Abstract
This paper presents a steganographic method based on quantization table modification and the F5 algorithm. This method has a larger embedded secret message capacity and improves the embedding strategy to avoid “shrinkage” due to the use of the F5 algorithm. The experimental results show that, in comparison with the F5 algorithm and other methods, the proposed method has a higher steganographic capacity and an improved embedding efficiency. In terms of the structural similarity as well as PSNR for assessing image quality, the stego-image has better image quality and the proposed method has better anti-attack capability.








Similar content being viewed by others

References
A. Amohammad, R.M. Hierons, G. Ghinea, High capacity steganographic method based upon JPEG, in Third International Conference on Availability. Reliability and Security, Washington (2008), pp. 544–549
A. Amohammad, G. Ghinea, R.M. Hierons, JPEG steganography: a performance evaluation of quantization tables, in 2009 International Conference on Advanced Information Networking and Applications, Bradford, UK (2009), pp. 471–478
C.C. Chang, T.S. Chen, L.Z. Chung, A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141, 123–138 (2002)
Y.S. Choi, H.J. Kim, Improving the modified matrix encoding on steganography method, in 2009 Fifth International Conference on Information Assurance and Security (2009), pp. 205–208
J. Fridrich, Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes, in Proceedings 6th Information Hiding Workshop, Berlin (2004), pp. 67–81
J. Fridrich, M. Goljan, D. Hogea, Steganalysis of JPEG image: breaking the F5 algorithm, in The 5th International Workshop on Information Hiding (Springer, Berlin, 2002), pp. 310–323
J. Fridrich, M. Goljan, D. Hogea, D. Soukal, Quantitative steganalysis: estimating secret message length. Multimed. Syst. 9(3), 288–302 (2003). Special issue on multimedia security
J.M. Guo, T.N. Le, Secret communication using JPEG double compression. IEEE Signal Process. Lett. 17(10), 879–882 (2010)
J. Huang, Y.Q. Shi, Y. Shi, Embedding image watermarks in DC components. IEEE Trans. Circuits Syst. Video Technol. 10(6), 974–979 (2000)
M. Ishaque, S.A. Sattar, Quality based JPEG steganography using balanced embedding technique, in 2009 2nd International Conference Emerging Trends in Engineering and Technology (ICETET) (2009), pp. 215–221
Y.B. Jiang, M.S. Pattichis, JPEG image compression using quantization table optimization based on perceptual image quality assessment, in 2011 Conference Record of the Forty-Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR) (2011), pp. 225–229
C.L. Jiang, Y.L. Pang, L. Guo, A high capacity steganographic method based on quantization table modification. Wuhan Univ. J. Nat. Sci. 16(3), 223–227 (2011)
M. Kumar, R. Newman, J3: high payload histogram neutral JPEG steganography, in 2010 Eighth Annual International Conference on Privacy, Security and Trust (2010), pp. 46–53
X.X. Li, J.J. Wang, A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf. Sci. 177, 3099–3109 (2007)
G.P. Lu, X.Y. Ye, Y.L. Wang, Y. Zhang, A F5 steganographic method based on quantization table modification. Comput. Eng. 38(24), 123–127 (2012)
D.M. Monro, B.G. Sherlock, Optimal quantization strategy for DCT image compression. IEE Proc., Vis. Image Signal Process. 143(1), 10–14 (1996)
S. Sachdeva, A. Kumar, Colour image steganography based on modified quantization table, in 2012 Second International Conference on Advanced Computing & Communication Technologies (ACCT), (2012), pp. 309–313
H.W. Tseng, C.C. Chang, Steganography using JPEG-compressed images, in The Fourth International Conference on Computer and Information Technology, CIT’04, 14–16 Sept (2004), pp. 12–17
N. Vongurai, S. Phimoltares, Frequency-based steganography using 32×32 interpolated quantization table and discrete cosine transform, in 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation, Kuantan, Malaysia (2012), pp. 249–253
Z. Wang, A.C. Bovik, Mean squared error: love it or leave it?—a new look at signal fidelity measures. IEEE Signal Process. Mag. 26(1), 98–117 (2009)
Z. Wang, A.C. Bovik, H.R. Sheikh, E.P. Simoncelli, Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
A. Westfeld, F5—a steganographic algorithm: high capacity despite better steganalysis, in Proceedings of 4th International Workshop on Information Hiding (Springer, New York, 2001), pp. 289–302
E.H. Yang, L.J. Wang, Joint optimization of run-length coding, Huffman coding, and quantization table with complete baseline JPEG decoder compatibility. IEEE Trans. Image Process. 18(1), 63–74 (2009)
Acknowledgements
This work was supported by the National Natural Science Foundation of China (No. 60975004) and Fundamental Research Funds for the Central Universities.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jiang, C., Pang, Y. & Xiong, S. A High Capacity Steganographic Method Based on Quantization Table Modification and F5 Algorithm. Circuits Syst Signal Process 33, 1611–1626 (2014). https://doi.org/10.1007/s00034-013-9703-3
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00034-013-9703-3