Preview

Jpeg-Jsteg

Powerful Essays
Open Document
Open Document
5547 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Jpeg-Jsteg
INFORMATICA, 2004, Vol. 15, No. 1, 127–142  2004 Institute of Mathematics and Informatics, Vilnius

127

High Capacity Data Hiding in JPEG-Compressed Images
Hsien-Wen TSENG, Chin-Chen CHANG
Department of Computer Science and Information Engineering National Chung Cheng University Chaiyi, Taiwan 621, R.O.C. e-mail: {hwtseng,ccc}@cs.ccu.edu.tw Received: March 2003 Abstract. The JPEG image is the most popular file format in relation to digital images. However, up to the present time, there seems to have been very few data hiding techniques taking the JPEG image into account. In this paper, we shall propose a novel high capacity data hiding method based on JPEG. The proposed method employs a capacity table to estimate the number of bits that can be hidden in each DCT component so that significant distortions in the stego-image can be avoided. The capacity table is derived from the JPEG default quantization table and the Human Visual System (HVS). Then, the adaptive least-significant bit (LSB) substitution technique is employed to process each quantized DCT coefficient. The proposed data hiding method enables us to control the level of embedding capacity by using a capacity factor. According to our experimental results, our new scheme can achieve an impressively high embedding capacity of around 20% of the compressed image size with little noticeable degradation of image quality. Key words: JPEG, data hiding, steganography, HVS, Jpeg–Jsteg, LSB substitution.

1. Introduction Image, audio, video, and many other kinds of data are nowadays mostly passed from person to person or from place to place in a digital form. It is often desirable to embed data into the digital contents for copyright control and authentication, or for secret data hiding. Data-embedding techniques designed to take care of such tasks are commonly classified as watermarking or data hiding techniques in accordance with their functionalities. Watermarking techniques are often further divided into two



References: Adelson, E. (1990). Digital Signal Encoding and Decoding Apparatus. U.S. Patent, No. 4939515. Chang, C.C., T.S. Chen and L.Z. Chung (2002). A steganographic method based upon JPEG and quantization table modification. Information Sciences, 141, 123–138. Cox, I.J., J. Kilian, F.T. Leighton and T. Shamoon (1997). Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing, 6(12), 1673–1687. Daly, S. (1994). A visual model for optimizing the design of image processing algorithms. In Proceedings of IEEE International Conference on Image Processing, Austin, Texas, U.S.A., Nov., Vol. II. pp. 16–20. DES Encryption Standard (DES), National Bureau of Standards (U.S.) (1977). Federal Information Processing Standards Publication, 46, National Technical Information Service, Springfield, VA. Johnson, N., and S. Jajodia (1998). Steganalysis of images created using current steganography software. In Proceedings of Information Hiding Workshop, Portland, Oregon, USA, April, LNCS 1525. pp. 273–289. Hung, A.C. (1993). PVRG–JPEG CODEC, Technical Report, Portable Video Research Group, Stanford University. Kobayashi, H., Y. Noguchi and H. Kiya (1999). A method of embedding binary data into JPEG bitstreams. IEICE Trans. Information and Systems, J83-D-II, 1469–1476. Noguchi, Y., H. Kobayashi and H. Kiya (2000). A method of extracting embedded binary data from JPEG bitstreams using standard JPEG decoder. In Proceedings of IEEE International Conference on Image Processing, Vancouver, BC, Canada, 10–13 Sept., Vol. 1. pp. 577–580. Pennebaker, W., and J. Mitchell (1993). JPEG Still Image Data Compression Standard. Van Nostrand Reinhold, New York. Van Schyndel, R.G., A.Z. Tirkel and C.F. Osborne (1994). A digital watermark. In Proceedings of the First IEEE International Conference on Image Processing, Austin, Texas, USA, Vol. 11. pp. 86–90. Wandell, B.A. (1995). Foundations of Vision. Sinuaer, Sunderland, MA. Wang, R.Z., C.F. Lin and J.C. Lin (2001). Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 34, 671–683. Wolfgang, R.B., C.I. Podilchuk and E.J. Delp (1999). Perceptual watermarks for digital images and video. In Proc. IEEE 87. pp. 1108–1126. High Capacity Data Hiding in JPEG-Compressed Images 141 Xia, X.G., C.G. Bongelet and G.R. Arce (1997). A multiresolution watermark for digital images. In Proceedings of IEEE International Conference on Image Processing, Santa Barbara, CA, 26–29 Oct 1997, Vol. 3. pp. 548–551. H.-W. Tseng received the BS degree in computer science and information engineering from Tamkang University, Taipei County, Taiwan, in 1986, and his MS degree in computer science and information engineering from National Taiwan University, Taipei, Taiwan, in 1988. Since 1989 to 2000 he worked as a computer engineer. He is currently working toward to the PhD degree in computer science and information engineering at National Chung Cheng University, Chaiyi, Taiwan. His research interests include image processing, data hiding, and error resilient coding. C.-C. Chang was born in Taichung, Taiwan, on Nov. 12, 1954. He received his BS degree in applied mathematics in 1977 and his MS degree in computer and decision science in 1979 from National Tsing Hua University, Hsinchu, Taiwan. He received his PhD degree in computer engineering in 1982 from National Chiao Tung University, Hsinchu, Taiwan. From 1983 to 1989, he was among the faculty of Institue of Applied Mathematics, National Chung Hsing University, Taichung, Taiwan. Since August 1989, he worked as a professor of Institute of Computer Science and Information Engineering at National Chung Cheng University, Chaiyi, Taiwan. Dr. Chang is a fellow of IEEE and a member of Chinese Language Computer Society, Chinese Institute of Engineers of Republic of China, and Phi Tau Phi Society of Republic of China. His reaserch interests include computer cryptography, data engineering, and image compression. 142 H.-W. Tseng, C.-C. Chang Efektyvus duomenu sl˙ pimas JPEG kompresijoje e Hsien-Wen TSENG, Chin-Chen CHANG JPEG yra vienas iš populiariausiu skaitmeniniu vaizdu failu formatu. Taˇ iau iki šiol buvo c e pasi¯ lyti tik keli duomenu sl˙ pimo (steganografijos) metodai, naudojantys JPEG formata. Straipu e snyje pateikiamas naujas efektyvus duomenu sl˙ pimo metodas, pagristas JPEG. Šis metodas ree miasi našumo lentele, kurios pagalba ivertinama, kiek bitu galima pasl˙ pti kiekvienoje DCT komponent˙ je, neiškreipiant vaizdo. Našumo lentel˙ išvedama iš JPEG kvantavimo lentel˙ s ir spalvu e e e modelio HVS. Po to naudojamas adaptyvus mažiausiai reikšminio bito pakeitimo algoritmas, perskaiˇ iuojant DCT koeficientus. Šitoks metodas našumo faktoriaus d˙ ka leidžia valdyti vaizdo c e c u kokybe. Rezultatai, patikrinti eksperimentiniais skaiˇ iavimais, rodo si¯ lomo algoritmo efektyvuma.

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    Steganography is task of hiding information by putting messages within one another. Whereas, cryptography is when you change information into an illegible layout. this format is called cipher text.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    JPEG is an acronym for ‘Joint Photographic Experts Group’ format. This format is a raster file document that is a popular file format that has range of compatibility, high quality compatibilities and file size. JPEG format is commonly used with all people;…

    • 2192 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Better Essays

    Project Part 1

    • 1209 Words
    • 4 Pages

    Data encryption on removable media guideline. (2014). In Berkeley Security. Retrieved March 15, 2014, from https://security.berkeley.edu/content/data-encryption-removable-media-guideline?destination=node/379…

    • 1209 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Ict Unit 30

    • 2076 Words
    • 9 Pages

    JPG file - JPG files, also known as JPEG files, are a common file format for digital photos and other digital graphics. When JPG files are saved, they use "lossy" compression, meaning image quality is lost as file size decreases.…

    • 2076 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    4. Images, like the ones you make with your digital camera, cannot be stored as…

    • 435 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Leadership

    • 402 Words
    • 2 Pages

    One of the problems is the law enforcement agencies would not like using digital technology to generate data. Because they think it was easy to alter or multiply the data. This risk will threatened a department’s credibility and potentially expose it to liability, especially it will damage to film-generated photographs, videocassettes or CDs.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    photo work

    • 635 Words
    • 3 Pages

    JPEG stands for Joint Photo Experts Group. You have to keep in mind that the data can be easily lost since the file is compressed.…

    • 635 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    References: Ali, I. (2006, July 24). Copyright Protection-Software-Computer Programs. Retrieved December 4, 2010 from http://www.lawdit.co.uk/reading_room/room/view_article.asp?name=../articles/Computer%20Protection-%20Software-Computer%20Programs.htm…

    • 1793 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Governments may want to use it to for covert missions. They can let their troops in a different area know what the next move should be in a war. Criminals might also use steganography. Some people think that steganography may have been a tool used by the people that planned the attacks on 9-11. Also, some people think there may have been hidden messages in the videos that were circulating that Osama bin Laden appeared in (Kessler, 2001). Appallingly, child pornographers may use steganography to hide files. A positive use for steganography would be for artists and photographers who want to make sure their copyrighted materials do not get stolen is to add a watermark to their…

    • 789 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Digital Forensics Essay

    • 1416 Words
    • 6 Pages

    The main significance of digital forensics is to identify the proof of a crime, it is able to be utilized to facts to particular suspect, affirm explanations or articulations, focus goal, distinguish sources or authenticate documents. The forensic tools can help us to identify potential digital evidence. In addition to the identification of evidence of murders, terrorism, where the tools are used commonly but it is also used in other types of crime such as child pornography or stalking. Also helps to guarantee the overall reliability and survivability of the network infrastructure. Considerate the lawful and specialized parts of…

    • 1416 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    The Hippy

    • 961 Words
    • 4 Pages

    |concepts of digital media. |advanced concepts of digital media. |of advanced concepts of digital media. |…

    • 961 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Data Masking

    • 4525 Words
    • 19 Pages

    increases, more and more data gets shared, thus further increasing the risk of a data breach,…

    • 4525 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    plus radiologist or specialist’s inference could be embedded into medical images as watermark data so that error probability decreases. Watermarking methods could be classified into blind and non-blindbased on the information required at the detector to extract the watermark. In blind methods, which are also known as public watermarking schemes and are the most challenging type of watermarking systems, neither the host image nor watermark content are needed to extractthe watermark whereas in non-blind methods, which are also called private watermarking schemes, both the host image and embedded watermark contents are required to extract the watermark. It is clear that the non-blind methods offer better robustness compared to blind methods, but in the case when it is hard to get the original cover and watermark image forwatermark extraction, the blind methods are more desired. The watermarking schemes can alsobe categorized as spatial domain or frequency domain techniques depending on embedding of watermark contents into host image is done either in spatial or in transform…

    • 1123 Words
    • 5 Pages
    Better Essays

Related Topics