Abstract
In this paper, a channel selection rule for YASS (Yet-Another-Secure-Steganography) is proposed. Secret message embedding imposes distortion to the cover image. The larger the distortion, the less secure the steganographic algorithm. Our channel selection rule engages in minimizing this distortion brought in by YASS. In our rule, the distortion caused by unit change on each quantized DCT (Discrete Cosine Transformation) component is computed, and the components with smaller unit change distortion are selected with higher priority. This channel selection rule reduces distortion to the medium spatial domain image and the final JPEG image. Experimental results show that our improved YASS scheme outperforms original YASS scheme on the aspects of both perception and statistics. This new channel selection rule can also be combined with other enhancements in YASS framework to further boost the performance.
Similar content being viewed by others
References
Solanki K, Sarkar A, Manjunath B S. YASS: Yet another steganographic scheme that resists blind steganalysis. In: Proc Springer Int Workshop Information Hiding. Saint Malo, 2007. 16–31
Sarkar A, Solanki K, Manjunath B S. Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis. In: Proc SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, California, 2008. 6819: 681917–681917-11
Yu L, Zhao Y, Ni R, et al. A high-performance YASS-like scheme using randomized big-blocks. In: Proc IEEE Int Conf Multimedia & Expo, 2010. 474–479
Lv X, Ma L, Tian J. An improved YASS approach using irregular host-blocks and modified quantization index modulation. In: Proc Int Conf Intelligent Infromation Hiding and Multimedia Signal Processing, 2012. 309–312
Ma L, Lv X, Tian J. Modified YASS algorithm with virtual host block selectioin and model based embedding. In: Proc Int Conf Industrial Electronics and Applications, 2012. 73–78
Li B, Huang J, Shi Y Q. Steganalysis of YASS. IEEE Trans Info Forensics and Security, 2009, 4: 369–382
Sarkar A, Manjunath B S. Double embedding in the quantization index modulation framework. In: Proc IEEE Int Conf Image Processing, 2009. 3653–3656
Sarkar A, Madhow U, Manjunath B S. Matrix embedding with pseudorandom coefficient selection and error correction for robust and secure steganography. IEEE Trans Inf Forensics and Security, 2010, 5: 225–239
Kodovský J, Fridrich J. Calibration revisited. In: Proc ACM Workshop Multimedia and Security, New York, 2009. 63–74
Yu X, Babaguchi N. Breaking the YASS algorithm via pixel and dct coefficients analysis. In: Proc IEEE Int Conf Pattern Recognition, Tampa, Florida, 2008. 1–4
Kodovský J, Pevný T, Fridrich J. Modern steganalysis can detect YASS. In: Proc SPIE Media Forensics and Security, 2010. 754102
Yang X, Zhang W. Effective steganalysis of YASS based on statistical moments of wavelet characteristic functioin on Markov process. In: Proc Int Conf Computer Science and Electronics Engineering, 2012. 606–610
Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG images: Breaking the F5 algorithm. In: Proc Springer Int Workshop on Information Hiding, Noordwijkerhout, 2002. 310–323
Fridrich J, Goljan M, Hogea D. Attacking the OutGuess. In: Proc ACM Workshop Multimedia and Security, Frances: Juan-les-Pins, 2002. 3–6
Shi Y Q, Sun H. Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms and Standards, 1st ed. Boca Raton: CRC Press, 1999.
Chen C, Shi Y Q. JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Proc IEEE Int Symposium Circuits and Systems, Seattle, Washington, 2008. 3029–3032
NRCS, NRCS photo gallery. In: http://photogallery.nrcs.usda.gov.
Author information
Authors and Affiliations
Corresponding author
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Yu, L., Zhao, Y., Ni, R. et al. A channel selection rule for YASS. Sci. China Inf. Sci. 57, 1–10 (2014). https://doi.org/10.1007/s11432-014-5106-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-014-5106-8