WEN Juan, ZHANG Jie, ZHOU Jie, et al., “An Adaptive JPEG Steganographic Scheme Based on Run-Length Statistical Complexity,” Chinese Journal of Electronics, vol. 27, no. 1, pp. 52-59, 2018, doi: 10.1049/cje.2017.11.012
Citation: WEN Juan, ZHANG Jie, ZHOU Jie, et al., “An Adaptive JPEG Steganographic Scheme Based on Run-Length Statistical Complexity,” Chinese Journal of Electronics, vol. 27, no. 1, pp. 52-59, 2018, doi: 10.1049/cje.2017.11.012

An Adaptive JPEG Steganographic Scheme Based on Run-Length Statistical Complexity

doi: 10.1049/cje.2017.11.012
Funds:  This work is supported by the National Natural Science Foundation of China (No.U1536121).
More Information
  • Corresponding author: XUE Yiming (corresponding author) was born in 1968. He is now a associate professor and Masters supervisor in College of Information and Electrical Engineering, China Agricultural University. His research interests include multimedia processing and multimedia security, VLSI design. (Email:xueym@cau.edu.cn)
  • Received Date: 2017-01-04
  • Rev Recd Date: 2017-01-04
  • Publish Date: 2018-01-10
  • This paper presents a novel adaptive JPEG steganographic scheme in Discrete cosine transform (DCT) domain using Run-length statistical complexity(RSC). Unlike the traditional complexity measurements, RSC considers the change randomness of DCT coefficients in image blocks. The distortion functions in both side-informed and non-side-informed schemes are derived by RSC and minimized by Syndrome trellis coding (STC). Experimental results show superior performance of our scheme over a wide range of embedding rates at different image quality factors compared with previous three common steganographic schemes.
  • loading
  • T. Rabie and I. Kamel, "On the embedding limits of the discrete cosine transform", Multimedia Tools and Applications, Vol.75, No.10, pp.5939-5957, 2016.
    A. Cheddad, J. Condell, K. Curran, et al., "Digital image steganography:Survey and analysis of current methods", Signal Process, Vol.90, No.3, pp.727-752, 2010.
    A. Yasin, N. Shehab, M. Sabha, et al., "An enhanced steganographic model based on DWT combined with encryption and error correction techniques", International Journal of Advanced Computer Science and Applications, Vol.6, No.12, pp.49-55, 2015.
    J. Fridrich, M. Goljan and D. Hogea, "Steganalysis of JPEG images:Breaking the F5 algorithm", Proc. of Information Hiding:5th International Workshop, The Netherlands, LNCS, Springer, pp.310-323, 2002.
    J. Fridrich, T. Pevny and J. Kodovsky, "Statistically undetectable JPEG steganography:Dead ends, challenges, and opportunities", Proc. of the 9th ACM Multimedia and Security Workshop, Dallas, TX, USA, pp.3-14, 2007.
    X.Y. Shi, S.L. Ma, Y.J. Hu, et al., "A pixel block-based adaptive steganographic algorithm with embedding priority given to image textures", Acta Electronica Sinica, Vol.43, No.6, pp.1094-1100, 2015. (in Chinese)
    T. Filler, J. Judas and J. Fridrich, " Minimizing embedding impact in steganography using trellis-codedquantization", Proc. of SPIE, Media Forensics and Security Ⅱ, San Francisco, USA, pp.175-178, 2010.
    T. Filler and J. Fridrich, "Design of adaptive steganographic schemes for digital images", Proc. of SPIE, Electronic Imaging, Media Watermarking, Security and Forensics Ⅲ, San Francisco, USA, pp.1-14, 2011.
    T. Pevny, T. Filler and J. Fridrich, "Using high-dimensional image models to perform highly undetectable steganography", Proc. of Information Hiding 12th International Workshop, Heidelberg, Germany, pp.161-177, 2010.
    G. Liu, W. Liu, Y. Dai, et al., "Adaptive steganography based on syndrome-trellis codes and local complexity", Proc. of IEEE International Conference on Multimedia Information Networkingand Security,Beijing, China, pp.323-327, 2013.
    F. Li, X. Zhang, J. Yu, et al., "Adaptive jpeg steganography with new distortion function", Annals of Telecommunications, Vol.69, No.7, pp.431-440, 2014.
    C. Wang and J. Ni, "An adaptive JPEG steganographic scheme based on the block entropy of DCT coefficients", International Journal of Digital Crime and Forensics, Vol.4, No.2, pp.13-27, 2012.
    E. Kawaguchi, R.O. Eason, "Principle and applications of BPCS steganographys", Proc. of SPIE:Multimedia Systems and Applicationsy, Bostor, USA, pp.464-473, 1999.
    Y.B. Guo,X.G. You, C.T. Zhang, et al., "Study of image bit-plane complexity in information hiding", Acta Electronica Sinica, Vol.34, No.6, pp.1048-1052, 2006. (in Chinese)
    T. Filler, T. Pevny and P.Bas, "BOSS (Break Our Steganography System)", http://www.agents.cz/boss, 2010-9-9.
    J. Kodovsky and J. Fridrich, "Calibration revisited", Proc. of the 11th ACM Multimedia and Security Workshop, Princeton, USA, pp.63-74, 2009.
    V. Holub and J. Fridrich, "Low-complexity features for JPEG steganalysis using undecimated DCT", IEEE Transactions on Information Forensics and Security, Vol.10, No.2, pp.219-228, 2015.
    J. Kodovsky, J. Fridrich and V. Holub, "Ensemble classifiers for steganalysis of digital media", IEEE Transactions on Information Forensics and Security, Vol.7, No.2, pp.432-444, 2012.
  • 加载中


    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (456) PDF downloads(228) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint