Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Multiple Messages Embedding Using DCT-Based Mod4 Steganographic Method

  • Conference paper
Multimedia Content Representation, Classification and Security (MRCS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4105))

Abstract

This paper proposes an extension of DCT-based Mod4 steganographic method to realize multiple messages embedding (MME). To implement MME, we utilize the structural feature of Mod4 that uses vGQC ( valid group of 2 ×2 adjacent quantized DCT coefficients) as message carrier. vGQC’s can be partitioned into several disjoint sets by differentiating the parameters where each set could serve as an individual secret communication channel. A maximum number of 14 independent messages can be embedded into a cover image without interfering one message and another. We can generate stego images with image quality no worse than conventional Mod4. Results for blind steganalysis are also shown.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Katzenbeisser, S., Petitcolas, F.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers (2000)

    Google Scholar 

  2. Matsui, K., Tanaka, K.: Video steganography: - how to secretly embed a signature in a picture. In: IMA Intellectual Property Project Proceedings, vol. 1, pp. 187–206 (1994)

    Google Scholar 

  3. Provos, N.: Defending against statistical steganalysis. In: Proceeding of the 10th USENIX Security Symposium, pp. 323–335 (2001)

    Google Scholar 

  4. Westfeld, A.: F5-A steganographic algorithm - high capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Iwata, M., Miyake, K., Shiozaki, A.: Digital steganography utilizing features of JPEG images. IEICE Transaction Fundamentals E87-A, 929–936 (2004)

    Google Scholar 

  7. Qi, X., Wong, K.: A novel mod4-based steganographic method. In: International Conference Image Processing ICIP, Genova, Italy, pp. 297–300 (2005)

    Google Scholar 

  8. Fridrich, J.: Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Wang, Z., Bovik, A.: A universal image quality index. IEEE Signal Processing Letters 9, 81–84 (2002)

    Article  Google Scholar 

  10. Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  11. Fridrich, J., Goljan, M., Hogea, D.: Attacking the outguess. In: Proceeding of the ACM Workshop on Multimedia and Security, Juan-les-Pins, France, pp. 967–982 (2002)

    Google Scholar 

  12. Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wong, K., Tanaka, K., Qi, X. (2006). Multiple Messages Embedding Using DCT-Based Mod4 Steganographic Method. In: Gunsel, B., Jain, A.K., Tekalp, A.M., Sankur, B. (eds) Multimedia Content Representation, Classification and Security. MRCS 2006. Lecture Notes in Computer Science, vol 4105. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11848035_10

Download citation

  • DOI: https://doi.org/10.1007/11848035_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-39392-4

  • Online ISBN: 978-3-540-39393-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics