Skip to main content
Log in

A high capacity steganographic method based on quantization table modification

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

For the traditional steganographic method of Jsteg, the emmbedment of secret message is completed by dividing cover-image into nonoverlapping blocks of 8×8 pixels, discrete cosine transform (DCT) transforming, and using the standard 8×8 quantization table to quantize. In this paper, a novel steganographic method based on the JPEG quantization table modification is presented. Instead of dividing cover-image into 8×8 blocks, nonoverlapping blocks of 16×16 pixels is used. Both theoretical anlysis and experiment results show that the new methods has larger steganography capacity and better stego-image quality, compared with the method of Jsteg and Chang’s.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Fridrich J, Goljan M, Hogea D, et al. Quantitative steganalysis: Estimating secret message length[J]. ACM Multimedia Systems Journal, 2003, 9(3): 288–302.

    Article  Google Scholar 

  2. Hu Yun, Niu Xinxin, Yang Yixian. The study on the capacity of information hiding system on still images [J]. Journal of Electronics, 2004, 26(11): 1681–1685.

    Google Scholar 

  3. Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG image: breaking the F5 algorithm[C]// The 5th International Workshop on Information Hiding. Berlin: Springer-Verlag, 2002: 310–323.

    Google Scholar 

  4. Li Xiaoxia, Wang Jianjun. A steganographic method based upon JPEG and particle swarm optimaziton algorithm[J]. Information Sciences, 2007, 177: 3099–3109.

    Article  Google Scholar 

  5. Fridrich J. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes [C] //Proceeding 6th Information Hiding Workshop. Berlin: Springer-Verlag, 2004: 67–81.

    Google Scholar 

  6. Westfeld A. F5-a steganographic algorithm: high capacity despite better steganalysis[C]//Proceeding of 4th International Workshop on Information Hiding. New York: Springer-Verlag, 2001: 289–302.

    Google Scholar 

  7. Lee Y K, Chen L H. High capacity image steganograhic model[J]. IEE Proceedings on Vision, Image and Signal Processing, 2000, 147(3): 288–294.

    Article  MathSciNet  Google Scholar 

  8. Lee Y K, Chen L H. Secure errror-free steganography for JPEG images[J].Jounal of Pattern Recognition and Artifical Intelligence, 2003, 17: 967–981.

    Article  Google Scholar 

  9. Monro D M, Sherlock B G. Optimal quantisation strategy for DCT image signal processing[J]. IEE Proceeding on Vision, Image and Signal Processing, 1996, 143(1): 10–14.

    Article  Google Scholar 

  10. Yu Y H, Chang C C, Hu Y C. Hiding secret data in images via predictive coding [J]. Pattern Recognition, 2005, 38: 691–705.

    Article  Google Scholar 

  11. Chang C C, Chen T S, Chung L Z. A steganographic method based upon JPEG and quantization table modification[J]. Information Sciences, 2002, 141: 123–138.

    Article  MATH  Google Scholar 

  12. Tseng H W, Chang C C. Steganography using JPEG-compressed images [C]//The Fourth International Conference on Computer and Information Technology. Wuhan: IEEE Computer Society Press, 2004: 12–17.

    Google Scholar 

  13. Almohammad A. High capacity steganographic method based upon JPEG[C]//Third International Conference on Availability, Reliability and Security. Washington: IEEE Computer Society Press, 2008: 544–549.

    Chapter  Google Scholar 

  14. Huang J, Shi Y Q, Shi Y. Embedding image watermarks in DC components [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2000, 10(6): 974–979.

    Article  Google Scholar 

  15. Almohammad A, Ghinea G, Hierons R M. JPEG steganography: A performance evaluation of quantization tables [C]//The IEEE 23rd International Conference on Advanced Information Networking and Applications. Washington: IEEE Computer Society Press, 2009: 471–478.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cuiling Jiang.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China(50803016), the Fundamental Research Funds for the Central Universities

Biography: JIANG Cuiling, female, Lecturer, Ph. D., research direction: data hiding, image process.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jiang, C., Pang, Y., Guo, L. et al. A high capacity steganographic method based on quantization table modification. Wuhan Univ. J. Nat. Sci. 16, 223–227 (2011). https://doi.org/10.1007/s11859-011-0740-0

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-011-0740-0

Key words

CLC number

Navigation