Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: High-performance JPEG steganography using complementary embedding strategy
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
High-performance JPEG steganography using complementary embedding
strategy


[attachment=26746]
Abstract

A high-performance JPEG steganography should be secure enough to resist modern steganalysis. In this paper, we propose a high-performance
JPEG steganographic method. The proposed method adopts the complementary embedding strategy to avoid the detections of several statistical
attacks. To show the effectiveness of the proposed method, several statistical attacks are simulated and used to detect the stego-images created
by the proposed method.

Introduction

The success of the Internet facilitates communications of
people, but also enables illegal users to access data transmitted
on the Internet. To protect the important data from being illegally
accessed, various modern cryptosystems [1] can be used
to encrypt the content of these data prior to their transmissions.
However, the encrypted data exists in a meaningless form and
may attract the intention of the interceptors to break the secret
codes. Steganographic methods can be used to make up this
drawback.

Review of JPEG compression

JPEG is an international standard for continuous-tone still
image compression which has been approved by International
Standard Organization (ISO) under the denomination of International
Standard-10918 (IS-10918) [33]. The JPEG compression
is based on the DCT and allows substantial compression to
be achieved while producing a reconstructed image with high
visual fidelity.
Fig. 1 shows the JPEG encoding process which comprises
three major steps: forward DCT (FDCT), quantization, and entropy
encoding. The input image is first divided into 8 × 8
non-overlapping blocks, and each block is transformed by the
FDCT into a set of 64 DCT coefficients. These coefficients are
then quantized using a quantization table with 64 entries. The
quantized results are all integers and defined as the division of
each DCT coefficient by its corresponding quantization value,
and rounding to the nearest integer.

Experimental results

Several experiments have been done to examine the performance
of the proposed embedding method. Many standard
512 × 512 gray images with different textural properties were
taken as the cover-images shown in Fig. 5. Our experiments
are described in two major parts: capacity test and security test.
The security test is further divided into three parts. They are imperceptibility
test, the chi-square-family-attack resistance test,
and the S-family-attack resistance test.

Conclusions

In this paper, we have proposed a high-performance JPEG
steganographic method. The proposed method adopts the complementary
embedding strategy to reduce the loss of statistical
property of the stego-image in spatial domain. In such a manner,
the proposed steganographic method can resist the S family
attack. Moreover, the proposed method does not adopt the
LSB replacement strategy so that it can also avoid the detection
of the chi-square family attack.