Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Review on Uniform Embedding For Efficient Jpeg Steganography

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 114 - Number 12
Year of Publication: 2015
Authors:
Aasemuddin Quazi
A. K. Gulve
10.5120/20030-1974

Aasemuddin Quazi and A k Gulve. Article: A Review on Uniform Embedding For Efficient Jpeg Steganography. International Journal of Computer Applications 114(12):19-23, March 2015. Full text available. BibTeX

@article{key:article,
	author = {Aasemuddin Quazi and A.k. Gulve},
	title = {Article: A Review on Uniform Embedding For Efficient Jpeg Steganography},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {114},
	number = {12},
	pages = {19-23},
	month = {March},
	note = {Full text available}
}

Abstract

Steganography is the art and science of concealed communication with an aim to hide the secret messages in the cover medium. The concept of minimal distortion embedding has been accepted in development of the steganographic system, where a well-designed distortion function plays an important role. Majority of the steganographic methods for real-time digital media embed message communication by minimizing a suitably developed distortion function. This can be achieved by syndrome codes which give near-best rate distortion function. Here the Uniform Embedding Distortion function will be used along with the Syndrome Trellis Coding. Thus, statistical detectability will be reduced thereby improving the security.

References

  • A. Westfeld, "F5—A steganographic algorithm," in Proc. 4th Inf. Hiding Conf. , vol. 2137. 2001, pp. 289–302.
  • J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities," in Proc. 9th ACM Workshop Multimedia Security, Dallas, TX, USA, Sep. 2007, pp. 3–14.
  • Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Proc. 8th Inf. Hiding Conf. , vol. 4437. Jul. 2006, pp. 314–327
  • V. Sachnev, H. J. Kim, and R. Zhang, "Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding," in Proc. 11th ACM Workshop Multimedia Security, Sep. 2009, pp. 131–140.
  • T. Filler, J. Judas, and J. Fridrich, "Minimizing additive distortion in steganography using syndrome-trellis codes," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 920–935, Sep. 2011.
  • R. Crandall, "Some notes on steganography," in Steganography Mailing List [Online]. Available: http://os. inf. tu-dresden. de/ westfeld/ Crandall. pdf 1998.
  • T. Filler and J. Fridrich, "Design of adaptive steganographic schemes for digital images," Proc. SPIE, vol. 7880, p. 78800F, Jan. 2011.
  • J. Kodovský, J. Fridrich, and V. Holub, "On dangers of overtraining steganography to incomplete cover model," in Proc. 13th ACM Workshop Multimedia Security, New York, NY, USA, Sep. 2011, pp. 69–76.
  • V. Holub and J. Fridrich, "Digital image steganography using universal distortion," in Proc. 1st ACM Workshop Inf. Hiding Multimedia Security, 2013, pp. 59–68.
  • J. Kodovský and J. Fridrich, "Steganalysis of JPEG images using rich models," Proc. SPIE, vol. 8303, p. 83030A, Jan. 2012.
  • J. Kodovský, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432–444, Apr. 2012.
  • L. Guo, J. Ni, and Y. Q. Shi, "Uniform Embedding for Efficient JPEG Steganography," IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 814-825, May 2014.
  • T. Filler, J. Judas, and J. Fridrich, "Minimizing embedding impact in steganography using trellis-coded quantization," in Proc. SPIE, Electron. Imag. , Security, Forensics Multimedia XII, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds. , San Jose, CA, Jan. 17–21, 2010, vol. 7541, pp. 05-01–05-14.
  • C. E. Shannon, "Coding theorems for a discrete source with a fidelity criterion," IRE Nat. Conv. Rec. , vol. 4, pp. 142–163, 1959.