Ternary data hiding technique for JPEG steganography

Vasily Sachnev, Hyoung Joong Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

In this paper we present JPEG steganography method based on hiding data to the stream of ternary coefficients. In the proposed method each nonzero DCT coefficient is converted to the corresponding ternary coefficient. The block of 3 m - 1 ternary coefficients is used for hiding m ternary messages by modifying one or two coefficients. Due to higher information density of the ternary coefficients, the proposed method has many solutions for hiding necessary data. Such a big choice enables to choose coefficients with lowest distortion impact. As a result, the proposed methods have better data hiding performance compared to the existing steganographic methods based on hiding data to stream of binary coefficients like matrix encoding (F5) and modified matrix encoding (MME). The proposed methods were tested with steganalysis method proposed by T. Pevny and J.Fridrich. The experimental results show that the proposed method has less detectability compared to MME (modified matrix encoding).

Original languageEnglish
Title of host publicationDigital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers
Pages202-210
Number of pages9
DOIs
Publication statusPublished - 2011
Event9th International Workshop on Digital Watermarking, IWDW 2010 - Seoul, Korea, Republic of
Duration: 2010 Oct 12010 Oct 3

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6526 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other9th International Workshop on Digital Watermarking, IWDW 2010
Country/TerritoryKorea, Republic of
CitySeoul
Period10/10/110/10/3

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Ternary data hiding technique for JPEG steganography'. Together they form a unique fingerprint.

Cite this