Undetectability and
embedding payload should be carefully considered
when devising a steganographic scheme.
ISSN: 2394-2231
http://www.ijctjournal.org
Page 120
http://www.ijctjournal.org
Page 121
http://www.ijctjournal.org
Page 122
Image
Distortion
calculation
Hamming codeEncoding
Post preprocessing
Stego
image
Message Length
Stego image
Preprocessing
Hamming codeDecoding
cos
2 +1
16
cos
2 +1
16
Distortion Calculation:
ISSN: 2394-2231
http://www.ijctjournal.org
Page 123
International Journal
ournal of Computer Techniques - Volume 2 Issue 1, 2015
Compute the embedding distortion for each non zero
coefficient.
ij =diaNia(|Cij|+|dia|+ia)-1
+dirNir (|Cij|+|dir|+ir)-1
Data Extraction:
Preprocessing:
The quantized DCT coefficients are
reproduced from the stego image by eentropy
decoding with the shared key.
Hamming code:
Finally apply the hammingg code to decode the secret
message from the stego image.
http://www.ijctjournal.org
Page 124
CONCLUSION
Many steganographic algorithms offer a high
capacity for hidden messages, but they are weak
against visual and statistical attacks. Uniformdistortion embedding framework is a practical
approach to implement steganography with high
embedding efficiency by uniformly spreading the
embedding modifications to quantized DCT
coefficients of all possible magnitudes. The average
changes of the coefficient are possibly minimized,
especially in the small coefficient, which leads to
less statistical detectability, and hence, more secure
steganography.
REFERENCES:
[1] T. Filler, J. Judas, and J.Fridrich, Minimizing
additive distortion in steganography using
syndrome-trellis codes IEEE Trans. Inf.
Forensics Security, vol. 6, no. 3, sep. 2011.
[2] A.
Westfeld,
F5A
steganographic
th
Algorithm in Proc 4 inf. Hiding conf. vol.
2137. 2001.
[3] J. Fridrich, T. pevny and J. Kodoyshy,
Statistically undetectable JPEG steganography:
Dead ends challenges, and opportunities in
Proc. 9th ACM Workshop Multimedia Security,
Dallas, TX, USA, Sep. 2007.
[4] Y. Kim, Z. Duric, and D. Richards, Modified
matrix encoding technique for minimal
distortion steganography in Proc.8th Inf. Hiding
Conf, vol. 4437, 2006.
[5] V. Sachney, H. J. Kim, and R. Zhang Less
detectable JPEG steganography method based
on heuristic optimization and BCH syndrome
coding in Proc. 11th ACM Workshop
Multimedia Security SEP.2009.
[6] T. Filler and J. Fridrich, Design of adaptive
steganographic schemes for digital images
Proc. SPIE, vol. 7880, p.78800F, Jan. 2011.
[7] C. Wang and J. Ni, An efficient JPEG
steganographic scheme based on the block
ISSN: 2394-2231
http://www.ijctjournal.org
Page 125