A steganographic method based upon JPEG and particle swarm optimization algorithm

被引:110
作者
Li, Xiaoxia [1 ]
Wang, Jianjun [1 ]
机构
[1] Fudan Univ, Dept Elect Engn, Shanghai 200433, Peoples R China
基金
中国国家自然科学基金;
关键词
JPEG; steganography; information hiding; particle swarm optimization (PSO) algorithm; jpeg-[!text type='js']js[!/text]teg;
D O I
10.1016/j.ins.2007.02.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel steganographic method, based on JPEG and Particle Swarm Optimization algorithm (PSO), is proposed. In order to improve the quality of stego-images, an optimal substitution matrix for transforming the secret messages is first derived by means of the PSO algorithm. The standard JPEG quantization table is also modified to contain more secret messages. The transformed messages are then hidden in the DC-to-middle frequency components of the quantized DCT coefficients of the cover-image. Finally, a JPEG file with secret messages is generated through JPEG entropy coding. We compare our algorithm with Chang et al.'s JPEG-based steganographic algorithm. The experimental results show that our proposed method has larger message capacity and better image quality than Chang et al.'s. In addition, our method also has a high security level. (c) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:3099 / 3109
页数:11
相关论文
共 15 条
[1]  
[Anonymous], JPEG JSTEG V4
[2]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[3]   A steganographic method based upon JPEG and quantization table modification [J].
Chang, CC ;
Chen, TS ;
Chung, LZ .
INFORMATION SCIENCES, 2002, 141 (1-2) :123-138
[4]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[5]   Comparison among five evolutionary-based optimization algorithms [J].
Elbeltagi, E ;
Hegazy, T ;
Grierson, D .
ADVANCED ENGINEERING INFORMATICS, 2005, 19 (01) :43-53
[6]   Digital image watermarking using balanced multiwavelets [J].
Ghouti, L ;
Bouridane, A ;
Ibrahim, MK ;
Boussakta, S .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (04) :1519-1536
[7]   Embedding image watermarks in DC components [J].
Huang, JW ;
Shi, YQ ;
Shi, Y .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2000, 10 (06) :974-979
[8]  
Kennedy J, 1995, 1995 IEEE INTERNATIONAL CONFERENCE ON NEURAL NETWORKS PROCEEDINGS, VOLS 1-6, P1942, DOI 10.1109/icnn.1995.488968
[9]   High-performance JPEG steganography using quantization index modulation in DCT domain [J].
Noda, H ;
Niimi, M ;
Kawaguchi, E .
PATTERN RECOGNITION LETTERS, 2006, 27 (05) :455-461
[10]  
PENNEBAKER WB, 1993, JPEG STILL IMAGE DAT