Abstract
Steganography techniques are useful to convey hidden information using various types of typically-transmitted multimedia data as cover file to conceal communication. When using JPEG as a cover file, normally message is hidden in the AC values of quantized DCT coefficients. However, concealment of message in quantization table is yet to be done. In this paper, a novel in-DQT technique for message hiding in JPEG’s quantization table using bytewise insertion is proposed. By using in-DQT technique on standard JPEG test images for cover files with up to 24 bytes of message, results show that steganography image with minimal acceptable image distortion. Thus, in-DQT technique provides alternative for embedding message in quantization table.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Brundick, F.S., Marvel, L.M.: Implementation of Spread Spectrum Image Steganography, Army Research Laboratory (March 2001), http://www.arl.army.mil/arlreports/2001/ARL-TR-2433.pdf
Jajodia, S., Johnson, N.F.: Exploring Steganography: Seeing the Unseen. Journal of IEEE Computer 31(2), 26–34 (1998)
File Carving, http://www.forensicswiki.org/wiki/File_Carving
Mohdavi, M., Samavi, S., Tavala, A., Malekiha, M.: Iterative Random Blocking for Steganography in JPEG Images. In: The Proceeding of 5th International Conference on Information Security and Cryptography, Tehran (October 2008)
Westfeld, A.: F5–a steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Ping, W., Liu, F., Wang, G., Sun, Y., Gong, D.: Multi-class Steganalysis For JPEG Stego Algorithms. In: The Proceeding of 15th IEEE International Conference on Image Processing ICIP, pp. 2076–2079 (2008)
Silman, J.: Steganography and Steganalysis: An Overview, SANS Institute (2001)
Provos, N.: Defending against statistical steganalysis. In: The 10th USENIX Security Symposium, Washington DC (2001)
Fidrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)
Provos, N., Honeyman, P.: Hide and Seek: An Introduction to Steganography. IEEE Security and Privacy Journal 1(3), 32–44 (2003)
Recommendation ITU-T.81: Information Technology-Digital Compression and Coding of Continuous-Tone Still Images-Requirements and Guidelines, International Telecommunications Union (1992)
Lee, Y., Chen, L.: Secure error-free steganography for JPEG images. International Journal of Pattern Recognition and Artificial Intelligence 17, 967–981 (2003)
HexAssistant Hex Editor, http://www.verytools.com
BinText Hex Editor, http://www.foundstone.com/us/resources/proddesc/bintext.htm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mohamad, K.M., Herawan, T., Deris, M.M. (2010). Hiding Data in JPEG Using in-DQT Technique. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-13365-7_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13364-0
Online ISBN: 978-3-642-13365-7
eBook Packages: Computer ScienceComputer Science (R0)