An Efficient JPEG Steganographic Scheme Design Using Domain Transformation of Embedding Cost

by   Wenkang Su, et al.

Although the recently proposed JPEG steganography using Block embedding Entropy Transformation scheme (BET) shows excellent security performance, its procedure is much complicate. In this paper, we intend to introduce a Block embedding Cost Transformation (BCT) scheme for JPEG steganography. The core of our proposed BCT is the embedding cost domain transformation function, which comprises of the proposed distinguish factors of inter-block and intra-block, i.e., spatial (pixel) block embedding costs and spatial (pixel) block embedding changes, respectively. And moreover, for further maintaining the statistical undetectability of the stego, an exponential model is then introduced to facilitate the construction of domain transformation function. With the aid of the proposed domain transformation function, the JPEG embedding cost can be easily obtained through weighting the spatial embedding costs by the spatial embedding changes. In this way, the design procedure of JPEG steganographic distortion function under BCT will be more simplified than BET, and following this paradigm, the spatial image steganography will be more meaningful as well. Experimental results show that the proposed BCT has a more comprehensive performance improvement than UERD with the same computational complexity, and is superior to J-UNIWARD and GUED in resisting the detection of GFR and SCA-GFR. In addition, it can also rival BET with an order of magnitude lower computational complexity.


Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge

Although significant progress in automatic learning of steganographic co...

Graph Encoder Embedding

In this paper we propose a lightning fast graph embedding method called ...

An Improvement Technique based on Structural Similarity Thresholding for Digital Watermarking

Digital watermarking is extensively used in ownership authentication and...

Security analysis of a self-embedding fragile image watermark scheme

Recently, a self-embedding fragile watermark scheme based on reference-b...

A security steganography scheme based on hdr image

It is widely recognized that the image format is crucial to steganograph...

Block DCT filtering using vector processing

Filtering is an important issue in signals and images processing. Many i...

Adaptive Steganography Based on bargain Game

The capacity and security of the confidential message on the channel are...

Please sign up or login with your details

Forgot password? Click here to reset