An attempt to generalize distortion measure for JPEG steganography

Vasily Sachnev, Hyoung Joong Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution


In this paper, we present several methods to improve performance of the existing data hiding method for JPEG steganography. Recent JPEG steganographic methods usually exploit minimum distortion strategy, where each DCT coefficients has predefined distortion value. Such strategy uses the best solution for data hiding with minimum cumulative distortion. Steganographic methods based on hiding data using the best solution with minimum distortion have better chance to pass powerful steganalysis presented in literature. Thus, the key point for such methods is a way to compute distortion for each DCT coefficient. In this paper, we present three different ways to compute distortion and search for parameters, where proposed functions show the best results. BCH-based method has been used as a tool for data hiding. Experimental results show that the presented distortion functions with the best parameters show better results compared to traditional approaches.

Original languageEnglish
Title of host publicationDigital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers
Number of pages14
Publication statusPublished - 2013
Event11th International Workshop on Digital Forensics and Watermaking, IWDW 2012 - Shanghai, China
Duration: 2012 Oct 312012 Nov 3

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7809 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other11th International Workshop on Digital Forensics and Watermaking, IWDW 2012


  • BCH coding
  • JPEG steganography
  • Minimal distortion
  • undetectable data hiding

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'An attempt to generalize distortion measure for JPEG steganography'. Together they form a unique fingerprint.

Cite this