Payload location for JPEG image steganography based on co-frequency sub-image filtering

In digital steganography, due to difficulties estimating the JPEG cover image, it is still very hard to accurately locate the hidden message embedded in a JPEG image. Therefore, this study proposes a payload location method for a category of pseudo-random scrambled JPEG image steganography. In order...

Full description

Saved in:
Bibliographic Details
Main Authors: Jie Wang, Chunfang Yang, Ping Wang, Xiaofeng Song, Jicang Lu
Format: Article
Language:English
Published: Wiley 2020-01-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/1550147719899569
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849471329383743488
author Jie Wang
Chunfang Yang
Ping Wang
Xiaofeng Song
Jicang Lu
author_facet Jie Wang
Chunfang Yang
Ping Wang
Xiaofeng Song
Jicang Lu
author_sort Jie Wang
collection DOAJ
description In digital steganography, due to difficulties estimating the JPEG cover image, it is still very hard to accurately locate the hidden message embedded in a JPEG image. Therefore, this study proposes a payload location method for a category of pseudo-random scrambled JPEG image steganography. In order to estimate the quantized discrete cosine transform coefficients in the cover JPEG image, a cover JPEG image estimation method is proposed based on co-frequency sub-image filtering. The proposed payload location method defines a general residual, uses the estimated cover JPEG image to compute the residuals, and then employs the mean residuals of multiple stego images embedded along the same path to distinguish the stego positions. The proposed cover JPEG image estimation method constructs 64 co-frequency sub-images, and then filters the sub-image to estimate the cover JPEG image. Finally, using these methods, payload location algorithms are designed for two common JPEG image steganography algorithms: JSteg and F5. Experimental results show that the proposed location algorithms can effectively locate the stego positions in both JSteg and F5 steganography when the investigator possesses multiple stego images embedded along the same path. In addition, the location results can also be used to recover the steganography key to extract the embedded secret messages.
format Article
id doaj-art-eaaa4152a0784c9295c7178d14304805
institution Kabale University
issn 1550-1477
language English
publishDate 2020-01-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-eaaa4152a0784c9295c7178d143048052025-08-20T03:24:52ZengWileyInternational Journal of Distributed Sensor Networks1550-14772020-01-011610.1177/1550147719899569Payload location for JPEG image steganography based on co-frequency sub-image filteringJie Wang0Chunfang Yang1Ping Wang2Xiaofeng Song3Jicang Lu4Zhengzhou Science and Technology Institute, Zhengzhou, ChinaZhengzhou Science and Technology Institute, Zhengzhou, ChinaZhengzhou Science and Technology Institute, Zhengzhou, ChinaSchool of Information and Communication, National University of Defense Technology, Xi’an, ChinaZhengzhou Science and Technology Institute, Zhengzhou, ChinaIn digital steganography, due to difficulties estimating the JPEG cover image, it is still very hard to accurately locate the hidden message embedded in a JPEG image. Therefore, this study proposes a payload location method for a category of pseudo-random scrambled JPEG image steganography. In order to estimate the quantized discrete cosine transform coefficients in the cover JPEG image, a cover JPEG image estimation method is proposed based on co-frequency sub-image filtering. The proposed payload location method defines a general residual, uses the estimated cover JPEG image to compute the residuals, and then employs the mean residuals of multiple stego images embedded along the same path to distinguish the stego positions. The proposed cover JPEG image estimation method constructs 64 co-frequency sub-images, and then filters the sub-image to estimate the cover JPEG image. Finally, using these methods, payload location algorithms are designed for two common JPEG image steganography algorithms: JSteg and F5. Experimental results show that the proposed location algorithms can effectively locate the stego positions in both JSteg and F5 steganography when the investigator possesses multiple stego images embedded along the same path. In addition, the location results can also be used to recover the steganography key to extract the embedded secret messages.https://doi.org/10.1177/1550147719899569
spellingShingle Jie Wang
Chunfang Yang
Ping Wang
Xiaofeng Song
Jicang Lu
Payload location for JPEG image steganography based on co-frequency sub-image filtering
International Journal of Distributed Sensor Networks
title Payload location for JPEG image steganography based on co-frequency sub-image filtering
title_full Payload location for JPEG image steganography based on co-frequency sub-image filtering
title_fullStr Payload location for JPEG image steganography based on co-frequency sub-image filtering
title_full_unstemmed Payload location for JPEG image steganography based on co-frequency sub-image filtering
title_short Payload location for JPEG image steganography based on co-frequency sub-image filtering
title_sort payload location for jpeg image steganography based on co frequency sub image filtering
url https://doi.org/10.1177/1550147719899569
work_keys_str_mv AT jiewang payloadlocationforjpegimagesteganographybasedoncofrequencysubimagefiltering
AT chunfangyang payloadlocationforjpegimagesteganographybasedoncofrequencysubimagefiltering
AT pingwang payloadlocationforjpegimagesteganographybasedoncofrequencysubimagefiltering
AT xiaofengsong payloadlocationforjpegimagesteganographybasedoncofrequencysubimagefiltering
AT jicanglu payloadlocationforjpegimagesteganographybasedoncofrequencysubimagefiltering