An algorithm for  information embedding into compressed digital images based on replacement  procedures with use of optimization
O.O. Evsutin, A.A. Shelupanov, R.V. Meshcheryakov,  D.O. Bondarenko
   
  Tomsk State University of Control Systems and  Radioelectronics, Tomsk, Russia
Full text of article: Russian language.
 PDF
  PDF
Abstract:
In the paper, we  consider a particular direction of digital steganography  — information embedding into the compressed  JPEG images. A scheme of information embedding based on procedures of  DCT-coefficients replacement is introduced. Variants of the scheme algorithmic  implementation are offered and investigated. A genetic algorithm is used for  the improvement of the embedding quality. The main result of the investigation  is a steganographic algorithm of information embedding into the compressed JPEG  images. This algorithm utilizes an unstable region of embedding at the level of  one block of DCT-coefficients. The choice of an optimum region of embedding is  performed by the genetic algorithm. 
Keywords:
information security, digital steganography, data hiding, digital images, JPEG.
Citation:
Evsutin  OO, Shelupanov AA, Meshcheryakov RV, Bondarenko DO. An algorithm for  information embedding into compressed digital images based on replacement  procedures with use of optimization. Computer Optics 2017; 41(3): 412-421. DOI:  10.18287/2412-6179-2017-41-3-412-421.
References:
  - Fridrich J. Steganography in digital  media: Principles, algorithms, and applications. Cambridge: Cambridge University  Press; 2010. ISBN: 978-0-521-19019-0.
- Fedoseev VA. A unified model for  information hiding systems [In Russian]. Computer Optics 2016; 40(1): 87-98. DOI: 10.18287/2412-6179-2016-40-1-87-98. 
- Yu L, Zhao Y, Ni R, Zhu Z. PM1  steganography in JPEG images using genetic algorithm. Soft Computing 2009;  13(4): 393-400. DOI: 10.1007/s00500-008-0327-7.
- Evsutin OO, Kokurina AS, Shelupanov  AA, Shepelev II. Improved algorithm for data hiding in compressed digital  images based on PM1 method [In Russian]. Computer Optics 2015; 39(4): 572-581. DOI:  10.18287/0134-2452-2015-39-4-572-581. 
- Li F, Zhang X, Yu J, Shen W. Adaptive JPEG steganography  with new distortion function. Annals of Telecommunications 2014; 69(7):  431-440. DOI: 10.1007/s12243-013-0415-2.
- Nikolaidis A. Low overhead reversible  data hiding for color JPEG images. Multimedia Tools and Applications 2016; 75(4): 1869-1881. DOI:  10.1007/s11042-014-2377-4. 
- Noda H, Niimi M, Kawaguchi E. High-performance JPEG steganography using  quantization index modulation in DCT domain. Pattern Recognition Letters 2006;  27(5): 455-461. DOI: 10.1016/j.patrec.2005.09.008.
- Chen B, Wornell GW. Quantization  index modulation: a class of provably good methods for digital watermarking and  information embedding. IEEE Transactions on Information Theory 2001; 47(4):  1423-1443. DOI: 10.1109/18.923725.
- Glumov NI, Mitekin VS. A new  semi-fragile watermarking algorithm for image authentication and information hiding [In Russian]. Computer Optics 2011; 35(2): 262-267. 
- Wang K, Lu ZM, Hu YJ.  A  high capacity lossless data hiding scheme for JPEG images. The Journal of  Systems and Software 2013; 86(7): 1965-1975. DOI: 10.1016/j.jss.2013.03.083.
- Jiang C, Pang Y, Xiong S. A high  capacity steganographic method based on quantization table modification and F5  algorithm. Circuits, Systems, and Signal Processing 2013; 33(5): 1611-1626. DOI:  10.1007/s00034-013-9703-3.
- Westfeld A. F5 – a steganographic  algorithm. High capacity despite better steganalysis. Proceedings of the 4th  International Workshop on Information Hiding (IH 2001), USA, PA, Pittsburgh.  2001: 289-302. 
- Chang C-C, Chen T-S, Chung L-Z. A steganographic method based upon  JPEG and quantization table modi?cation. Information Sciences  2002; 141(1-2): 123-138. DOI: 10.1016/S0020-0255(01)00194-3.
- Li X, Wang  J. A steganographic method based upon JPEG and particle swarm optimization  algorithm. Information Sciences 2007; 177(15): 3099-3109. DOI:  10.1016/j.ins.2007.02.008.
- Jiang C, Pang Y, Guo L, Jing B, Gong X. A high capacity steganographic method  based on quantization table modification. Wuhan University Journal of Natural  Sciences 2011; 16(3): 223-227. DOI:  10.1007/s11859-011-0740-0.
- The USC-SIPI image database. Source: <http://sipi.usc.edu/database/>. 
-   Andriotis P, Oikonomou  G, Tryfonas T. JPEG steganography detection with Benford’s Law. Digital  Investigation 2013: 9(3-4); 246-257. DOI: 10.1016/j.diin.2013.01.005. 
  
  © 2009, IPSI RAS
  Institution of Russian  Academy of Sciences, Image Processing  Systems Institute of RAS, Russia,  443001, Samara, Molodogvardeyskaya Street 151; E-mail: journal@computeroptics.ru; Phones: +7 (846) 332-56-22, Fax: +7 (846) 332-56-20