Skip to main content

Hiding Data in JPEG Using in-DQT Technique

  • Conference paper
Information Security and Assurance (ISA 2010)

Abstract

Steganography techniques are useful to convey hidden information using various types of typically-transmitted multimedia data as cover file to conceal communication. When using JPEG as a cover file, normally message is hidden in the AC values of quantized DCT coefficients. However, concealment of message in quantization table is yet to be done. In this paper, a novel in-DQT technique for message hiding in JPEG’s quantization table using bytewise insertion is proposed. By using in-DQT technique on standard JPEG test images for cover files with up to 24 bytes of message, results show that steganography image with minimal acceptable image distortion. Thus, in-DQT technique provides alternative for embedding message in quantization table.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brundick, F.S., Marvel, L.M.: Implementation of Spread Spectrum Image Steganography, Army Research Laboratory (March 2001), http://www.arl.army.mil/arlreports/2001/ARL-TR-2433.pdf

  2. Jajodia, S., Johnson, N.F.: Exploring Steganography: Seeing the Unseen. Journal of IEEE Computer 31(2), 26–34 (1998)

    Google Scholar 

  3. File Carving, http://www.forensicswiki.org/wiki/File_Carving

  4. Mohdavi, M., Samavi, S., Tavala, A., Malekiha, M.: Iterative Random Blocking for Steganography in JPEG Images. In: The Proceeding of 5th International Conference on Information Security and Cryptography, Tehran (October 2008)

    Google Scholar 

  5. Westfeld, A.: F5–a steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Ping, W., Liu, F., Wang, G., Sun, Y., Gong, D.: Multi-class Steganalysis For JPEG Stego Algorithms. In: The Proceeding of 15th IEEE International Conference on Image Processing ICIP, pp. 2076–2079 (2008)

    Google Scholar 

  7. Silman, J.: Steganography and Steganalysis: An Overview, SANS Institute (2001)

    Google Scholar 

  8. Provos, N.: Defending against statistical steganalysis. In: The 10th USENIX Security Symposium, Washington DC (2001)

    Google Scholar 

  9. Fidrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Provos, N., Honeyman, P.: Hide and Seek: An Introduction to Steganography. IEEE Security and Privacy Journal 1(3), 32–44 (2003)

    Article  Google Scholar 

  11. Recommendation ITU-T.81: Information Technology-Digital Compression and Coding of Continuous-Tone Still Images-Requirements and Guidelines, International Telecommunications Union (1992)

    Google Scholar 

  12. Lee, Y., Chen, L.: Secure error-free steganography for JPEG images. International Journal of Pattern Recognition and Artificial Intelligence 17, 967–981 (2003)

    Article  Google Scholar 

  13. HexAssistant Hex Editor, http://www.verytools.com

  14. BinText Hex Editor, http://www.foundstone.com/us/resources/proddesc/bintext.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mohamad, K.M., Herawan, T., Deris, M.M. (2010). Hiding Data in JPEG Using in-DQT Technique. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13365-7_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13364-0

  • Online ISBN: 978-3-642-13365-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics