CFP last date
20 December 2024
Reseach Article

A Review on Uniform Embedding For Efficient Jpeg Steganography

by Aasemuddin Quazi, A.k. Gulve
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 114 - Number 12
Year of Publication: 2015
Authors: Aasemuddin Quazi, A.k. Gulve
10.5120/20030-1974

Aasemuddin Quazi, A.k. Gulve . A Review on Uniform Embedding For Efficient Jpeg Steganography. International Journal of Computer Applications. 114, 12 ( March 2015), 19-23. DOI=10.5120/20030-1974

@article{ 10.5120/20030-1974,
author = { Aasemuddin Quazi, A.k. Gulve },
title = { A Review on Uniform Embedding For Efficient Jpeg Steganography },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 114 },
number = { 12 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume114/number12/20030-1974/ },
doi = { 10.5120/20030-1974 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:52:34.769111+05:30
%A Aasemuddin Quazi
%A A.k. Gulve
%T A Review on Uniform Embedding For Efficient Jpeg Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 114
%N 12
%P 19-23
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the art and science of concealed communication with an aim to hide the secret messages in the cover medium. The concept of minimal distortion embedding has been accepted in development of the steganographic system, where a well-designed distortion function plays an important role. Majority of the steganographic methods for real-time digital media embed message communication by minimizing a suitably developed distortion function. This can be achieved by syndrome codes which give near-best rate distortion function. Here the Uniform Embedding Distortion function will be used along with the Syndrome Trellis Coding. Thus, statistical detectability will be reduced thereby improving the security.

References
  1. A. Westfeld, "F5—A steganographic algorithm," in Proc. 4th Inf. Hiding Conf. , vol. 2137. 2001, pp. 289–302.
  2. J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities," in Proc. 9th ACM Workshop Multimedia Security, Dallas, TX, USA, Sep. 2007, pp. 3–14.
  3. Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Proc. 8th Inf. Hiding Conf. , vol. 4437. Jul. 2006, pp. 314–327
  4. V. Sachnev, H. J. Kim, and R. Zhang, "Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding," in Proc. 11th ACM Workshop Multimedia Security, Sep. 2009, pp. 131–140.
  5. T. Filler, J. Judas, and J. Fridrich, "Minimizing additive distortion in steganography using syndrome-trellis codes," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 920–935, Sep. 2011.
  6. R. Crandall, "Some notes on steganography," in Steganography Mailing List [Online]. Available: http://os. inf. tu-dresden. de/ westfeld/ Crandall. pdf 1998.
  7. T. Filler and J. Fridrich, "Design of adaptive steganographic schemes for digital images," Proc. SPIE, vol. 7880, p. 78800F, Jan. 2011.
  8. J. Kodovský, J. Fridrich, and V. Holub, "On dangers of overtraining steganography to incomplete cover model," in Proc. 13th ACM Workshop Multimedia Security, New York, NY, USA, Sep. 2011, pp. 69–76.
  9. V. Holub and J. Fridrich, "Digital image steganography using universal distortion," in Proc. 1st ACM Workshop Inf. Hiding Multimedia Security, 2013, pp. 59–68.
  10. J. Kodovský and J. Fridrich, "Steganalysis of JPEG images using rich models," Proc. SPIE, vol. 8303, p. 83030A, Jan. 2012.
  11. J. Kodovský, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432–444, Apr. 2012.
  12. L. Guo, J. Ni, and Y. Q. Shi, "Uniform Embedding for Efficient JPEG Steganography," IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 814-825, May 2014.
  13. T. Filler, J. Judas, and J. Fridrich, "Minimizing embedding impact in steganography using trellis-coded quantization," in Proc. SPIE, Electron. Imag. , Security, Forensics Multimedia XII, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds. , San Jose, CA, Jan. 17–21, 2010, vol. 7541, pp. 05-01–05-14.
  14. C. E. Shannon, "Coding theorems for a discrete source with a fidelity criterion," IRE Nat. Conv. Rec. , vol. 4, pp. 142–163, 1959.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography minimal distortion embedding JPEG steganography syndrome trellis codes uniform embedding.