Abstract

In digital steganography, due to difficulties estimating the JPEG cover image, it is still very hard to accurately locate the hidden message embedded in a JPEG image. Therefore, this study proposes a payload location method for a category of pseudo-random scrambled JPEG image steganography. In order to estimate the quantized discrete cosine transform coefficients in the cover JPEG image, a cover JPEG image estimation method is proposed based on co-frequency sub-image filtering. The proposed payload location method defines a general residual, uses the estimated cover JPEG image to compute the residuals, and then employs the mean residuals of multiple stego images embedded along the same path to distinguish the stego positions. The proposed cover JPEG image estimation method constructs 64 co-frequency sub-images, and then filters the sub-image to estimate the cover JPEG image. Finally, using these methods, payload location algorithms are designed for two common JPEG image steganography algorithms: JSteg and F5. Experimental results show that the proposed location algorithms can effectively locate the stego positions in both JSteg and F5 steganography when the investigator possesses multiple stego images embedded along the same path. In addition, the location results can also be used to recover the steganography key to extract the embedded secret messages.

Highlights

  • Digital steganography is a technique that embeds hidden information, known as the payload, in redundant parts of multimedia data such as digital images, video, audio, and text, termed the cover, in order to conceal secret communications

  • This section applies the improved residual estimation formula (17) and the cover JPEG image estimation algorithm in the ‘‘Cover JPEG image estimation based on co-frequency sub-image filtering’’ section to the payload location method proposed in the ‘‘Payload location method for random JPEG image steganography’’ section, and derives the payload location algorithm for JSteg steganography based on co-frequency sub-image wavelet filtering, as follows

  • The intuitive idea is to adapt the payload location algorithms to locate the payload of JPEG image steganography

Read more

Summary

Introduction

Digital steganography is a technique that embeds hidden information, known as the payload, in redundant parts of multimedia data such as digital images, video, audio, and text, termed the cover, in order to conceal secret communications. Based on the mean of the estimated residuals in formula (4), a payload location method is proposed for JPEG image steganography, which selects the embedding positions by pseudo-randomly scrambling all coefficients. The JSteg steganography applies the spatial LSB replacement to the JPEG image and processes each selected coefficient as follows: Algorithm 1: Cover JPEG image estimation algorithm based on co-frequency sub-image wavelet filtering. This section applies the improved residual estimation formula (17) and the cover JPEG image estimation algorithm in the ‘‘Cover JPEG image estimation based on co-frequency sub-image filtering’’ section to the payload location method proposed in the ‘‘Payload location method for random JPEG image steganography’’ section, and derives the payload location algorithm for JSteg steganography based on co-frequency sub-image wavelet filtering, as follows. Method for random JPEG image steganography’’ section, and derives the payload location algorithm for F5 steganography based on co-frequency sub-image wavelet filtering, as follows. The payload location algorithm for F5 steganography based on co-frequency sub-image 4-neighborhood average filtering (CS4-F5) can be obtained

Experimental setup
CS4-JSteg
WIW-JSteg
CSW-F5
CS4-F5
WIW-F5
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.