Ternary data hiding technique for JPEG steganography

Vasily Sachnev, Hyong Joong Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

In this paper we present JPEG steganography method based on hiding data to the stream of ternary coefficients. In the proposed method each nonzero DCT coefficient is converted to the corresponding ternary coefficient. The block of 3 m - 1 ternary coefficients is used for hiding m ternary messages by modifying one or two coefficients. Due to higher information density of the ternary coefficients, the proposed method has many solutions for hiding necessary data. Such a big choice enables to choose coefficients with lowest distortion impact. As a result, the proposed methods have better data hiding performance compared to the existing steganographic methods based on hiding data to stream of binary coefficients like matrix encoding (F5) and modified matrix encoding (MME). The proposed methods were tested with steganalysis method proposed by T. Pevny and J.Fridrich. The experimental results show that the proposed method has less detectability compared to MME (modified matrix encoding).

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages202-210
Number of pages9
Volume6526 LNCS
DOIs
Publication statusPublished - 2011 Feb 1
Event9th International Workshop on Digital Watermarking, IWDW 2010 - Seoul, Korea, Republic of
Duration: 2010 Oct 12010 Oct 3

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6526 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other9th International Workshop on Digital Watermarking, IWDW 2010
CountryKorea, Republic of
CitySeoul
Period10/10/110/10/3

Fingerprint

Steganography
Data Hiding
Ternary
Coefficient
Encoding
Steganalysis
Detectability
Lowest
Choose
Binary
Necessary
Experimental Results

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Sachnev, V., & Kim, H. J. (2011). Ternary data hiding technique for JPEG steganography. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6526 LNCS, pp. 202-210). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6526 LNCS). https://doi.org/10.1007/978-3-642-18405-5-17

Ternary data hiding technique for JPEG steganography. / Sachnev, Vasily; Kim, Hyong Joong.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6526 LNCS 2011. p. 202-210 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6526 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sachnev, V & Kim, HJ 2011, Ternary data hiding technique for JPEG steganography. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 6526 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6526 LNCS, pp. 202-210, 9th International Workshop on Digital Watermarking, IWDW 2010, Seoul, Korea, Republic of, 10/10/1. https://doi.org/10.1007/978-3-642-18405-5-17
Sachnev V, Kim HJ. Ternary data hiding technique for JPEG steganography. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6526 LNCS. 2011. p. 202-210. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-18405-5-17
Sachnev, Vasily ; Kim, Hyong Joong. / Ternary data hiding technique for JPEG steganography. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6526 LNCS 2011. pp. 202-210 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{6e216aff240b4c2dbbeb7322ff319ac6,
title = "Ternary data hiding technique for JPEG steganography",
abstract = "In this paper we present JPEG steganography method based on hiding data to the stream of ternary coefficients. In the proposed method each nonzero DCT coefficient is converted to the corresponding ternary coefficient. The block of 3 m - 1 ternary coefficients is used for hiding m ternary messages by modifying one or two coefficients. Due to higher information density of the ternary coefficients, the proposed method has many solutions for hiding necessary data. Such a big choice enables to choose coefficients with lowest distortion impact. As a result, the proposed methods have better data hiding performance compared to the existing steganographic methods based on hiding data to stream of binary coefficients like matrix encoding (F5) and modified matrix encoding (MME). The proposed methods were tested with steganalysis method proposed by T. Pevny and J.Fridrich. The experimental results show that the proposed method has less detectability compared to MME (modified matrix encoding).",
author = "Vasily Sachnev and Kim, {Hyong Joong}",
year = "2011",
month = "2",
day = "1",
doi = "10.1007/978-3-642-18405-5-17",
language = "English",
isbn = "9783642184048",
volume = "6526 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "202--210",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Ternary data hiding technique for JPEG steganography

AU - Sachnev, Vasily

AU - Kim, Hyong Joong

PY - 2011/2/1

Y1 - 2011/2/1

N2 - In this paper we present JPEG steganography method based on hiding data to the stream of ternary coefficients. In the proposed method each nonzero DCT coefficient is converted to the corresponding ternary coefficient. The block of 3 m - 1 ternary coefficients is used for hiding m ternary messages by modifying one or two coefficients. Due to higher information density of the ternary coefficients, the proposed method has many solutions for hiding necessary data. Such a big choice enables to choose coefficients with lowest distortion impact. As a result, the proposed methods have better data hiding performance compared to the existing steganographic methods based on hiding data to stream of binary coefficients like matrix encoding (F5) and modified matrix encoding (MME). The proposed methods were tested with steganalysis method proposed by T. Pevny and J.Fridrich. The experimental results show that the proposed method has less detectability compared to MME (modified matrix encoding).

AB - In this paper we present JPEG steganography method based on hiding data to the stream of ternary coefficients. In the proposed method each nonzero DCT coefficient is converted to the corresponding ternary coefficient. The block of 3 m - 1 ternary coefficients is used for hiding m ternary messages by modifying one or two coefficients. Due to higher information density of the ternary coefficients, the proposed method has many solutions for hiding necessary data. Such a big choice enables to choose coefficients with lowest distortion impact. As a result, the proposed methods have better data hiding performance compared to the existing steganographic methods based on hiding data to stream of binary coefficients like matrix encoding (F5) and modified matrix encoding (MME). The proposed methods were tested with steganalysis method proposed by T. Pevny and J.Fridrich. The experimental results show that the proposed method has less detectability compared to MME (modified matrix encoding).

UR - http://www.scopus.com/inward/record.url?scp=79251539859&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79251539859&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-18405-5-17

DO - 10.1007/978-3-642-18405-5-17

M3 - Conference contribution

AN - SCOPUS:79251539859

SN - 9783642184048

VL - 6526 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 202

EP - 210

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -