Improving Dither Modulation based Robust Steganography by Overflow Suppression

10/17/2021
by   Kai Zeng, et al.
0

Nowadays, people are sharing their pictures on online social networks (OSNs), so OSN is a good platform for Steganography. But OSNs usually perform JPEG compression on the uploaded image, which will invalidate most of the existing steganography algorithms. Recently, some works try to design robust steganography which can resist JPEG compression, such as Dither Modulation-based robust Adaptive Steganography (DMAS) and Generalized dither Modulation-based robust Adaptive Steganography (GMAS). They relieve the problem that the receivers cannot extract the message correctly when the quality factor of channel JPEG compression is larger than that of cover images. However, they only can realize limited resistance to detection and compression due to robust domain selection. To overcome this problem, we meticulously explore three lossy operations in the JPEG recompression and discover that the key problem is spatial overflow. Then two preprocessing methods Overall Scaling (OS) and Specific Truncation (ST) are presented to remove overflow before message embedding as well as generate a reference image. The reference image is employed as the guidance to build asymmetric distortion for removing overflow during embedding. Experimental results show that the proposed methods significantly surpass GMAS in terms of security and achieve comparable robustness.

READ FULL TEXT

page 5

page 14

research
07/16/2020

Robust adaptive steganography based on dither modulation and modification with re-compression

Traditional adaptive steganography is a technique used for covert commun...
research
04/26/2023

Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction

Transmitting images for communication on social networks has become rout...
research
11/18/2022

Improving Robustness of TCM-based Robust Steganography with Variable Robustness

Recent study has found out that after multiple times of recompression, t...
research
01/18/2016

Multiple Watermarking Algorithm Based on Spread Transform Dither Modulation

Multiple watermarking technique, embedding several watermarks in one car...
research
12/06/2022

A Robust Image Steganographic Scheme against General Scaling Attacks

Conventional covert image communication is assumed to transmit the messa...
research
03/04/2022

Transformations in Learned Image Compression from a Modulation Perspective

In this paper, a unified transformation method in learned image compress...

Please sign up or login with your details

Forgot password? Click here to reset