Advanced Search
Volume 32 Issue 2
Aug.  2010
Turn off MathJax
Article Contents
Deng Yi, Zhao Xian-feng, Feng Deng-guo. Quantization Index Modulation Steganography Based on the Nonuniform DCT[J]. Journal of Electronics & Information Technology, 2010, 32(2): 323-328. doi: 10.3724/SP.J.1146.2008.01399
Citation: Deng Yi, Zhao Xian-feng, Feng Deng-guo. Quantization Index Modulation Steganography Based on the Nonuniform DCT[J]. Journal of Electronics & Information Technology, 2010, 32(2): 323-328. doi: 10.3724/SP.J.1146.2008.01399

Quantization Index Modulation Steganography Based on the Nonuniform DCT

doi: 10.3724/SP.J.1146.2008.01399
  • Received Date: 2008-11-03
  • Rev Recd Date: 2009-11-23
  • Publish Date: 2010-02-19
  • Steganography based on Quantization Index Modulation (QIM) is being increasingly threatened by steganalysis. This paper improves the existing steganographic methods embedding data in Non-uniform Discrete Cosine Transform (NDCT) domain instead of more commonly used Discrete Cosine Transform (DCT) domain, and proposes the NDCT-QIM image steganography which uses the parameters of NDCT as its secret key. Since the embedded signal disperses in the domain guessed by an attacker, the NDCT-QIM method makes steganalysis difficult to detect the characteristics of steganography. The analysis and experiments show that it improves the covertness of embedded signal, and is more resistant to the commonly used steganalysis methods, including those respectively based on testing gradient energy, histogram, wavelet characteristics, etc.
  • loading
  • Johnson N and Jajodia S. Exploring steganography: seeing the unseen[J]. IEEE Computer, 1998, 31(2): 26-34.[2]Sutaone M S and Khandare M V. Image based steganography using LSB insertion technique[C]. IET International Conference on Wireless, Mobile and Multimedia Networks, Mumbai, India, 2008: 146-151.[3]Noda H, Niimi M, and Kawaguchi E. Steganographic Methods Focusing on BPCS Steganography[M]. Heidelberg: Springer Berlin Publisher, 2007: 189-229.[4]Huang C H, Chuang S C, and Wu J L. Digital-invisible-ink data hiding based on spread-spectrum and quantization techniques[J].IEEE Transactions on Multimedia.2008, 10(4):557-569[5]Chen B and Wornell G W. Quantization index modulation methods for digital watermarking and information embedding of multimedia[J].Journal of VLSI Signal Processing.2001, 27(1-2):7-33[6]Lie W N and Lin G S. A feature-based classification technique for blind image steganalysis[J].IEEE Transactions on Multimedia.2005, 7(6):1007-1020[7]Malik H.[J].Subbalakshmi K P, and Chandramouli R. Steganalysis of QIM-based data hiding using kernel density estimation[C]. Proc. MMSec07. Dallas, Texas, USA.2007,:-[8]Lyu S and Farid H. Detecting hidden messages using higher-order statistics and support vector machines[C]. Proc. IH02. Noordwijkerhout, Netherlands, 2002, LNCS, Vol. 2578: 340-354.[9]Xuan G, Shi Y Q, Gao J, Zou D, Yang C, Zhang Z, Chai P, Chen C, and Chen W. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic function[C]. Proc. IH05, Barcelona, Spain, 2005.LNCS, Vol. 3727: 262-277.[10]Noda H, Niimi M, and Kawaguchi E. Application of QIM with dead zone for histogram preserving JPEG steganography[C]. Proc. ICIP05. Genova, Italy, 2005. Vol. 2: 1082-1085.[11]Solanki K, Sullivan K, Madhow U, Manjunath B S, and Chandrasekaran S. Statistical restoration for robust and secure steganography[C][J].Proc. ICIP05. Genova, Italy.2005, Vol. 2:1118-1121[12]Zhao X F, Xia B B, and Deng Y. Strengthening QIM-based watermarking by non-uniform discrete cosine transform[C][J].Proc. IH08. Santa Barbara, USA.2008, LNCS 5284:309-324[13]Fridrich J, Baldoza A C, and Simart R J. Robust digital watermarking based on key-dependent basis functions[C][J].Proc. IH98. Portland, Oregon, USA.1998, LNCS 1525:143-157[14]Xie L, Zhang J S, and He H J. A novel robust audio watermarking scheme based on nonuniform discrete fourier transform[J]. Chinese Journal of Computers, 2006, 29(9): 1711-1721.[15]Dietl W, Meerwald P, and Uhl A. Protection of wavelet-based watermarking systems using filter parametrization[J].Signal Processing.2003, 83(10):2095-2116
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (4032) PDF downloads(872) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return