Abstract
Social media platform such as WeChat provides rich cover images for covert communication by steganography. However, in order to save band-width, storage space and make images load faster, the images often will be compressed, which makes the image steganography algorithms designed for lossless network channels unusable. Based on DCT and SVD in nonsubsampled shearlet transform domain, a robust JPEG steganography algorithm is proposed, which can resist image compression and correctly extract the embedded secret message from the compressed stego image. First, by combining the advantages of nonsubsampled shearlet transform, DCT and SVD, the construction method for robust embedding domain is proposed. Then, based on minimal distortion principle, the framework of the proposed robust JPEG steganography algorithm is given and the key steps are described in details. The experimental results show that the proposed JPEG steganography algorithm can achieve competitive robustness and anti-detection capability in contrast to the state-of-the-art robust steganography algorithms. Moreover, it can extract the secret message correctly even if the stego image is compressed by WeChat.
Similar content being viewed by others
References
Bao P, Ma X (2005) Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Trans Circ Syst Video Technol 15(1):96–102
Bas P, Filler T, Pevný T (2011) Break Our Steganographic System: The Ins and Outs of Organizing BOSS. In: Proceedings of the 13th International workshop on Information Hiding, Springer, pp 59–70
Chen B, Wornell G (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423–1443
Chen X, Zhang Z, Qiu A, Xia Z, Xiong N (2021) A novel coverless steganography method based on image selection and StarGAN. IEEE Trans Netw Sci Eng 9:219–230. https://doi.org/10.1109/TNSE.2020.3041529
Das R, Baykara M, Tuna G (2019) A novel approach to steganography: enhanced least significant bit substitution algorithm integrated with self-determining encryption feature. Comput Syst Sci Eng 34(1):23–32
Easley G, Labate D, Lim W (2008) Sparse directional image representations using the discrete shearlet transform. Appl Comput Harmon Anal 25(1):25–46
Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensic Secur 6(3):920–935
Guo L, Ni J, Shi YQ (2014) Uniform embedding for efficient JPEG steganography. IEEE Trans Inf Forensic Secur 9(5):814–825
Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on Information hiding and multimedia security, ACM, pp. 59–68
Holub V, Fridrich J (2015) Low-complexity features for JPEG Steganalysis using Undecimated DCT. IEEE Trans Inf Forensic Secur 10(2):219–228
Kang X, Zhao F, Lin G, Chen Y (2018) A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength. Multimed Tools Appl 77(11):13197–13224
Ker A D, Bas P, Böhme R, et al (2013). Moving steganography and Steganalysis from the laboratory into the real world. In: Proceedings of the first ACM workshop on Information hiding and multimedia security, ACM, pp. 45–58.
Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432–444
Luo Y, Qin J, Xiang X, Tan Y (2021) Coverless image steganography based on multi-object recognition. IEEE Trans Circ Syst Video Technol 31:2779–2791. https://doi.org/10.1109/TCSVT.2020.3033945
Pevny T, Fridrich J (2008) Multiclass detector of current steganographic methods for JPEG format. IEEE Tran Inf Forensic Secur 3(4):635–650
Qian Z, Zhou H, Zhang W, Zhang X (2016) Robust steganography using texture synthesis. In: Proceedings of 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Springer, pp. 25–33
Tao J, Li S, Zhang X, Wang Z (2019) Towards robust image steganography. IEEE Trans Circ Syst Video Technol 29(2):594–600
Tian C, Wen R, Zou W, Gong L (2020) Robust and blind watermarking algorithm based on DCT and SVD in the contourlet domain. Multimed Tools Appl 79(11):7515–7541
Wang X, Liu Y, Xu H, Wang A, Yang H (2016) Blind optimum detector for robust image watermarking in nonsubsampled shearlet domain. Inf Sci 372:634–654
Xiang L, Yang S, Liu Y, Li Q, Zhu C (2020) Novel linguistic steganography based on character-level text generation. Mathematics 8(9):1558
Yang Z, Zhang S, Hu Y, Hu Z, Huang Y (2021) VAE-Stega: linguistic steganography based on Variational auto-encoder. IEEE Trans Inf Forensic Secur 16:880–895
Yi S, Labate D, Easley G, Krim H (2009) A Shearlet approach to edge analysis and detection. IEEE Trans Image Process 18(5):929–941
Yu X, Chen K, Wang Y, Li W, Zhang W, Yu N (2020) Robust adaptive steganography based on generalized dither modulation and expanded embedding domain. Signal Process 168:1–12
Zhang Y, Luo X, Yang C, Ye D, Liu F. (2015) A JPEG compression resistant adaptive steganography based on relative relationship between DCT coefficients. In: Proceedings of the 10th international conference on availability, Reliability and Security, IEEE, pp. 461–46.
Zhang Y, Zhu X, Qin C, Yang C, Luo X (2018) Dither modulation based adaptive steganography resisting JPEG compression and statistic detection. Multimed Tools Appl 77(14):17913–17935
Zhang Y, Luo X, Guo Y, Qin C, Liu F (2020) Multiple robustness enhancements for image adaptive steganography in Lossy channels. IEEE Trans Circ Syst Video Technol 30(8):2750–2764
Zhao Z, Guan Q, Zhang H, Zhao X (2019) Improving the robustness of adaptive steganographic algorithms based on transport channel matching. IEEE Trans Inf Forensic Secur 14(7):1843–1856
Acknowledgments
This work was supported by the National Natural Science Foundation of China (No. 61872448, U1804263) and the Natural Science Basic Research Plan in Shanxi Province of China (No. 2021JQ-379).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Song, X., Yang, C., Han, K. et al. Robust JPEG steganography based on DCT and SVD in nonsubsampled shearlet transform domain. Multimed Tools Appl 81, 36453–36472 (2022). https://doi.org/10.1007/s11042-022-13525-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13525-4