Professional Documents
Culture Documents
www.elsevier.com/locate/pr
Received 12 June 2006; received in revised form 27 April 2007; accepted 3 March 2008
Abstract
A high-performance JPEG steganography should be secure enough to resist modern steganalysis. In this paper, we propose a high-performance
JPEG steganographic method. The proposed method adopts the complementary embedding strategy to avoid the detections of several statistical
attacks. To show the effectiveness of the proposed method, several statistical attacks are simulated and used to detect the stego-images created
by the proposed method. Several famous JPEG steganographic algorithms are also simulated for comparisons with the proposed method.
Experimental results show that the proposed steganographic method has superior performance both in capacity and security, and is practical
for the application of secret communication.
䉷 2008 Elsevier Ltd. All rights reserved.
Keywords: Image hiding; JPEG steganography; Chi-square family attack; S family attack; Statistical steganalysis; Complementary embedding
hiding techniques for JPEG images have been proposed, such as mission. In the first pass, the secret bits are embedded in the
J-Steg [18], F5 [16], and OutGuess [17]. They are usually called LSBs of the quantized DCT coefficients (skipping 0s and 1s)
the JPEG steganography or the JPEG steganographic methods along a random walk. In the second pass, the histogram of the
which use the DCT coefficients to embed the secret bits, and stego-image is adjusted to match that of the cover-image. Be-
will be mentioned alternately in the rest of this paper. As we cause the histogram of the final stego-image is similar to that of
know, the JPEG compression is based on the discrete cosine the cover-image, the stego-image created by the OutGuess al-
transform (DCT), and reduces the visual redundancy to achieve gorithm can avoid the detection of the chi-square family attack.
good compression performance. Therefore, the embedding ca- Although stego-images created by the F5 algorithm or the
pacity provided by JPEG steganography is relatively smaller OutGuess algorithm can survive the chi-square family attack,
than those provided by the other steganographic methods. In they can be detected by a special steganalytic method proposed
this paper, our discussions focus on the JPEG steganography. by Fridrich et al. [32]. The most important part of their method
Generally, there are potentially two basic requirements for is to obtain the approximation of the cover-image. This is done
a secure image hiding system. First, the secret data embedded by decompressing the stego-image, cropping by four pixels in
in the stego-image should be perceptually invisible. Secondly, each direction, and recompressing using the same quantiza-
the receiver can exactly recover the original data without the tion table. The estimated cover-image possesses many statisti-
knowledge of the cover-image. These requirements can be eas- cal properties that approximately equal to those of the original
ily achieved by LSB insertion methods that embed the secret cover-image. These statistical properties can be used to design
data in the cover-image by directly replacing the least signifi- the distinguishing statistic S that also predictably changes with
cant bit (LSB) in spatial domain or frequency domain. For ex- the embedded message length. The unknown message length is
ample, the JPEG steganographic tool J-Steg embeds the secret therefore can be obtained by comparing the values of S for the
data by sequentially flipping the LSB of the quantized DCT stego-image and the estimated cover-image. This kind of ste-
coefficients (except 0s and 1s) without causing detectable ar- ganalysis has been successfully developed to detect the length
tificial distortion. Unfortunately, modern steganalysis tries to of the secret bits embedded by the F5 and the OutGuess algo-
discover hidden data by examining the statistical properties of rithms. We refer to the method used to break the F5 as the S1
stego-images. Therefore, many existing steganographic tech- attack, and OutGuess, the S2 attack, in the rest of this paper.
niques seem to be insecure when modern steganalysis is em- We also briefly use the S family attack to represent both attacks
ployed to test their security. together.
Westfeld and Pfitzmann [31] proposed a steganalytic method In this paper, we propose a secure and high-capacity JPEG
based on statistical analysis of Pairs of Values (PoVs) that are steganography. Instead of flipping the LSBs of the DCT co-
exchanged during message embedding. They observed that the efficients, the secret bits are embedded in the cover-image by
embedding function replacing LSBs transforms PoVs into each subtracting one from or adding one to the non-zero DCT coeffi-
other which only differ in the LSB. If the secret bits used for cients. Therefore, the proposed steganographic method cannot
replacing the LSBs are equally distributed, the frequencies of be detected by both the chi-square and the extended chi-square
both values of each PoV become equal. Based on this obser- attacks. Moreover, a complementary strategy is also included
vation, they proposed a statistical method to automatically cal- in the proposed method to defend the S1 and S2 attacks.
culate the similarity of PoVs of the stego-image. Their method To completely describe the proposed steganographic tech-
is generally known as the chi-square attack and provides very nique, the rest of this paper is organized as follows. In Section
reliable results when the LSB placement is known (e.g., the 2, the JPEG compression technique is briefly reviewed. The
sequential embedding). Therefore, the data embedded by the proposed embedding and extraction processes are described
J-Steg can be detected by chi-square attack. Actually, the chi- in Section 3. Several experimental results are demonstrated
square attack can be slightly modified to successfully detect in Section 4 to show the effectiveness of the proposed JPEG
randomly scattered data by applying the same idea to smaller steganography. Section 5 justifies the significance that the pro-
portions of the stego-image [17]. The modified chi-square at- posed method can resist both S1 and S2 attacks. Section 6 con-
tack is especially referred to as the extended chi-square attack cludes this work.
in the rest of this paper. We also briefly use the chi-square fam-
ily attack to represent both attacks together.
To provide a secure and high-capacity JPEG steganography, 2. Review of JPEG compression
Westfeld [16] proposed the F5 algorithm in 2001. Instead of
replacing the LSBs of the quantized DCT coefficients with the Because the proposed steganographic method is a JPEG-
secret bits, the absolute value of the coefficient is decreased based steganography, we briefly describe the JPEG compression
by 1. Besides, the F5 algorithm randomly chooses DCT coeffi- technique in this section.
cients to embed the secret bits. Combining these two strategies,
the F5 algorithm successfully defends both the chi-square and
the extended chi-square attacks. Original Entropy Compressed
FDCT Quantization code
In the same year, Provos [17] also proposed the OutGuess image encoding
steganographic algorithm to counter the chi-square family at-
tack. The OutGuess uses two passes to achieve the embedding Fig. 1. The block diagram of the JPEG compression process.
C.-L. Liu, S.-R. Liao / Pattern Recognition 41 (2008) 2945 – 2955 2947
JPEG is an international standard for continuous-tone still tary strategy to reduce the loss of statistical property of the
image compression which has been approved by International cover-image. This purpose is achieved by dividing the quan-
Standard Organization (ISO) under the denomination of Inter- tized DCT coefficients and the secret bits into two parts ac-
national Standard-10918 (IS-10918) [33]. The JPEG compres- cording to a predefined partition ratio. The two parts of DCT
sion is based on the DCT and allows substantial compression to coefficients are used to embed the corresponding parts of se-
be achieved while producing a reconstructed image with high cret bits with different embedding algorithms. Specifically, the
visual fidelity. secret bits are embedded by subtracting one from one part of
Fig. 1 shows the JPEG encoding process which comprises coefficients, and adding one to the other part of coefficients.
three major steps: forward DCT (FDCT), quantization, and en- Specially, we call our proposed embedding algorithm the com-
tropy encoding. The input image is first divided into 8 × 8 plementary embedding. Moreover, because the proposed em-
non-overlapping blocks, and each block is transformed by the bedding algorithm is not an LSB insertion one, the proposed
FDCT into a set of 64 DCT coefficients. These coefficients are JPEG steganographic method can also resist the chi-square fam-
then quantized using a quantization table with 64 entries. The ily attack.
quantized results are all integers and defined as the division of The proposed stegnographic method comprises an embed-
each DCT coefficient by its corresponding quantization value, ding process and an extraction process. The details of the em-
and rounding to the nearest integer. bedding and extraction process are described in the following
The quantization step is lossy because of the rounding error. subsections.
The quantized coefficients are then passed to the entropy en-
coding step to form the compressed code. One of two tables 3.1. Embedding process
must be provided in this step according to different entropy
coding schemes. If Huffman encoding is used, a Huffman table The proposed embedding process is integrated with JPEG
must be provided. If arithmetic encoding is used, an arithmetic encoding process. Fig. 3 shows the block diagram of the em-
coding conditioning table must be provided. It should be noted bedding process. The raw data of the cover-image is first trans-
that the entropy encoding step is lossless. formed by DCT. The DCT coefficients are then quantized and
The JPEG decoding process is shown in Fig. 2, and also rounded to the nearest integers. A stego-key, which provides
comprises three major steps: entropy decoding, dequantization, the major security of the embedding algorithm, is then used to
and inverse DCT (IDCT). Each step in decoding process per- permute the DCT coefficients. The permuted coefficients are
forms essentially the inverse of its corresponding step in en- then divided into two parts according to a predefined separa-
coding procedure. The entropy decoding step decodes the com- tion ratio which serves an important parameter to reduce the
pressed code to the quantized DCT coefficients. The dequanti- loss of statistical property of the cover-image resulted from the
zation step then converts each quantized DCT coefficient to its follow-up secret-bits embedding process.
approximate value by multiplying with its quantization value. On the other hand, the original message is encrypted to
DCT is then used to convert the dequantized coefficients to form the secret bits by using a crypto-key. The secret bits are
their spatial value. also divided into two parts according to the same separation
As mentioned above, the entropy encoding step in the JPEG ratio. Each part of secret bits is embedded in its correspond-
encoding process is lossless. It means that if the secret bits are ing part of the permuted non-zero DCT coefficients by us-
embedded in the quantized DCT coefficients, they will not be ing the proposed complementary embedding algorithm. The
destroyed by the follow-up encoding steps. Most of the JPEG two parts of the modified coefficients are then combined, de-
steganographic methods (such as J-Steg, F5, OutGuess, etc.) permutated, and entropy encoded to generate a JPEG stego-
adopt this strategy. In the next section, we propose a stegano- image. The details of the proposed embedding process are as
graphic method which also uses the quantized DCT coefficients follows.
to embed the secret bits.
Step 1: Transform the raw data of the cover-image (e.g., the
3. The proposed JPEG steganography luminance component) into DCT coefficients.
Step 2: Quantize the DCT coefficients, and round the quan-
In this section, a secure and high-capacity JPEG steganogra- tized coefficients to the nearest integers D.
phy is proposed. As mentioned previously, the S family attack Step 3: Use a stego-key K1 to permute the quantized coeffi-
obtains the approximate cover-image to break the F5 and Out- cients. That is,
Guess schemes. To counter the detection of such attack, the
proposed JPEG steganographic method adopts a complemen- Q = PERMK1 (D), (1)
2948 C.-L. Liu, S.-R. Liao / Pattern Recognition 41 (2008) 2945 – 2955
Stego-key
Crypto-key
Cryptographic Secret-bits Secret-bits
encryption separation embedding
Original
message
where DEPERM(·) is a key-dependent de-permutation It should be noted that, in most cases, we do not use all
function, and D denotes the de-permuted DCT co- the coefficients of Q1 and Q2 to embed S1 and S2 . There-
efficients. fore, in Steps 7 and 8, L1 and L2 are embedded prior to the
Step 13: Compress the D using entropy encoding to obtain embedding of S1 and S2 so that they can be extracted first to
the JPEG stego-image. inform the extraction algorithm to extract the exact size of S1
and S2 .
Table 2
The proposed E2 embedding algorithm
3.2. Extraction process
Algorithm: E2 embedding
Crypto-key Stego-key
Fig. 5. The test images used in our experiments: (a) Barb, (b) Boat, (c) F16, (d) Goldhill, (e) Lena, (f) Mandrill, (g) Peppers, (h) Tank, (i) Tiffany, and (j) Zelda.
C.-L. Liu, S.-R. Liao / Pattern Recognition 41 (2008) 2945 – 2955 2951
4.2. Imperceptibility test higher than 30 dB. It means that the proposed steganographic
method can provide good imperceptibility performance.
To test the imperceptibility performance, without loss of gen- To compare with the other steganographic methods, we em-
erality, we generated enough random bits with uniform distri- bedded the same amount of secret bits (the capacity of the Out-
bution to simulate the secret-bit sequence instead of using a Guess) in various cover-images using the J-Steg, the F5, the
specific encrypted plaintext. The secret bits were embedded in OutGuess, and the proposed method. Table 5 presents the com-
the cover-images with medium capacity (under 55 000 bits) us- parison of PSNR values of the stego-images created by various
ing different embedding rates. The separation ratio used in steganographic methods. It is clear that although more compli-
each embedding process was chosen as 4:1. Let x and y denote cated embedding strategy is adopted in the proposed method,
the cover-image and the stego-image, respectively. The imper- the PSNR values of the stego-images created by the proposed
ceptibility is evaluated by the objective quality measurement method are only slightly lower than those created by the other
PSNR (peak signal to noise ratio) [35]: steganographic methods.
2552 4.3. Chi-square-family-attack resistance test
PSNR = 10 × log (dB), (12)
MSE
The chi-square family attack explores the problem of PoV to
where MSE represents the mean square error between the cover- detect the secret bits embedded in the LSB of the stego-image.
image x and the stego-image y: The detection of the chi-square attack is achieved by sequen-
512
512 tially accumulating the similarity of PoVs. That is, if the secret
1 bits are embedded in the LSB of the stego-image, they could be
MSE = (xij − yij )2 . (13)
512 × 512 detected by the chi-square attack. Different from the chi-square
i=1 j =1
attack, the extended chi-square attack divides the stego-image
Table 4 presents the PSNR values of the stego-images cre- into blocks, and detects the secret bits by calculating the simi-
ated by the proposed method using various embedding rates. larity of PoVs in each block. If the chi-square attack is a global
In Table 4, the embedding rate is defined as method, the extended chi-square attack can be considered as a
actual embedding bits local method because it detects the secret bits in each block of
embedding rate = . (14) the stego-image independently.
embedding capacity
To avoid the detection of the chi-square and the extended chi-
It is clear that even the full capacities of the cover-images are square attacks, the proposed method does not adopt the LSB
used to embed the secret bits, the values of PSNRs are still replacement strategy. To show that the proposed steganographic
2952 C.-L. Liu, S.-R. Liao / Pattern Recognition 41 (2008) 2945 – 2955
Lena
80
60 Mandrill
Zelda
60 40
40 20
20 0
-20
0
-40
0 20 40 60 80 100 10 20 30 40 50 60 70 80 90 100
size of sample (%) embedding rate
Fig. 6. The detection results of the chi-square attack to the stego-images Fig. 8. The detection results of S1 attack for the stego-images created by the
created by the J-Steg algorithm and the proposed steganographic method. proposed steganographic method.
80
square family attack.
60
4.4. S-family-attack resistance test
40
The S family attack detects the length of the embedded se-
20 cret bits by estimating the approximate cover-image. In such a
method, it has successfully broken the F5 and the OutGuess
0 steganographic methods. The proposed method adopts the
complementary embedding strategy to reduce the loss of sta-
0 20 40 60 80 100 tistical property of the cover-image in spatial domain. The
size of sample (%) proposed complementary embedding divides the secret bits
and the DCT coefficients into two parts, respectively, by a pre-
Fig. 7. The detection results of the extended chi-square attack to the
defined separation ratio , and embeds each part of secret bits
stego-images created by the J-Steg algorithm and the proposed steganographic
method. into the corresponding part of DCT coefficients by comple-
mentary embedding algorithms. In our experiments, we found
that the proposed method can confuse the S family attack by
method can resist both the chi-square and the extended chi- using 31 51 together with an adjustment parameter . We
square attacks, we used the math tool MATLAB to simulate set = 41 and = 13 throughout the follow-up experiments if
both attacks. We used the proposed method to create the stego- no other values are explicitly assigned.
image of “Lena” with half embedding capacity, and used the To show that the proposed steganographic method can resist
chi-square and the extended chi-square attacks to detect the the S1 and the S2 attacks, we used the math tool MATLAB
stego-image. The same experiments were also performed on to simulate both attacks. We also used the proposed method
the stego-image created by the J-Steg method. to create the stego-images for several standard images with
Figs. 6 and 7 show the responses of the different stego- different texture properties using various embedding capacities,
images to the chi-square and the extended chi-square attacks, and then used the S1 and the S2 attacks to detect these stego-
respectively. In Fig. 6, it can be found that the chi-square attack images. Figs. 8 and 9 show the detection results, respectively.
has successfully detected the existence of the embedded secret For S1 attack, the same experiments were performed on the
bits in the first half of the DCT coefficients of the stego-image stego-images created by the F5 algorithm. The detection results
created by the J-Steg method. In Fig. 7, the extended chi-square are shown in Fig. 10. For S2 attack, the same experiments
attack has also successfully detected the existence of the secret were performed on the stego-images created by the OutGuess
bits in the first half of blocks of the stego-image created by the algorithm. The detection results are shown in Fig. 11. Table
J-Steg method. It is clear that in both figures, the stego-images 6 also provides the detection results of S1 and S2 attacks for
C.-L. Liu, S.-R. Liao / Pattern Recognition 41 (2008) 2945 – 2955 2953
Lena
60 Mandrill S1 attack (%) S2 attack (%)
Zelda
40 1
3.86 4.87
2
1
20 4 7.93 24.70
1
6 10.26 14.39
0
1
8 10.71 20.16
-20 1
11.67 27.67
10
-40
Goldhill
Lena
ent stego-images. Moreover, it may have negative results when
Mandrill the assumptions of the estimated original image and the prop-
80 Zelda erty of the stego-image have bias. This is why there are some
negative results appeared in Fig. 10 when embedding small
60
amount secret bits in image “Goldhill.” Similarly, because the
proposed method adopts quite different approach to embed se-
40
cret bits, it also destroys the assumptions of the S family attack
and results in quite unstable detection results including nega-
20
tive values as shown in Figs. 8 and 9.
0
10 20 30 40 50 60 70 80 90 100 5. Discussions
embedding rate
The S1 and S2 attacks are good statistical attacks. Although
Fig. 11. The detection results of S2 attack for the stego-images created by they were originally designed for breaking F5 and OutGuess,
the OutGuess embedding algorithm. they can also be used to break the other JPEG steganographic
2954 C.-L. Liu, S.-R. Liao / Pattern Recognition 41 (2008) 2945 – 2955
Table 7 Table 8
The detection results of S1 attack for the stego-images created by the Out- The detection results of S2 attack for the stego-images created by the J-Steg
Guess algorithm using various embedding rates algorithm using various embedding rates
Embedding rate (%) Test image Embedding rate (%) Test image
Goldhill (%) Lena (%) Mandrill (%) Zelda (%) Goldhill (%) Lena (%) Mandrill (%) Zelda (%)
Table 9
The detection results of S2 attack for the stego-images created by the F5
algorithm using various embedding rates
methods if the embedding strategy of any steganographic
method matches the detection strategy of S1 or S2. Embedding rate (%) Detection algorithm
In brief, the S1 attack uses a method to estimate the origi- Goldhill (%) Lena (%) Mandrill (%) Zelda (%)
nal image from the stego-image, and assumes that, after em-
bedding, the number of the 0 and the absolute-value-1 DCT 10 20.92 −30.68 −15.74 −54.53
20 8.05 −18.79 −23.07 −54.90
coefficients in the stego-images created by F5 will be changed 30 6.60 −43.01 1.24 −56.59
drastically. Based on this property, the S1 attack can measure 40 2.56 −7.51 −10.21 −58.32
the amount of the embedded secret bits using the relation be- 50 −0.11 −44.82 −15.23 −45.17
tween the stego-images and the estimated original image. Be- 60 20.36 −11.43 −1.27 −6.14
cause OutGuess preserves the property of the DCT coefficients 70 18.50 −58.72 4.82 −36.13
80 20.22 8.96 1.04 −48.2
of the stego-images, if we use S1 attack to detect the stego- 90 −5.08 −1.86 −10.62 −8.31
images created by the OutGuess algorithm, we will obtain in- 100 20.48 −0.17 19.05 −20.25
correct detection results as given in Table 7. Similarly, because
the proposed method uses the strategy of complementary em-
bedding to maintain the property of DCT coefficients, the S1 tection results are also unstable as shown in Fig. 9. This is why
attack cannot correctly detect the number of the embedded se- the proposed steganographic method can resist the S2 attack.
cret bits as shown in Fig. 8. This is why the proposed stegano-
graphic method can resist the S1 attack. 6. Conclusions
On the other hand, in brief, the S2 attack also uses a method
to estimate the original image from the stego-image. To detect In this paper, we have proposed a high-performance JPEG
an image, the S2 attack first embeds random bits in the stego- steganographic method. The proposed method adopts the com-
image using the same embedding algorithm. If the stego-image plementary embedding strategy to reduce the loss of statistical
is created by an LSB-based method, the embedding effect of the property of the stego-image in spatial domain. In such a man-
stego-image will be canceled out. Therefore, the re-embedded ner, the proposed steganographic method can resist the S fam-
image will be closer to the original image than the stego-image. ily attack. Moreover, the proposed method does not adopt the
The S2 attack then uses the relation among the estimated orig- LSB replacement strategy so that it can also avoid the detection
inal image, stego-image, and the re-embedded image to mea- of the chi-square family attack.
sure the amount of the embedded secret bits. For example, as To show the effectiveness of the proposed method, the chi-
introduced previously, the J-Steg is an LSB-based method. If square, extended chi-square, S1 and S2 attacks were simulated,
we use S2 attack to detect the stego-images created by J-Steg, and used to detect the stego-images created by the proposed
we will obtain stable detection results as given in Table 8. On method. The J-Steg, F5, and OutGuess steganographic algo-
the contrary, if a stego-image is not created by an LSB-based rithms were also simulated and used to create the stego-images
method, the re-embedding strategy adopted by the S2 attack in the same experimental conditions. Experimental results show
will fail and result in unstable detection results. For example, that the proposed steganographic method has the following ad-
if we use S2 attack to detect the stego-images created by the vantages:
F5 algorithm, we will obtain unstable detection results as given
in Table 9. Because the proposed steganographic method is not (1) The capacity provided by the proposed method is larger
an LSB-based method, if we use S2 attack to detect the stego- than those provided by J-Steg, F5, and OutGuess stegano-
images created by the proposed embedding algorithm, the de- graphic methods.
C.-L. Liu, S.-R. Liao / Pattern Recognition 41 (2008) 2945 – 2955 2955
(2) The proposed method has excellent performance against [14] C.-C. Chang, T.-S. Chen, L.-Z. Chung, A steganographic method based
the chi-square family attack. upon JPEG and quantization table modification, Inf. Sci. 141 (1–2)
(3) The proposed method can successfully confuse the detec- (2002) 123–138.
[15] R.-Z. Wang, C.-F. Lin, J.-C. Lin, Image hiding by optimal LSB
tion of the S family attack. substitution and genetic algorithm, Pattern Recognition 34 (3) (2001)
671–683.
With the above-mentioned advantages, the proposed stegano- [16] A. Westfeld, High capacity despite better steganalysis (F5—a
steganographic algorithm), in: Proceedings of the Fourth International
graphic method is practical for the application of covert com-
Workshop on Information Hiding, vol. 2137, 2001, pp. 289–302.
munication. [17] N. Provos, Defending against statistical steganalysis, in: Proceedings of
the 10th USENIX Security Symposium, 2001, pp. 323–336.
[18] J-Steg http://www.ussrback.com/crypto/steanography/DOS/jsteg.txt.
References [19] EzStego http://www.securityfocus.com/tools/586.
[20] F5 http://wwwrn.inf.tu-dresden.de/%7Ewestfeld/f5.html.
[1] W. Stallings, Cryptography and Network Security: Principles and [21] Hide4PGP http://www.heinz-repp.onlinehome.de/Hide4PGP.htm.
Practice, third ed., Pearson Education, New Jersey, 2003. [22] JP Hide&Seek ftp://ftp.gwdg.de/pub/linux/misc/ppdd/jphs_05.zip.
[2] C.-C. Chang, C.-S. Chan, Y.-H. Fan, Image hiding scheme with modulus [23] S-Tools ftp://ftp.ntua.gr/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-
function and dynamic programming strategy on partitioned pixels, Pattern tools4.zip.
Recognition 39 (6) (2006) 1155–1167. [24] Snow http://www.darkside.com.au/snow/index.html.
[3] S.-L. Li, K.-C. Leung, L.M. Cheng, C. -K, Chan, A novel image-hiding [25] I.J. Cox, M. Miller, J. Bloom, Digital Watermarking, Morgan Kaufmann,
scheme based on block difference, Pattern Recognition 39 (6) (2006) San Francisco, 2002.
1168–1176. [26] J.-L. Liu, D.-C. Lou, M.-C. Chang, H.-K. Tso, A robust watermarking
[4] H. Noda, M. Niimi, E. Kawaguchi, High-performance JPEG scheme using self-reference image, Comput. Stand. Interfaces 28 (3)
steganography using quantization index modulation in DCT domain, (2006) 356–367.
Pattern Recognition Lett. 27 (5) (2006) 455–461. [27] D.-C. Lou, J.-L. Liu, M.-C. Chang, Digital watermarking using
[5] Y.-H. Yu, C.-C. Chang, Y.-C. Hu, Hiding secret data in images via multiresolution wavelet transform, in: Proceedings of the IEEE 37th
predictive coding, Pattern Recognition 38 (5) (2005) 691–705. Annual International Carnahan Conference on Security Technology,
[6] C.-C. Chang, H.-W. Tseng, A steganographic method for digital images 2003, pp. 370–377.
using side match, Pattern Recognition 25 (12) (2004) 1431–1437. [28] D.-C. Lou, J.-L. Liu, A robust watermarking scheme based on the just-
[7] M.-Y. Wu, Y.-K. Ho, J.-H. Lee, An iterative method of palette- noticeable-distortion, J. Chung Cheng Inst. Technol. 31 (2) (2003) 11–
based image steganography, Pattern Recognition Lett. 25 (3) (2004) 22.
301–309. [29] F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding—a
[8] C.-K. Chan, L.M. Cheng, Hiding data in images by simple LSB survey, Proc. IEEE 87 (7) (1999) 35–43.
substitution, Pattern Recognition 37 (3) (2004) 469–474. [30] J. Seberry, J. Pieprzyk, CRYPTOGRAPHY: An Introduction to Computer
[9] C.-C. Thien, J.-C. Lin, A simple and high-hiding capacity method for Security, Prentice-Hall, New York, 1989.
hiding digit-by-digit data in images based on modulus function, Pattern [31] A. Westfeld, A. Pfitzmann, Attacks on steganographic systems, in:
Recognition 36 (12) (2003) 2875–2881. Proceedings of the Third International Workshop on Information Hiding,
[10] D.-C. Wu, W.-H. Tsai, A steganographic method for images by pixel- 2000, pp. 61–76.
value differencing, Pattern Recognition Lett. 24 (9–10) (2003) 1613– [32] J. Fridrich, M. Goljan, D. Hogea, New methodology for breaking
1626. steganographic techniques for JPEGs, in: Proceedings of SPIE: Security
[11] D.-C. Lou, J.-L. Liu, Steganographic method for secure communications, and Watermarking of Multimedia Contents, vol. 5020, 2003, pp.
Comput. Secur. 21 (5) (2002) 449–460. 143–155.
[12] J. Spaulding, H. Noda, M.N. Shirazi, E. Kawaguchi, BPCS steganography [33] ISO/IEC, IS 10918, ITU-T, Rec. T.81, Information technology—digital
using EZW lossy compressed images, Pattern Recognition Lett. 23 (13) compression and coding of continuous-tone still images, part 1:
(2002) 1579–1587. requirements and guidelines, 1992.
[13] J.J. Eggers, R. Bauml, B. Girod, A communications approach to image [34] The MathWorks http://www.mathworks.com/index.shtml.
steganography, in: Proceedings of SPIE: Security and Watermarking of [35] A.K. Jain, Fundamentals of Digital Image Processing, Prentice-Hall,
Multimedia Contents, vol. 4675, 2002, pp. 26–37. New Jersey, 1989.
About the Author—CHIANG-LUNG LIU received his Ph.D. degree in Electronic Engineering from Chung Cheng Institute of Technology (CCIT), National
Defense University, Taiwan, ROC, in 2002. Since 2003, he has been with the Department of Electrical Engineering at CCIT, where he is currently an Associate
Professor in the Department of Electrical and Electronic Engineering. His research interests include information security, information hiding, multimedia
security, and image processing.
About the Author—SHIANG-RONG LIAO received his M.S. degree in Electronic Engineering from Chung Cheng Institute of Technology, National Defense
University, Taiwan, ROC, in 2006. His research interests include information hiding and image processing.