Computational Analysis of Compressed Stiffened Composite ...
A Steganographic Technique for Highly Compressed JPEG Images
Transcript of A Steganographic Technique for Highly Compressed JPEG Images
A Steganographic Technique for Highly Compressed JPEG Images
Shamsul Kamal Ahmad Khalid1, Mustafa Mat Deris
1 and
Kamaruddin Malik Mohamad1
1Faculty of Information Technology and Multimedia
Universiti Tun Hussein Onn Malaysia
Parit Raja, Batu Pahat 86400, Johor, Malaysia
[email protected], [email protected]
ABSTRACT
Hiding secret data in JPEG images has been popularly
studied in steganography research. Most of the
previous studies propose schemes that hide secret data
in the quantized DCT coefficients. However, such
schemes either reduce the visual imperceptibility of the
compressed images or change its pixel histogram
properties, amounting to detection by statistical
attacks. This gets worst with highly compressed JPEG
images. In this paper, a new scheme for highly
compressed images is proposed. Using an area known
as NFDV, secret messages can be embedded with
minimal effect to changes in its pixel values. The
scheme also integrates a novel message randomizer
and message integrity checking sequence (MIX) to
protect the confidentiality and integrity of the secret
messages. Several test cases have been implemented,
and it shows that the proposed technique produces
highly imperceptible stego-images that are also secure
against pixel histogram statistical attacks.
KEYWORDS
Steganography, Information Hiding, High
Imperceptibility, DQT, JPEG.
1 INTRODUCTION
While a good cryptographic algorithm scrambles a
message to an unreadable form [1], a
steganographic algorithm hides a message inside
an unsuspecting cover media [2]. A few
requirements must be satisfied to protect the
message from being detected. A secure hiding
scheme should not produce perceptible change in
the output image. It should not be detectable by
any adversary analyzing the image by a naked eye
or by any statistical mean. Thus, two aspects are
usually addressed. Firstly, the embedding process
should not degrade the media’s fidelity [3].
Secondly, the embedding process should not
change the cover media’s statistical properties to
the point detectable by a statistical attack [4]. In
many steganography and watermarking systems,
PSNR (Peak Signal to Noise Ratio) and several
well-known statistical analysis attacks were used
to measure the imperceptibility and security of the
hiding scheme.
Hiding secret data in JPEG images has been
popularly studied in steganography research.
Common approaches used to hide messages in
JPEG images include least significant bit insertion
(LSB), masking and filtering, algorithms and
transformations. However, LSB is still the most
popular choice due to its simple embedding
concept and ease of implementation. Most
popular JPEG steganography tools like Jsteg,
Outguess, F5, JPHide and Steghide are using LSB
insertion technique. There are few drawbacks with
these tools. Firstly, their methods distort the
fidelity of the cover image by choosing the
quantized DCT coefficients as their concealment
locations. Similar to their predecessors, more
recent techniques have also marginally improved
the PSNR scores [5]. Secondly, their methods
distort the statistical properties of the cover image
by changing significantly the stego image’s pixel
histogram information. Both distortions
contribute negatively towards detection and
attacks. Thirdly, most of these techniques lack
integrity checker which make them vulnerable to
message modification. Although Steghide used
standard CRC-32, it is quite expensive for small
images, and with fixed message length, it may
ISBN: 978-0-9891305-2-3 ©2013 SDIWC 107
allow attackers to manually recalculate the CRC
value, thereby rendering the integrity checking
scheme ineffective.
In this paper, a new hiding scheme for highly
compressed JPEG images is proposed. Using an
area known as non functional high frequency DQT
values (NFDV), secret messages can be embedded
with minimal effect to pixel values’ changes. The
scheme also integrates a novel message
randomizer and message integrity checking
sequence to protect the confidentiality and
integrity of the secret messages. The secret
messages and the sequence are integrated,
encrypted and well blended into the DQT values.
The stego-images obtained from the proposed
system, produces far better imperceptibility score
than most previous techniques employing
modified DQT.
The rest of the paper is organized as follows.
Section 2 describes related work. Section 3
describes the proposed technique. Section 4
describes the result and discussion. Finally, the
conclusion of this work is described in section 5.
2 RELATED WORK
In this section, stego-systems based on default
DQT is reviewed and followed by stego-systems
based on modified DQT.
2.1 Default DQT stego-systems
There are many steganographic techniques and
tools that operate using default DQT. For
example, Derek Upham’s JSteg was the first
publicly available steganographic system for
JPEG images [6] using default DQT to embed
messages in the quantized DCT coefficients. The
message, which is limited to 40 bits and is
encrypted using RC4 stream cipher, is sequentially
embedded in the LSB of the DCT coefficients.
Due to this, anyone who knows the steganographic
system can determine the length and retrieve the
encrypted message hidden by Jsteg. Brute force
method can be applied to decrypt the recovered
encrypted message. Using similar technique, Niels
Provos initially introduced a hiding scheme called
F5 [7] and later on developed another alternative
method called Outguess [8]. F5 embeds secret bits
in the DCT coefficients using matrix embedding
so that for a given message the number of changes
made to the cover image is minimized. Outguess
version 0.3b embeds information in the LSB of the
DCT coefficients by making a random walk,
leaving some coefficients unchanged. This
algorithm improves the hiding by using a pseudo-
random number generator to select DCT
coefficients at random. However, the schemes
significantly change the pixel statistical property
of the image.
Like Jsteg, Outguess, F5, JPHide [9] and
Steghide, newer stego-systems also use default
DQT and embed secret messages in the
transformed DCT coefficients of the cover image.
In these systems, the LSB embedding was
designed to randomly change the coefficients as
minimum as possible, for example, in [10] and
[11]. However, minimizing changes from its
original coefficients is still a challenge because
more advanced statistical techniques are
continuously being developed to detect small
changes in the pixel histogram property of the
produced stego-images. Alternatively, a branch of
researchers exploit modified DQT to produce
better quality stego images.
2.2 Modified DQT stego-systems
Quantization table is not part of the JPEG
standard. Anyone is allowed to design and
redefine the quantization table to control the
quality of the reconstructed image and the
compression ratio [12]. In other words, a DQT
table can be arbitrarily generated. Realizing this,
many different methods have been proposed based
on modified quantization table to get better quality
stego-images [13][14]. This is possible because
human visual system (HVS) is more sensitive
towards the lower frequency signals.
For example, Chang et al. [15] argue that
since the energy of images is concentrated in the
lower frequency coefficients, modifying such
coefficients may degrades the quality of the stego-
image. Conversely, higher frequency coefficients
will be discarded due to the lossy quantization
process. Therefore, they suggested a modified
DQT in which the middle frequencies of the DQT
are replaced by all ones. By utilizing the 2-LSBs
ISBN: 978-0-9891305-2-3 ©2013 SDIWC 108
of the middle frequency coefficients, for every 8
by 8 block, 2X26=52 bits of secret messages were
embedded. They reported a PSNR range of 28-38
dB for various standard images. Similarly, by
enlarging the middle frequency space and using
arbitrary 16 by 16 DQT, Adel Almohammad et al.
[5] improved the capacity and imperceptibility of
the stego images by using optimized DQT table
based on Monro and Sherlock model. However,
all of these techniques embed messages in the
LSB of the DCT coefficients which directly affect
the components information, which in turn reduce
the fidelity and change the statistical property of
the final stego images. Both luminance and
chrominance DCT values were changed in these
methods.
The most recent work on modified DQT was
conceptually proposed by us in [16]. Instead of
embedding the secret messages in the DCT
coefficients with modified DQT, we embed the
secret messages directly into one of the DQT
table. However, we arbitrarily choose a high
quality JPEG image to embed secret messages.
Due to this choice, the embedding scheme
produces visible artifacts in its stego images.
Noticeably, at 24 bytes of message insertion,
distortions of the image can be clearly seen. To
protect the secret messages, we used a scattering
algorithm to randomly spread the message, but it
is predictable. Anyone who read the published
algorithm will be able to locate and retrieve where
the message were embedded. Finally, it lacked an
integrity checker that can protect the message
from modification.
3 THE NON FUNCTIONAL DQT VALUE
TECHNIQUE (NFDV)
The NFDV technique employs three strategies to
embed secret message with the least effect to the
fidelity and statistical property of the stego
images. The first strategy is illustrated in Figure
1. Figure 1(a) demonstrates the normal process
done in a stego system based on DCT transform
and LSB insertion in the quantized DCT
coefficients of a cover image [17]. The left of the
vertical bars are the embedding process and on the
right is the retrieving process to get back the secret
messages. In the proposed model (Figure 1(b)),
the secret messages are embedded into the bottom
right corner of the 8 by 8 DQT table (i.e. in the
high frequency area), after the quantization
process has been completed. The red lines signify
the cutoff points where the high frequency
coefficients will be zero-out to achieve good
compression without sacrificing the visual quality
of the original image. This area is referred as non
functional DQT values, hence NFDV. It is
stipulated that if the secret message is embedded
in the NFDV area of the DQT table but not
exceeding the red line (i.e. going in the upper left
direction), it will not have any effect on the
reconstructed image. This is due to the DCT
coefficients in this area will be zero out anyway.
Therefore, as no quantized DCT coefficients are
changed at all (i.e. embedded with a secret
message), the reconstructed image will be similar
to its cover image, without any change to its pixel
histogram information. Both luminance and
chrominance DQT tables can be used for
embedding secret messages.
Compressing the image with higher ratio will
move the red line nearer to the upper left corner of
the 8 by 8 box to zero out more high frequency
coefficients. Therefore, the second strategy is to
use a cover image that has been pre-compressed
with 20%-30% compression ratios. By doing that,
more secret messages can be embedded into the
DQT table and yet the outcome will be still similar
to the compressed cover image. 60% of
photographic images communicated on Internet
are compressed at 10-50% compression ratio [18].
The effect of the compression ratio is
illustrated in Table 1. Notice that 50% JPEG
compression is not giving any noticeable
distortions from the original images, i.e the quality
of the image is still good. The method in [16]
writes messages in the chrominance DQT far
beyond the red line. As a result, the stego image
quality and its statistical properties get seriously
affected. Using our method, the red line is moved
to the upper left corner of the 8 by 8 DQT table,
creating more non functional DQT values for the
purpose of embedding the secret messages.
ISBN: 978-0-9891305-2-3 ©2013 SDIWC 109
DCT Coefficients DQT Quantized DCT
Coefficients
Secret
Messages
/ =
(a) Normal JPEG Stego Model
Stego
ImageDQT
* =
DCT CoefficientsRaw
BMP/
TIFF Quantization Process Dequantization Process
0 0
0 00
0
0
0
0
0
Quantized DCT
Coefficients
00
Stego
Image
Embed Retrieve
Secret
Messages
0 0
0 00
0
0
0
0
0
0 0
0 00
0
0
0
0
0
Displayed
Image
DCT Coefficients DQT Quantized DCT
Coefficients
Secret
Messages
/ =
(b) The proposed JPEG Stego Model
Stego
Image
* =
DCT CoefficientsRaw
BMP/
TIFF Quantization Process Dequantization Process
0 0
0 00
0
0
0
0
0
Quantized DCT
Coefficients
00
Stego
Image
Embed Retrieve
0 0
0 00
0
0
0
0
0
0 0
0 00
0
0
0
0
0
Displayed
Image
,
Modify
DQT
Secret
Messages
Modified DQT
Figure 1. The normal (a) and the proposed (b) JPEG stego models.
Table 1. Compression effect using Irfan conversion tool [19]
0% (No compression) 20% 30% 50%
Lena.jpg
Baboon.jpg
ISBN: 978-0-9891305-2-3 ©2013 SDIWC 110
Figure 2. Encoding and decoding process of NFDV using private key system.
The third strategy is to embed more messages
beyond the red line of the chrominance DQT
table. The luminance component contributes the
most information to the image. Unlike the RGB
color model, where all components are roughly
equal, YCbCr concentrates the most important
information in one component. This makes it
possible to get greater compression by including
more data from the luminance component than
from the Cb and Cr components. Therefore,
modifying the chrominance DQT table of a cover
image even beyond the red line will give
insignificant distortion to its reconstructed stego
image. However, for the sake of higher
imperceptibility, only a few of the DQT values
beyond the red line will be changed. In the
following section, a complete stego-system using
NFDV is described.
3.1 A Stego System using NFDV
Figure 2 shows the complete encoding and
decoding phases of a private key stego-system
using NFDV. A sender, Bob, composes a message
M, chooses a cover image I and specifies a secret
key K. Feeding all of the above as inputs to our
NFDV encoder, a stego-image, I' is produced.
Bob then, send the secret key K and the stego-
image I' over two separate channels to the
receiver, Alice. Bob could send the secret key K
using text based steganography via an SMS (Short
Messaging System) message to Alice. At the
receiving end, Alice will feed the secret key K and
the stego-image I' to the NFDV decoder and get
back the original message M. The encoding
algorithm in Figure 2 is referred. Let us assume a
cover image I, a secret key K and a secret message
M are supplied to the encoding algorithm.
ISBN: 978-0-9891305-2-3 ©2013 SDIWC 111
Steps Tracing Values
1. Get the I, M and K M:FORCE
2. Calculate the size of M S M:FORCE; S:5
3. Using K, encrypt MM' M:FORCE; M':@#$%!; S:5
4. Using K, encrypt SS' M:FORCE; M':@#$%!; S:5; S’:32 (0x20)
5. Embed S' M:FORCE; M':@#$%!; S:5; S':32
5. Generate partial scatter code Q M:FORCE; M':@#$%!; S:5; S':32; Q:10110
6. MSB zero padding of QP M:FORCE; M':@#$%!; S:5; S':32; Q:10110
P:00010110 (0x16)
7. Using K, encrypt PP' M:FORCE; M':@#$%!; S:5; S':32; Q:10110
P:00010110 (0x16); P':00101010 (0x2A)
8. Embed P' M:FORCE; M':@#$%!; S:5; S':32; Q:10110
P:00010110 (0x16); P':00101010
9. Embed M' and calculate X M:FORCE; M':@#$%!; S:5; S’:32; Q:10110
P:00010110 (0x16); P':00101010; X:0x10
10. Using K, encrypt XX' M:FORCE; M':@#$%!; S:5; S':32; Q:10110
P:00010110 (0x16); P':00101010; X:0x10; X':0xBD
11. Embed X' M:FORCE; M':@#$%!; S:5; S':32; Q:10110
P:00010110 (0x16); P':00101010; X:0x10; X':0xBD
Other DQT values 0xBD ! ! % $ + # m @ 0x2A 0x20 SOF
X' M'5 M'4 M'3 M'2 M'1 P' S'
Figure 3. An example of embedding a message “FORCE” using NFDV
An example of embedding a message “FORCE”
using the NFDV technique is shown in Figure 3.
Initially, the size of the input message, S is
calculated. Using K, M and S is encrypted to get
M' and S', respectively. The message hiding
process proceeds if the message size is not more
than the maximum message size of 24 bytes.
Then, the encrypted form of the message size, S' is
embedded at the last byte of the DQT table. The P
series of 0’s and 1’s is generated (for the purpose
of scattering the message randomly in the DQT
table in the latter stage).
In this algorithm, a value 0 means no skip and
a value of 1 means skip 1 DQT byte. Once the
scatter-code P is generated, it is encrypted and
embedded in the next byte of the DQT table. For
example, if the message size is 5 bytes, and the
randomly generated code is 1, 0, 1, 1, 0, thus the
scatter-code is 10110 which implemented in
reverse that means not skip (0), skip (1), skip (1),
not skip (0) and finally skip (1). Since it is less
than a byte, M' is zero padded at its most
significant bits (MSBs). Therefore, the final
scatter-code is 0001 0110 or 0x16. After the S'
and P' have been embedded, the message parts of
M' is successively embedded according to the
scatter code P. During this process, the MIX (i.e
X) value is also calculated. Once all messages
have been embedded and the final MIX value has
been calculated, the MIX value, X is encrypted to
X' and embedded immediately after the last M'.
Notice that the skipped DQT elements are
replaced with random values. Encrypting and
scattering help protects against unauthorized
hidden message extraction [20]. Note that all
messages and its headers will be embedded into
the last DQT table prior to SOF using baseline
JPEG file. Baseline JPEG is used because it is the
most widely used JPEG in the Internet [17].
3.2 Message Integrity Checking Sequence
(MIX)
After the message is hidden, it is necessary to
append an integrity checker in order to detect any
tampering done. The message integrity checking
sequence (MIX) is a value that is produced from
calculating the CRC of a selective part of the
ISBN: 978-0-9891305-2-3 ©2013 SDIWC 112
encrypted message. The random scatter code is
used to decide which parts of the messages to be
considered in the CRC calculation. Furthermore, a
new CRC-8 polynomial known as 0xA6 =
12368 xxxx is chosen because it can
provide good Hemming Distance (HD) for
messages of less than 247 bits [21]. As a note,
only a maximum of 29 bytes of messages (232
bits) from the chrominance table are considered in
the proposed system. The CRC is a well known
technique used to detect bit modification to
messages sent over a network [22]. The choice of
the polynomials, polynomial lengths must be
suitable for the data size to avoid undetected
multibits errors. Baicheva et al. [22] and Koopman
and Chakravarty [21] provide extensive research
on choosing the best polynomial for different
applications. In short, the random feature of the
scatter code is used to further enhance the integrity
checking. The integrity checking mechanism is
illustrated in the following example.
Assuming the scatter code P is 0xAA and the
encrypted secret message M' is 0xAEEA BCDE
EEBB CCDE, based on P (0x10101010), the
data to be considered in the cyclic redundancy
check will be 0xEADE BBDE (from right -
first, third, fifth and seventh messages in M'.
Note that 0 mean “no skip”, 1 mean “skip”).
Using the chosen CRC-8 polynomials, we
calculate and obtain the CRC value of 0x6A.
Furthermore, after encryption with K, the MIX
(X) value will be embedded immediately after
the last byte of M' (i.e. after M'8). In short:
P M'1 M'3 M'5 M'7 X*
0xAA 0xEA 0xDE 0xBB 0xDE 0x6A
4 RESULTS AND DISCUSSION
The NFDV was developed using Matlab and C on
Windows XP operating system with Intel® dual-
core 1.8 MHz and 1GB memory. To allow
comparison with other techniques, standard JPEG
test images in steganography research domain are
used as the cover media. Furthermore, to see the
effect of the proposed technique on small images,
lena.jpg has been cropped into smaller images
to embed secret messages with the stego-system.
The following three types of experiments/
measurements were conducted:
4.1 Imperceptibility Test
Most researchers use Peak Signal to Noise Ratio
(PSNR) and Mean Square Error (MSE) to measure
the image quality [23]. The PSNR and MSE for
an NxN gray level image are defined as [24]:
dbMSE
PSNR2
10
255log.10 (1)
2
1 1
21
N
i
N
j
ijij XXN
MSE (2)
where:
ijX : The pixel values of the cover image.
ijX : The pixel values of the stego-image.
The PSNR of color images can be calculated
by first evaluating the MSE values for every color
channel separately and then, taken the sum of the
MSE values, MSE'. To calculate the PSNR, the
peak value (MSE
2255) is then replaced with
(MSE'
3*2552
).
The results of these tests are illustrated in
Table 2 and Table 3. Notes that “PSNR = INF”
indicates that the cover image used and the stego
image produced are identical. It is shown in the
experiment that image quality very slowly
degrades as the message capacity increases (refer
to Table 2), and rapidly deteriorates if the message
is bigger than 24 bytes. Therefore, although more
messages can be fitted into the DQT, a maximum
message size (message capacity) of 24 bytes is
recommended to get very low image distortion. If
the message size is 24, the scatter-code will be
using 3 bytes of the AC values in DQT. Therefore,
the total DQT values needed would be
1+3+24+24+1=53 bytes, which is just fine before
it rapidly distort the image.
ISBN: 978-0-9891305-2-3 ©2013 SDIWC 113
Table 2. The visual imperceptibility of the stego images with different message size and compression ratio.
Message Size
(in bytes)
Steganography Image
(lena.jpg with 30% compression)
Steganography Image (baboon.jpg
with 20% compression)
5
PSNR = INF
PSNR = INF
15
PSNR = INF
PSNR = 50.70
24
PSNR = 49.68
PSNR = 42.34
27
PSNR = 20.72
PSNR = 19.52
30 Image corrupted Image corrupted
The steganography image cannot be viewed at all
when the message size is 30 bytes as it overrides
the DC value. However, by considering that
several 0s will turn up in the scatter code, it may
be possible to embed more messages. As
demonstrated in Table 3, it appears that using
small images seems to produce better PSNR. It
may be due to the lesser chrominance DCT
coefficients are affected by the embedding
process, as compared to larger images.
Furthermore, as demonstrated in Table 2,
using higher compression JPEG images as its
hosts, the size of the NFDV area gets enlarged and
therefore able to store more data without
sacrificing the imperceptibility of the compressed
images.
Finally, a comparison of PSNR values with
other methods is given in Table 4. It shows the
PSNR of different methods when all the available
pools in the cover images are used to embed secret
data. From the results, it is shown that the
imperceptibility of stego-images produced by the
proposed system exceeded previous PSNR values
reported in previous literature.
ISBN: 978-0-9891305-2-3 ©2013 SDIWC 114
Table 3. The imperceptibility of small images with 24 bytes of secret messages in the chrominance DQT.
Table 4. The quality of stego-images using different schemes
ISBN: 978-0-9891305-2-3 ©2013 SDIWC 115
(a)
Steganalysis Method Tools Detection Outcome
Statistical Chi-Square Attack [26] StegDetect 0.6 Fail
Statistical RS Analysis [27] Virtual Steganography Laboratory [28] Fail
Linear Discriminant Analysis [29] StegDetect 0.6 Fail
(b)
Figure 4. Steganalysis Result. (a) The histogram of the lena.jpg cover image (left) and its stego image (right). Other images with
different amount of secret messages produce similar result. (b) Results of performing some statistical or anomaly based
steganalysis methods on Lena and Baboon stego images with 24 bytes of messages.
4.2 Image Histogram and Steganalysis Test
Interestingly, Figure 4(a) shows that NFDV does
not change the histogram color information of the
image if embedding is done below the red line.
Therefore, it is expected that the pixel histogram
analysis based attacks will not be able to detect the
existence of secret messages in the stego-images.
Obviously, this is due to the fact that DQT does
not hold any information about pixel or pixel
relations. It is simply used to quantize DCT
coefficients to get greater number of zeros for
compression purpose.
The stego-images are also evaluated based on
its ability to persist detection from several well-
known steganalysis techniques and tools,
especially against statistical/anomaly attacks. Two
of the attacks are based on first order statistical
attack (Chi-square and RS analysis).
Another one is based on second order
statistical attack (linear discriminant analysis).
Figure 4(b) illustrates the outcome of the
steganalysis attacks. Stegdetect and Stegbreak
[25] employ specific signature attack, Chi-square
attack and also dictionary attack. They cannot
detect the existence of secret messages in the stego
images as they can only handle specific schemes
such as jsteg, jphide (unix and windows), invisible
secrets, outguess 01.3b, F5, appendX and
camouflage. The Chi-square attack built into
Stegdetect was also not able to detect secret
messages in the stego-images as the modifications
are not affecting the DCTs. Only a few of the
chrominance DCTs are affected due to embedding
ISBN: 978-0-9891305-2-3 ©2013 SDIWC 116
beyond the red line (Figure 1). Furthermore,
without appropriate key, message length and
locations are unknown in the proposed stego-
system. Due to these limitations, detection and
retrieval of the secret messages from the stego-
image is difficult, if not possible.
4.3 Integrity and Confidentiality Test
In this experiment, two stego-images with
message sizes of 5 and 24 bytes each have been
used. Modification is made to DCT values that
carry messages and also not carrying any
messages. Results obtained from the integrity test
shows that the integrity checker in NFDV is able
to detect modified message bytes but unable to
detect modified non-message byte. It indicates that
the MIX is affected only by tampering of data in
the message byte. Therefore, even if the
steganography images are corrupted, the hidden
message can still be retrieved as long as the
message bytes are not altered. The message
integrity checking sequence is highly sensitive to
changes in bits of the messages as it takes into
account the summation, the position of the bit
value and also the scatter code in its calculation.
5 CONCLUSION
In this paper, a data hiding scheme for highly
compressed JPEG has been proposed. The scheme
produces highly imperceptible stego-images that
are effective against a group of statistical
histogram steganalysis attacks, such as Chi-
square, RS analysis and linear discriminant
analysis attacks. Using higher JPEG compression
ratio, similar to the ones usually communicated on
the Internet, more secret messages can be
embedded without changing the pixel’s statistical
property. We have demonstrated a reasonably
complex stego-system using the NFDV technique.
The technique can also be used for sending secret
messages disseminated via groups of small JPEG
images, such as through a web site or a document
consisting of small photos, image clips,
advertising photo images and artworks in JPEG
format.
6 ACKNOWLEDGEMENTS
This work is supported by Universiti Tun Hussein
Onn Malaysia. The grant number is UTHM-
FRGS-1051.
7 REFERENCES
[1] J. Hu, F. Han, A pixel-based scrambling scheme for
digital medical images protection, Journal of Network
and Computer Applications, vol. 32(4), 2009, pp.
788-794.
[2] N. F. Johnson, S. Jajodia, Exploring Steganography:
Seeing the Unseen, Journal of IEEE Computer, vol.
31(2), 1998, pp. 26-34.
[3] I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, T.
Kalker, Digital Watermarking and Steganography,
Morgan Kaufmann Inc., Massachusetts (2008).
[4] S. Geetha, V. Kabilan, S.P. Chockalingam, N.
Kamaraj, Varying Radix Numeral System Based
Adaptive Steganography, Information Processing
Letters, vol. 111(16), 2011, pp.792-797.
[5] A. Almohammad, G. Ghinea, R.M. Hierons, JPEG
Steganography: A Performance Evaluation of
Quantization Tables, in: Proceedings of the Advanced
Information Networking and Applications, 2009,
AINA2009, 2009, pp. 471-478.
[6] N.F Johnson, S.C. Katzenbeisser, A Survey of
Steganographic Techniques, in: Information Hiding
Techniques for Steganography and Digital
Watermarking, Artech House, Inc., Norwood (2000).
[7] A. Westfeld, F5 – a steganographic algorithm: High
capacity despite better steganalysis, in: Proceedings
of the 4th International Information Hiding
Workshop, IHW2001, LNCS vol. 2137, Springer-
Verlag (2001), pp. 289-302.
[8] N. Provos, Defending against statistical steganalysis,
in: Proceedings of the 10th conference on USENIX
Security Symposium, SSYM2001, vol. 10, 2001, pp.
24-24.
[9] A. Latham, Steganography: JPHIDE and JPSEEK,
http://linux01.gwdg.de/~alatham/stego.html, accessed
on 20 May 2012.
[10] F. Y. Shih, Digital watermarking and steganography:
fundamentals and techniques, Taylor & Francis CRC
Press, Boca Raton, Florida (2008).
[11] H. Sajedi, M. Jamzad, Secure steganography based
on embedding capacity, International Journal of
Information Security, vol. 8(6), 2009, pp. 433-445.
[12] A. Cheddad, J. Condell, K. Curran, P. McKevitt,
Digital image steganography: Survey and analysis of
current methods, Signal Processing, vol. 90(3), 2010,
pp. 727-752.
[13] Y. H. Yu, C. C. Chang, Y. C. Hu, Hiding secret data
in images via predictive coding, Pattern Recognition,
vol. 38(5), 2005, pp. 691-705.
ISBN: 978-0-9891305-2-3 ©2013 SDIWC 117
[14] Y. O. Yildiz, K. Panetta, S. Agaian, New
Quantization Matrices for JPEG Steganography, in:
Proceedings of SPIE, vol. 6579, 2007, pp. 1-11.
[15] C. C. Chang, T. S. Chen, L. Z. Chung, A
Steganographic method based upon JPEG and
quantization table modification, Information
Sciences, vol. 141(1-2), 2002, pp. 123-138.
[16] K. M. Mohamad, T. Herawan, M. Mat Deris, Hiding
Data in JPEG Using in-DQT Technique, Information
Security and Assurance, vol.76, 2010, pp. 27-36.
[17] JPEG, Digital Compression and Coding of
Continuous-tone Still Images, Part I: Requirements
and Guidelines, ISE/IEC IS 10918-1, American
National Standards Institute, New York (1994).
[18] S. Chandra, C. S. Ellis, A. Vahdat, Application-level
differentiated multimedia Web services using quality
aware transcoding, IEEE Journal on Selected Areas
in Communications, vol.18(12), 2000, pp. 2544-2565.
[19] Irfan Tool. www.irfan.org . Accessed on 3 October
2012.
[20] Y. Lee, L. Chen, Secure error-free steganography for
JPEG images, International Journal of Pattern
Recognition and Artificial Intelligence, vol. 17(6),
2003, pp. 967-981.
[21] P. Koopman,; T. Chakravarty, Cyclic redundancy
code (CRC) polynomial selection for embedded
networks, Proceedings of the International
Conference on Dependable Systems and Networks
DSN2004, 2004, pp. 145- 154.
[22] Baicheva, S. Dodunekov, P. Kazakov, On the cyclic
redundancy-check codes with 8-bit redundancy,
Computer Communications, vol. 21(11), 1998, pp.
1030-1033.
[23] X. Kong, R. Chu, X. Ba, T. Zhang, D. Yang, A
Perception Evaluation Scheme for Steganography, in:
Proceedings of the Intelligent Data Engineering and
Automated Learning, LNCS vol. 2690, Springer-
Verlag (2003), pp. 426-430.
[24] L. W. Chang, C. Y. Wang, S. M. Lee, Designing
JPEG quantization tables based on human visual
system, in: Proceedings of the ICIP, vol. 2, 1999, pp.
376-380.
[25] http://www.outguess.org accessed on 25 May 2012.
[26] N. Provos and P. Honeyman, Detecting
steganographic content on the Internet, in: ISOC
NDSS2002, San Diego, CA, 2002.
[27] N. Provos, P. Honeyman, Hide and Seek: An
Introduction to Steganography, IEEE Security and
Privacy Journal, vol. 1(3), 2003, pp. 32-44.
[28] P. Forczmański, M. Węgrzyn, Open Virtual
Steganographic Laboratory, in: Proceedings of the
International Conference on Advanced Computer
Systems, ACS-AISBIS, vol. 50(11), 2009, pp. 60-65.
[29] W. N. Venables, B. D. Ripley, Modern Applied
Statistics with S, Springer, 4th ed., ISBN 0-387-
95457-0, (2002).
ISBN: 978-0-9891305-2-3 ©2013 SDIWC 118