Natural Steganography in JPEG Compressed Images
Document type :
Autre communication scientifique (congrès sans actes - poster - séminaire...): Communication dans un congrès avec actes
Title :
Natural Steganography in JPEG Compressed Images
Author(s) :
Denemark, Tomáš [Auteur]
Binghamton University [SUNY]
Bas, Patrick [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Fridrich, Jessica [Auteur]
Binghamton University [SUNY]
Binghamton University [SUNY]
Bas, Patrick [Auteur]

Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Fridrich, Jessica [Auteur]
Binghamton University [SUNY]
Conference title :
Electronic Imaging
City :
San Francisco
Country :
Etats-Unis d'Amérique
Start date of the conference :
2018-01-29
HAL domain(s) :
Sciences de l'ingénieur [physics]/Traitement du signal et de l'image [eess.SP]
English abstract : [en]
In natural steganography, the secret message is hidden by adding to the cover image a noise signal that mimics the het-eroscedastic noise introduced naturally during acquisition. The method requires the cover image to be ...
Show more >In natural steganography, the secret message is hidden by adding to the cover image a noise signal that mimics the het-eroscedastic noise introduced naturally during acquisition. The method requires the cover image to be available in its RAW form (the sensor capture). To bring this idea closer to a practical embedding method, in this paper we embed the message in quantized DCT coefficients of a JPEG file by adding independent realiza-tions of the heteroscedastic noise to pixels to make the embedding resemble the same cover image acquired at a larger sensor ISO setting (the so-called cover source switch). To demonstrate the feasibility and practicality of the proposed method and to validate our simplifying assumptions, we work with two digital cameras , one using a monochrome sensor and a second one equipped with a color sensor. We then explore several versions of the embedding algorithm depending on the model of the added noise in the DCT domain and the possible use of demosaicking to convert the raw image values. These experiments indicate that the demo-saicking step has a significant impact on statistical detectability for high JPEG quality factors when making independent embedding changes to DCT coefficients. Additionally, for monochrome sensors or low JPEG quality factors very large payload can be embedded with high empirical security.Show less >
Show more >In natural steganography, the secret message is hidden by adding to the cover image a noise signal that mimics the het-eroscedastic noise introduced naturally during acquisition. The method requires the cover image to be available in its RAW form (the sensor capture). To bring this idea closer to a practical embedding method, in this paper we embed the message in quantized DCT coefficients of a JPEG file by adding independent realiza-tions of the heteroscedastic noise to pixels to make the embedding resemble the same cover image acquired at a larger sensor ISO setting (the so-called cover source switch). To demonstrate the feasibility and practicality of the proposed method and to validate our simplifying assumptions, we work with two digital cameras , one using a monochrome sensor and a second one equipped with a color sensor. We then explore several versions of the embedding algorithm depending on the model of the added noise in the DCT domain and the possible use of demosaicking to convert the raw image values. These experiments indicate that the demo-saicking step has a significant impact on statistical detectability for high JPEG quality factors when making independent embedding changes to DCT coefficients. Additionally, for monochrome sensors or low JPEG quality factors very large payload can be embedded with high empirical security.Show less >
Language :
Anglais
Peer reviewed article :
Oui
Audience :
Internationale
Popular science :
Non
Collections :
Source :
Files
- https://hal.archives-ouvertes.fr/hal-01687194/document
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-01687194/document
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-01687194/document
- Open access
- Access the document
- document
- Open access
- Access the document
- EI_long_version_20_Final.pdf
- Open access
- Access the document