Abstract
This paper proposes an extension of DCT-based Mod4 steganographic method to realize multiple messages embedding (MME). To implement MME, we utilize the structural feature of Mod4 that uses vGQC ( valid group of 2 ×2 adjacent quantized DCT coefficients) as message carrier. vGQC’s can be partitioned into several disjoint sets by differentiating the parameters where each set could serve as an individual secret communication channel. A maximum number of 14 independent messages can be embedded into a cover image without interfering one message and another. We can generate stego images with image quality no worse than conventional Mod4. Results for blind steganalysis are also shown.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Katzenbeisser, S., Petitcolas, F.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers (2000)
Matsui, K., Tanaka, K.: Video steganography: - how to secretly embed a signature in a picture. In: IMA Intellectual Property Project Proceedings, vol. 1, pp. 187–206 (1994)
Provos, N.: Defending against statistical steganalysis. In: Proceeding of the 10th USENIX Security Symposium, pp. 323–335 (2001)
Westfeld, A.: F5-A steganographic algorithm - high capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)
Iwata, M., Miyake, K., Shiozaki, A.: Digital steganography utilizing features of JPEG images. IEICE Transaction Fundamentals E87-A, 929–936 (2004)
Qi, X., Wong, K.: A novel mod4-based steganographic method. In: International Conference Image Processing ICIP, Genova, Italy, pp. 297–300 (2005)
Fridrich, J.: Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)
Wang, Z., Bovik, A.: A universal image quality index. IEEE Signal Processing Letters 9, 81–84 (2002)
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Fridrich, J., Goljan, M., Hogea, D.: Attacking the outguess. In: Proceeding of the ACM Workshop on Multimedia and Security, Juan-les-Pins, France, pp. 967–982 (2002)
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wong, K., Tanaka, K., Qi, X. (2006). Multiple Messages Embedding Using DCT-Based Mod4 Steganographic Method. In: Gunsel, B., Jain, A.K., Tekalp, A.M., Sankur, B. (eds) Multimedia Content Representation, Classification and Security. MRCS 2006. Lecture Notes in Computer Science, vol 4105. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11848035_10
Download citation
DOI: https://doi.org/10.1007/11848035_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-39392-4
Online ISBN: 978-3-540-39393-1
eBook Packages: Computer ScienceComputer Science (R0)