Framework for improving the security performance of ordinary distortion functions of JPEG steganography
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Huang, Fangjun | - |
dc.contributor.author | Kim, Hyoung Joong | - |
dc.date.accessioned | 2021-09-04T04:27:59Z | - |
dc.date.available | 2021-09-04T04:27:59Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2016-01 | - |
dc.identifier.issn | 1380-7501 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/89929 | - |
dc.description.abstract | Digital steganography is a new approach for secure communication. Via using it, the sender and the receiver can easily exchange secret message on the Internet without arousing any suspicion. Previously, a lot of ordinary distortion functions for joint photographic experts group (JPEG) steganography have been presented, which can guide the message embedding in the non-zero alternating current (AC) discrete cosine transform (DCT) coefficients of JPEG image. In this paper, we present a framework for improving the security performance of these distortion functions. In our new framework, these ordinary distortion functions are not restricted to evaluating the distortion values of non-zero AC DCT coefficients any more, and their coverage areas will be extended to all DCT coefficients, including the direct current (DC) coefficients and all the zero and non-zero AC coefficients. All the coefficients in JPEG image are divided into two groups: changeable group (CG) and reserve group (RG), respectively. The coefficients that may result in less detectable distortion are grouped into CG and the rest into RG. Via associating the distortion values to coefficients in CG and RG with different strategies, a series of new advanced distortion functions can be generated. The experimental results demonstrate that while applying these advanced distortion functions to JPEG steganography, the statistical characteristics of the carrier image will be preserved better than the prior art, and consequently secure JPEG steganographic schemes can easily be obtained. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.subject | STEGANALYSIS | - |
dc.subject | FEATURES | - |
dc.subject | SCHEME | - |
dc.title | Framework for improving the security performance of ordinary distortion functions of JPEG steganography | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Hyoung Joong | - |
dc.identifier.doi | 10.1007/s11042-014-2291-9 | - |
dc.identifier.scopusid | 2-s2.0-84953635987 | - |
dc.identifier.wosid | 000367856500015 | - |
dc.identifier.bibliographicCitation | MULTIMEDIA TOOLS AND APPLICATIONS, v.75, no.1, pp.281 - 296 | - |
dc.relation.isPartOf | MULTIMEDIA TOOLS AND APPLICATIONS | - |
dc.citation.title | MULTIMEDIA TOOLS AND APPLICATIONS | - |
dc.citation.volume | 75 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 281 | - |
dc.citation.endPage | 296 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | STEGANALYSIS | - |
dc.subject.keywordPlus | FEATURES | - |
dc.subject.keywordPlus | SCHEME | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Steganography | - |
dc.subject.keywordAuthor | Distortion function | - |
dc.subject.keywordAuthor | JPEG | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.