SlideShare uma empresa Scribd logo
1 de 16
A Novel steganographic method
         for JPEG images
                    by Vasiliy Sachnev


- Introduction
      JPEG compression
      Steganography
- Block based steganography method (F5)
- Improved matrix encoding
- Experimental results
- Conclusion
JPEG compression
Introduction
JPEG steganography:
Matrix Encoding (F5)
Matrix encoding allows to hide n bits of data to stream of 2n-1 coefficients (S)
    by modifying one coefficient.
ME schemes: (m, 2m-1), examples (2, 3) (3, 7) (4, 15)
1) Get stream of non-zero DCT coefficients:
  1, -1, 2, 3, 1, -1, -3, 1, 8, 3, -1, -1, -1, 2, 1, 1, 1, 2, 3, 1, 12,…, N
2) Compute stream of corresponding informative bits b:
                                   c( i , j ) mod 2
                                                            if c( i , j ) > 0
                     b( i , j )   =
                                   ( c( i , j ) − 1) mod 2 if c( i , j ) < 0
                                   
   1, -1, 2, 3, 1, -1, -3, 1, 8, 3, -1, -1, -1, 2, 1, 1, 1, 2, 3, 1, 12, …
   1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 0, 0, 0, 0, 1, 1, 1, 0, 1, 1, 0, …
3) Define the matrix encoding scheme (n, 2 n-1) such as,
                                         N
                                            ⋅n ≥ C
                                       2 −1
                                        n

where C is the size of hidden message.
Matrix encoding(F5)
Assume that the ME scheme is(3,7). Hidden message (M) is (0 0 1).
Stream of DCT coefficients (D) and stream of informative bits (S) are
(3, -1, 2, 1, 1, -1, -3) and (1, 0, 0, 1, 1, 0, 0) respectively.
For embedding message M to S one coefficient from D has to be modified.
Compute necessary position (P={p1, p2, p3}) :
S = {a1, a2, a3, a4,a5,a6,a7}                         0 0 0 1 1 1 1
                                                                   
1) Compute syndrome O = {o1, o2, o3}             H =  0 1 1 0 0 1 1
                                                     1 0 1 0 1 0 1
o1 = xor(a4,a5,a6,a7)                                              

o2 = xor(a2,a3,a6,a7)
o3 = xor(a1,a3,a5,a7)
2) Position (P) in binary representation is computed as:
 P = xor(O,M)
Matrix Encoding (F5), example
Hiding message M (0 0 1) to (3, -1, 2, 1, 1, -1, -3) or (1, 0, 0, 1, 1, 0, 0)
1) Get syndrome :
      o1 = xor(a4,a5,a6,a7)=xor(1,1,0,0) = 0
      o2 = xor(a2,a3,a6,a7)=xor(0,0,0,0) = 0
      o3 = xor(a1,a3,a5,a7)=xor(1,0,1,0) = 0
2) Get position:
    P = xor(M,O) = {xor(0,0), xor(0,0), xor(1,0)} = {0, 0, 1}. P10 = 1
3) Get stream of modified coefficients and informative bits
    (2(4), -1, 2, 1, 1, -1, -3) and (0, 0, 0, 1, 1, 0, 0)
4) Verification (get syndrome):
         (0, 0, 0, 1, 1, 0, 0)
     m1 = xor(a4,a5,a6,a7)=xor(1,1,0,0) = 0
     m2 = xor(a2,a3,a6,a7)=xor(0,0,0,0) = 0
Modified matrix encoding
Each 1 flip solution P can be replaced to floor(n/2) 2 flips
   solutions P1, P2, such that P = xor(P1, P2).
Example:
   P = 510 = 01012
     P1         P2
   0100        0001
   0110        0011
   0111        0010
   1000        1101
   1100        1001
   1111        1010
3 flips solution is also possible: P = xor(P1, P2, P3)
Overlapped matrix encoding

Original ME:




Overlapped ME:           I
Overlapped matrix encoding
Assume that A and B are the positions to flip for block 1 and 2. (a1,
  a2), (b1,b2), (a11,a12,a13) or (b11,b12,b13) are the numbers such that A =
  xor(a1,a2) = xor (a11,a12,a13) , and
   B = xor(b1,b2) = xor (b11,b12,b13)
   B’ is a position for block 2, if A, (a1 or a2), or (a11 or a12 or a13)
   belong to I . B’ = xor(b’1,b’2) = xor (b’11,b’12,b’13)
1 flip solution:      A = B, (A,B) ϵ I
2 flips solution:     (A,B), (a1,a2 = B) or (b’1 = A, b’2)
3 flips solution:     (a1,a2,B) , (a1,a2 = b’1,b’2), (A, b1 , b2) or
                      (a11,a12 = b’1,a13 = b’2) , (a1 = b’11,a2 = b’12 ,b’13)
4 flips solution:     (a1,a2,b1,b2), (a11,a12,a13 = b’1,b’2) ,
                      (a11,a12 = b’11,a13 = b’12, b’13) ,
Example:

    1 2 3 4 5 6 7 8 9 10 11




Assume that A = 4 and B = 2:
Possible solutions:
(2, 6) 2 = 010, 6 = 110, xor(010,110) = 100 = 4.
Coefficient 6 has index 2 for block 2. (B = 2)
(4,9,11), A = 4, 9th and 11th coefficients have the indexes 5 and 7
    correspondingly. Thus, 5 = 101, 7 = 111, xor(101,111) = 010 =2.
Insert - Remove (IR) approach
The stream of non-rounded AC coefficients:
1.45,0.21, 0.35 , 1.02, -0.01, -0.28, -5.12, 9.87, -0.45, 0.02, 1.89, -0.85, 4.01,
-8.74, -6.04, 1.55, 3.11, -10.34, 5.04
Hidden data: m1=101, m2=100
Assume that the candidates for inserting are the AC coefficients belonging to the
   (0.25, 0.5) and (-0.5, -0.25).
0.35, -0.28, -0.45 are the candidates for inserting (cI).
1.45, 1.02, -0.85 are the candidates for removing (cR).
The stream of non-rounded AC coefficients for hiding data.
1.45, 1.02, -5.12, 9.87, 1.89, -0.85, 4.01, -6.04, 1.55, 3.11, -10.34
Rounded:
1, 1, -5, 10, 2, -1, 4, -6, 2, 3, -10

Block 1: 1, 1, -5, 10, 2, -1, 4      Block 2: 2, -1, 4, -6, 2, 3, -10
Intersected area I: 2, -1, 4
Distortion impact
Distortion impact due to modification:
                              D = E2∙Q2
       0.5− | C −  C  |, if C ∈ ( − ∞ ;1.5) ∪ (1.5; ∞ )
     E=
       1.5− | C |,         if C ∈ [−1.5;0.5) ∪ (0.5;1.5]


Distortion impact due to insertion or removing:
                       DIR = |0.5-|C||2 ∙ Q2
Total distortion impact:
                       Dtotal = ∑i =1 Di + DIR
                                 l
IR approach (without IR)
AC: 1.45 0.21 0.35 1.02 -0.01 -0.28 -5.12 9.87 -0.45 0.02 1.89 -0.85 4.01 -8.74
Q : 10 7        7    40 35       14 12 25        40 35 10         7 17 21
D : 0.25 -     -    368     -     -   21 85       -     -  15 21 69 25
DIR: 90 - 1.1 432          - 9.5       -   -     4     -    -    6     -     -
AC: -6.04   1.55   3.11 -10.34 5.05
Q : 35        12    10       7     7
D : 259     0.36    15    1.25 9.92
DIR: -      -       -      -     -
Hidden data: m1=101, m2=100


Block 1: 1, 1, -5, 10, 2, -1, 4        Block 2: 2, -1, 4, -6, 2, 3, -10

Among one, two, and three flips solutions define A = (1,4), B = (6)
Distortion for original approach is 100.2
IR approach (Insertion and removing)
1.45 0.21 0.35 1.02 -0.01 -0.28 -5.12 9.87 -0.45 0.02 1.89 -0.85 4.01 -8.74
 -6.04 1.55 3.11 -10.34 5.04
Insert 0.35 (i.e 0.35 -> 1), then
Block 1: 1, 1,1, -5, 10, 2, -1              Block 2: 10, 2, -1, 4, -6, 2, 3
Among one, two, and three flips solutions define A = (1 7), B = (6)
Distortion after inserting is 21.6 + 1.1 = 22.7

Remove 1.45 (i.e. 1.45 -> 0), then
Block 1: 1, -5, 10, 2, -1, 4 , -6     Block 2: -1, 4, -6, 2, 3, -10, 5
Among one, two, and three flips solutions define A = (2 4 6), B = (7)
Distortion for original approach is 120.9 + 90 = 210.9
Experimental results
The stego images have been tested by using 274 – features
  steganalysis method proposed by Pevny and Fridrich
Conclusion
The proposed oimproved matrix encoding:
- achieves higher capacity.
- can improve any block based steganographic
  method
- decrease detectability of steganalysis
- can be improved further.

Mais conteúdo relacionado

Mais procurados

Distance and midpoint notes
Distance and midpoint notesDistance and midpoint notes
Distance and midpoint notes
carolinevest77
 
10.1 Distance and Midpoint Formulas
10.1 Distance and Midpoint Formulas10.1 Distance and Midpoint Formulas
10.1 Distance and Midpoint Formulas
swartzje
 

Mais procurados (16)

Chapter 2(limits)
Chapter 2(limits)Chapter 2(limits)
Chapter 2(limits)
 
2.3 Distance and Midpoint Formulas
2.3 Distance and Midpoint Formulas2.3 Distance and Midpoint Formulas
2.3 Distance and Midpoint Formulas
 
Linear Differential Equations1
Linear Differential Equations1Linear Differential Equations1
Linear Differential Equations1
 
Calculus Early Transcendentals 10th Edition Anton Solutions Manual
Calculus Early Transcendentals 10th Edition Anton Solutions ManualCalculus Early Transcendentals 10th Edition Anton Solutions Manual
Calculus Early Transcendentals 10th Edition Anton Solutions Manual
 
Obj. 5 Midpoint and Distance Formulas
Obj. 5 Midpoint and Distance FormulasObj. 5 Midpoint and Distance Formulas
Obj. 5 Midpoint and Distance Formulas
 
The distance formula
The distance formulaThe distance formula
The distance formula
 
10CSL67 CG LAB PROGRAM 6
10CSL67 CG LAB PROGRAM 610CSL67 CG LAB PROGRAM 6
10CSL67 CG LAB PROGRAM 6
 
Distance and midpoint formula
Distance and midpoint formulaDistance and midpoint formula
Distance and midpoint formula
 
Matematika Kalkulus ( Limit )
Matematika Kalkulus ( Limit )Matematika Kalkulus ( Limit )
Matematika Kalkulus ( Limit )
 
T.I.M.E. JEE Advanced 2013 Solution Paper1
T.I.M.E. JEE Advanced 2013 Solution Paper1T.I.M.E. JEE Advanced 2013 Solution Paper1
T.I.M.E. JEE Advanced 2013 Solution Paper1
 
Equation of a Circle in standard and general form
Equation of  a Circle in standard and general formEquation of  a Circle in standard and general form
Equation of a Circle in standard and general form
 
Maths ms
Maths msMaths ms
Maths ms
 
Distance and midpoint notes
Distance and midpoint notesDistance and midpoint notes
Distance and midpoint notes
 
10.1 Distance and Midpoint Formulas
10.1 Distance and Midpoint Formulas10.1 Distance and Midpoint Formulas
10.1 Distance and Midpoint Formulas
 
Calculus 10th edition anton solutions manual
Calculus 10th edition anton solutions manualCalculus 10th edition anton solutions manual
Calculus 10th edition anton solutions manual
 
1.1.1C Midpoint and Distance Formulas
1.1.1C Midpoint and Distance Formulas1.1.1C Midpoint and Distance Formulas
1.1.1C Midpoint and Distance Formulas
 

Destaque

A project on hardware & software service @ doorstep
A project on hardware & software service @ doorstepA project on hardware & software service @ doorstep
A project on hardware & software service @ doorstep
Ajit Kumar Pradhan
 
Employee Recognition Program
Employee Recognition ProgramEmployee Recognition Program
Employee Recognition Program
Rashmi2306
 
Reimeiroku 01
Reimeiroku 01Reimeiroku 01
Reimeiroku 01
Kiyomitsu
 

Destaque (20)

A project on hardware & software service @ doorstep
A project on hardware & software service @ doorstepA project on hardware & software service @ doorstep
A project on hardware & software service @ doorstep
 
Synthetic Biology & Global Health - Claire Marris
Synthetic Biology & Global Health - Claire MarrisSynthetic Biology & Global Health - Claire Marris
Synthetic Biology & Global Health - Claire Marris
 
151014 教育評価論(三田)第3講
151014 教育評価論(三田)第3講151014 教育評価論(三田)第3講
151014 教育評価論(三田)第3講
 
คู่มือ Wordpress
คู่มือ Wordpressคู่มือ Wordpress
คู่มือ Wordpress
 
Mike baker fotosdivertidas
Mike baker fotosdivertidasMike baker fotosdivertidas
Mike baker fotosdivertidas
 
Yolima
YolimaYolima
Yolima
 
151121_お台場海苔づくり説明会
151121_お台場海苔づくり説明会151121_お台場海苔づくり説明会
151121_お台場海苔づくり説明会
 
What is Assistive Techology
What is Assistive TechologyWhat is Assistive Techology
What is Assistive Techology
 
Underage drinking
Underage drinkingUnderage drinking
Underage drinking
 
Pratibimb october2012
Pratibimb october2012Pratibimb october2012
Pratibimb october2012
 
Photosheet slideshow
Photosheet slideshowPhotosheet slideshow
Photosheet slideshow
 
Nahdet El Mahrousa's Incubator Information session
Nahdet El Mahrousa's Incubator Information session Nahdet El Mahrousa's Incubator Information session
Nahdet El Mahrousa's Incubator Information session
 
Guida studente 2012 2013
Guida studente 2012 2013Guida studente 2012 2013
Guida studente 2012 2013
 
PlayFramework1.x基礎編
PlayFramework1.x基礎編PlayFramework1.x基礎編
PlayFramework1.x基礎編
 
Bol.inf.agosto set. 2012
Bol.inf.agosto set. 2012Bol.inf.agosto set. 2012
Bol.inf.agosto set. 2012
 
Employee Recognition Program
Employee Recognition ProgramEmployee Recognition Program
Employee Recognition Program
 
Anteprima modulo 8
Anteprima modulo 8Anteprima modulo 8
Anteprima modulo 8
 
Fizyka
FizykaFizyka
Fizyka
 
Reimeiroku 01
Reimeiroku 01Reimeiroku 01
Reimeiroku 01
 
Managerial economics
Managerial economicsManagerial economics
Managerial economics
 

Semelhante a A novel steganographic method for jpeg images

Amth250 octave matlab some solutions (1)
Amth250 octave matlab some solutions (1)Amth250 octave matlab some solutions (1)
Amth250 octave matlab some solutions (1)
asghar123456
 
Foundation c2 exam june 2013 resit 2 sols
Foundation c2 exam june 2013 resit 2 solsFoundation c2 exam june 2013 resit 2 sols
Foundation c2 exam june 2013 resit 2 sols
fatima d
 
Howard, anton calculo i- um novo horizonte - exercicio resolvidos v1
Howard, anton   calculo i- um novo horizonte - exercicio resolvidos v1Howard, anton   calculo i- um novo horizonte - exercicio resolvidos v1
Howard, anton calculo i- um novo horizonte - exercicio resolvidos v1
cideni
 
Gabarito completo anton_calculo_8ed_caps_01_08
Gabarito completo anton_calculo_8ed_caps_01_08Gabarito completo anton_calculo_8ed_caps_01_08
Gabarito completo anton_calculo_8ed_caps_01_08
joseotaviosurdi
 

Semelhante a A novel steganographic method for jpeg images (11)

Amth250 octave matlab some solutions (1)
Amth250 octave matlab some solutions (1)Amth250 octave matlab some solutions (1)
Amth250 octave matlab some solutions (1)
 
IIT Jam math 2016 solutions BY Trajectoryeducation
IIT Jam math 2016 solutions BY TrajectoryeducationIIT Jam math 2016 solutions BY Trajectoryeducation
IIT Jam math 2016 solutions BY Trajectoryeducation
 
Module 2 plane coordinate geometry
Module  2   plane coordinate geometryModule  2   plane coordinate geometry
Module 2 plane coordinate geometry
 
ISI MSQE Entrance Question Paper (2010)
ISI MSQE Entrance Question Paper (2010)ISI MSQE Entrance Question Paper (2010)
ISI MSQE Entrance Question Paper (2010)
 
Add math may june 2016 p1
Add math may june 2016 p1Add math may june 2016 p1
Add math may june 2016 p1
 
Foundation c2 exam june 2013 resit 2 sols
Foundation c2 exam june 2013 resit 2 solsFoundation c2 exam june 2013 resit 2 sols
Foundation c2 exam june 2013 resit 2 sols
 
Solucionario teoria-electromagnetica-hayt-2001
Solucionario teoria-electromagnetica-hayt-2001Solucionario teoria-electromagnetica-hayt-2001
Solucionario teoria-electromagnetica-hayt-2001
 
Howard, anton calculo i- um novo horizonte - exercicio resolvidos v1
Howard, anton   calculo i- um novo horizonte - exercicio resolvidos v1Howard, anton   calculo i- um novo horizonte - exercicio resolvidos v1
Howard, anton calculo i- um novo horizonte - exercicio resolvidos v1
 
Geometry unit 1.7
Geometry unit 1.7Geometry unit 1.7
Geometry unit 1.7
 
4th Semeste Electronics and Communication Engineering (June-2016) Question Pa...
4th Semeste Electronics and Communication Engineering (June-2016) Question Pa...4th Semeste Electronics and Communication Engineering (June-2016) Question Pa...
4th Semeste Electronics and Communication Engineering (June-2016) Question Pa...
 
Gabarito completo anton_calculo_8ed_caps_01_08
Gabarito completo anton_calculo_8ed_caps_01_08Gabarito completo anton_calculo_8ed_caps_01_08
Gabarito completo anton_calculo_8ed_caps_01_08
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 

A novel steganographic method for jpeg images

  • 1. A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5) - Improved matrix encoding - Experimental results - Conclusion
  • 4. Matrix Encoding (F5) Matrix encoding allows to hide n bits of data to stream of 2n-1 coefficients (S) by modifying one coefficient. ME schemes: (m, 2m-1), examples (2, 3) (3, 7) (4, 15) 1) Get stream of non-zero DCT coefficients: 1, -1, 2, 3, 1, -1, -3, 1, 8, 3, -1, -1, -1, 2, 1, 1, 1, 2, 3, 1, 12,…, N 2) Compute stream of corresponding informative bits b: c( i , j ) mod 2  if c( i , j ) > 0 b( i , j ) = ( c( i , j ) − 1) mod 2 if c( i , j ) < 0  1, -1, 2, 3, 1, -1, -3, 1, 8, 3, -1, -1, -1, 2, 1, 1, 1, 2, 3, 1, 12, … 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 0, 0, 0, 0, 1, 1, 1, 0, 1, 1, 0, … 3) Define the matrix encoding scheme (n, 2 n-1) such as, N ⋅n ≥ C 2 −1 n where C is the size of hidden message.
  • 5. Matrix encoding(F5) Assume that the ME scheme is(3,7). Hidden message (M) is (0 0 1). Stream of DCT coefficients (D) and stream of informative bits (S) are (3, -1, 2, 1, 1, -1, -3) and (1, 0, 0, 1, 1, 0, 0) respectively. For embedding message M to S one coefficient from D has to be modified. Compute necessary position (P={p1, p2, p3}) : S = {a1, a2, a3, a4,a5,a6,a7}  0 0 0 1 1 1 1   1) Compute syndrome O = {o1, o2, o3} H =  0 1 1 0 0 1 1 1 0 1 0 1 0 1 o1 = xor(a4,a5,a6,a7)   o2 = xor(a2,a3,a6,a7) o3 = xor(a1,a3,a5,a7) 2) Position (P) in binary representation is computed as: P = xor(O,M)
  • 6. Matrix Encoding (F5), example Hiding message M (0 0 1) to (3, -1, 2, 1, 1, -1, -3) or (1, 0, 0, 1, 1, 0, 0) 1) Get syndrome : o1 = xor(a4,a5,a6,a7)=xor(1,1,0,0) = 0 o2 = xor(a2,a3,a6,a7)=xor(0,0,0,0) = 0 o3 = xor(a1,a3,a5,a7)=xor(1,0,1,0) = 0 2) Get position: P = xor(M,O) = {xor(0,0), xor(0,0), xor(1,0)} = {0, 0, 1}. P10 = 1 3) Get stream of modified coefficients and informative bits (2(4), -1, 2, 1, 1, -1, -3) and (0, 0, 0, 1, 1, 0, 0) 4) Verification (get syndrome): (0, 0, 0, 1, 1, 0, 0) m1 = xor(a4,a5,a6,a7)=xor(1,1,0,0) = 0 m2 = xor(a2,a3,a6,a7)=xor(0,0,0,0) = 0
  • 7. Modified matrix encoding Each 1 flip solution P can be replaced to floor(n/2) 2 flips solutions P1, P2, such that P = xor(P1, P2). Example: P = 510 = 01012 P1 P2 0100 0001 0110 0011 0111 0010 1000 1101 1100 1001 1111 1010 3 flips solution is also possible: P = xor(P1, P2, P3)
  • 8. Overlapped matrix encoding Original ME: Overlapped ME: I
  • 9. Overlapped matrix encoding Assume that A and B are the positions to flip for block 1 and 2. (a1, a2), (b1,b2), (a11,a12,a13) or (b11,b12,b13) are the numbers such that A = xor(a1,a2) = xor (a11,a12,a13) , and B = xor(b1,b2) = xor (b11,b12,b13) B’ is a position for block 2, if A, (a1 or a2), or (a11 or a12 or a13) belong to I . B’ = xor(b’1,b’2) = xor (b’11,b’12,b’13) 1 flip solution: A = B, (A,B) ϵ I 2 flips solution: (A,B), (a1,a2 = B) or (b’1 = A, b’2) 3 flips solution: (a1,a2,B) , (a1,a2 = b’1,b’2), (A, b1 , b2) or (a11,a12 = b’1,a13 = b’2) , (a1 = b’11,a2 = b’12 ,b’13) 4 flips solution: (a1,a2,b1,b2), (a11,a12,a13 = b’1,b’2) , (a11,a12 = b’11,a13 = b’12, b’13) ,
  • 10. Example: 1 2 3 4 5 6 7 8 9 10 11 Assume that A = 4 and B = 2: Possible solutions: (2, 6) 2 = 010, 6 = 110, xor(010,110) = 100 = 4. Coefficient 6 has index 2 for block 2. (B = 2) (4,9,11), A = 4, 9th and 11th coefficients have the indexes 5 and 7 correspondingly. Thus, 5 = 101, 7 = 111, xor(101,111) = 010 =2.
  • 11. Insert - Remove (IR) approach The stream of non-rounded AC coefficients: 1.45,0.21, 0.35 , 1.02, -0.01, -0.28, -5.12, 9.87, -0.45, 0.02, 1.89, -0.85, 4.01, -8.74, -6.04, 1.55, 3.11, -10.34, 5.04 Hidden data: m1=101, m2=100 Assume that the candidates for inserting are the AC coefficients belonging to the (0.25, 0.5) and (-0.5, -0.25). 0.35, -0.28, -0.45 are the candidates for inserting (cI). 1.45, 1.02, -0.85 are the candidates for removing (cR). The stream of non-rounded AC coefficients for hiding data. 1.45, 1.02, -5.12, 9.87, 1.89, -0.85, 4.01, -6.04, 1.55, 3.11, -10.34 Rounded: 1, 1, -5, 10, 2, -1, 4, -6, 2, 3, -10 Block 1: 1, 1, -5, 10, 2, -1, 4 Block 2: 2, -1, 4, -6, 2, 3, -10 Intersected area I: 2, -1, 4
  • 12. Distortion impact Distortion impact due to modification: D = E2∙Q2 0.5− | C −  C  |, if C ∈ ( − ∞ ;1.5) ∪ (1.5; ∞ ) E= 1.5− | C |, if C ∈ [−1.5;0.5) ∪ (0.5;1.5] Distortion impact due to insertion or removing: DIR = |0.5-|C||2 ∙ Q2 Total distortion impact: Dtotal = ∑i =1 Di + DIR l
  • 13. IR approach (without IR) AC: 1.45 0.21 0.35 1.02 -0.01 -0.28 -5.12 9.87 -0.45 0.02 1.89 -0.85 4.01 -8.74 Q : 10 7 7 40 35 14 12 25 40 35 10 7 17 21 D : 0.25 - - 368 - - 21 85 - - 15 21 69 25 DIR: 90 - 1.1 432 - 9.5 - - 4 - - 6 - - AC: -6.04 1.55 3.11 -10.34 5.05 Q : 35 12 10 7 7 D : 259 0.36 15 1.25 9.92 DIR: - - - - - Hidden data: m1=101, m2=100 Block 1: 1, 1, -5, 10, 2, -1, 4 Block 2: 2, -1, 4, -6, 2, 3, -10 Among one, two, and three flips solutions define A = (1,4), B = (6) Distortion for original approach is 100.2
  • 14. IR approach (Insertion and removing) 1.45 0.21 0.35 1.02 -0.01 -0.28 -5.12 9.87 -0.45 0.02 1.89 -0.85 4.01 -8.74 -6.04 1.55 3.11 -10.34 5.04 Insert 0.35 (i.e 0.35 -> 1), then Block 1: 1, 1,1, -5, 10, 2, -1 Block 2: 10, 2, -1, 4, -6, 2, 3 Among one, two, and three flips solutions define A = (1 7), B = (6) Distortion after inserting is 21.6 + 1.1 = 22.7 Remove 1.45 (i.e. 1.45 -> 0), then Block 1: 1, -5, 10, 2, -1, 4 , -6 Block 2: -1, 4, -6, 2, 3, -10, 5 Among one, two, and three flips solutions define A = (2 4 6), B = (7) Distortion for original approach is 120.9 + 90 = 210.9
  • 15. Experimental results The stego images have been tested by using 274 – features steganalysis method proposed by Pevny and Fridrich
  • 16. Conclusion The proposed oimproved matrix encoding: - achieves higher capacity. - can improve any block based steganographic method - decrease detectability of steganalysis - can be improved further.