Professional Documents
Culture Documents
4, AUGUST 2012
1181
I. INTRODUCTION
Note that the application of PQ channel selection rule has covered a wide range of information-reducing operations such as
lossy compression, downsampling and A/D conversion, etc. As
an example, Fridrich et al. [3] have implemented the PQ channel
selection rule in JPEG steganography, which is based on the assumption that the raw, uncompressed image is available to the
sender. According to the PQ channel selection rule, the secret
message bits are embedded into those changeable coefficients
whose rounding errors are close to 0.5. Since the unrounded coefficients (i.e., the DCT coefficients that have been divided by
the quantization steps and not yet rounded) can be rounded either up or down without a noticeable difference, embedding the
secret message bits into these coefficients will be more difficult to be perceived. For example, suppose that the unrounded
( is a small posDCT coefficient is with the value of
itive value), this coefficient will be rounded to 3 in standard
, which
JPEG compression, and the rounding error is
is close to 0.5. If the secret bit 0 is embedded into this coefficient, the quantized DCT (i.e., the DCT coefficients having
been divided by the quantization steps and rounded) coefficient
will be changed to 2 if only the least significant bit (LSB) of
the coefficient is modified. The error introduced by the embedding is
. As seen, the embedding error introduced by data
hiding is close to the rounding error in standard JPEG compression. It will not introduce a noticeable distortion to the carrier
JPEG image and hence can improve the security performance
of the steganographic schemes. For simplicity, the difference
between the rounding error and embedding error is called perturbation error (PE) in this paper. As seen, the philosophy behind PQ channel selection rule is to embed the secret message
bits into those changeable coefficients whose rounding errors
are close to 0.5, i.e., the perturbation errors are close to zero.
However, since in standard JPEG compression, the number of
generated DCT coefficients whose rounding errors are close to
0.5 is rather small, the application of PQ channel selection rule
will be restricted by the few changeable DCT coefficients. In
[3], Fridrich et al. have exemplified how to apply the PQ channel
selection rule in JPEG steganographic schemes with wet paper
codes. They take a singly compressed JPEG file as the cover
image and embed the secret message bits when recompressing
the JPEG image for the second time with a quality factor lower
than the previous one. While the quantization steps in a singly
compressed image and the doubly compressed image satisfy a
certain linear relationship, a lot of changeable DCT coefficients,
i.e., the coefficients with rounding error of 0.5, will be generated. Hence, the PQ channel selection rule can be easily applied
in the double JPEG compressing process [3].
In [4], Fridrich et al. presented two other updated versions
of PQ: texture-adaptive PQ (PQt) and energy-adaptive PQ
(PQe). Through considering the local block characteristics
such as texture complexity and energy capacity, better security
1182
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 4, AUGUST 2012
AND ITS
1183
JPEG steganography, the quantized DCT coefficients with minimal detectable distortion, which are computed according to (3),
will be selected for data hiding.
As seen from (3) in our new channel selection rule, the impacts of the presented two new factors QS and MQ are controlled by
and , respectively. Different values of
and
may result in different anti-detection capability of our new
channel selection rule. Since the statistics of images and the
extracted features of todays universal JPEG steganalyzers are
complex, moreover the three factors, i.e., PE, QS and MQ are
not independent and they would interact with each other, it is not
easy to establish a direct link between the anti-detection capability and the control parameters
and
theoretically. However, in the next section, our various experiments will be given
to demonstrate that via introducing these two new factors, i.e.,
QS and MQ separately into our proposed channel selection rule,
the detection capability of todays universal JPEG steganalyzers
can be decreased significantly. Moreover, both of these two control parameters, and , can be selected in a wide range. Our
experimental results will also demonstrate that with the combination of QS and MQ, the detection capability of todays universal JPEG steganalyzers can be decreased even further.
round
(1)
where round
rounds the element to its nearest integer. Note
that in (1),
represents the quantized DCT coefficient that is
obtained in JPEG compression without secret message embedding. When some secret bit is embedded into the quantized DCT
coefficient
, the coefficient after data hiding is denoted by
. The aforementioned perturbation error can be represented
as
(2)
where
is a function that returns the absolute value of the corresponding element . In (2),
and
represent the above-mentioned embedding error and rounding error,
respectively. Note that if the secret message bit is embedded
through changing the LSB of the quantized DCT coefficient,
will be equal to
(while the embedded message bit is
the same as the LSB of
) or
(while the embedded
message bit is different from the LSB of
). According to (2),
when the fractional part of the unrounded DCT coefficients
is as close as 0.5, minimal perturbation error will possibly be
obtained. Especially, when
is equal to
, no perturbation
error will be introduced and
is equal to zero.
In our new channel selection rule, the PE will be considered
with QS and MQ simultaneously. According to the previous
analysis, in order to reduce the detectable distortion that may
be introduced by data hiding, we need to embed the secret message bit into those coefficients which are associated with small
values of PE and QS, whereas with large value of MQ. Thus,
the detectable distortion in our channel selection rule is defined
as
(3)
In (3),
and
are two parameters that are used
to control the impacts caused by
and
. Since in most
of the JPEG steganographic schemes, secret message bits are
only embedded into those nonzero quantized DCT coefficients,
the parameter is generally selected as 0. Otherwise, the parameter can be selected as a relatively small constant, e.g.,
the value 1. When our new channel selection rule is applied in
(4)
and
is the coefficient after having been
where
modified. The message bits
are embedded into
the corresponding coefficient block
according
to the following three steps.
1) Conduct matrix embedding with
codes to find
the coefficient that may need to be modified in block .
Suppose the quantized ac DCT coefficient that needs to be
changed in block is
. According to (3),
we can compute the distortion
when the coefficient
is changed, as in (4). Note that in this step, if no coefficient
needs to be changed in this block via matrix embedding, all
1184
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 4, AUGUST 2012
1185
Fig. 4. Detection accuracy rates of N-MME2 corresponding to different parameter combinations (with RBF kernel). (a) With increasing of
while
.
(2) With increasing of
while
1186
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 4, AUGUST 2012
Fig. 5. Detection accuracy rates of N-MME3 corresponding to different parameter combinations (with RBF kernel). (a) With increasing of
while
.
(2) With increasing of
while
1187
Fig. 8. ROC curves of N-MME2 corresponding to different embedding rates (with RBF kernel). (a)
.
. (b)
. (c)
. (d)
Fig. 9. ROC curves of N-MME3 corresponding to different embedding rates (with RBF kernel). (a)
.
. (b)
. (c)
. (d)
the false positive rates and the vertical axes represent the true
positive rates. In each subfigure of Figs. 8 and 9, the embedding
rate is shown on the title. The legend shows the parameters
(i.e.,
and ) and the corresponding area under curve (AUC)
values for each curve. The ROC curves and the AUC values
1188
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 4, AUGUST 2012
Fig. 10. Detection accuracy rates of N-MME2 against three different JPEG steganalyzers (with RBF kernel). (a) MP-486. (b) ClbMp-324. (c) POMM-98.
1189
Fig. 11. Detection accuracy rates of N-MME3 against three different JPEG steganalyzers (with RBF kernel). (a) MP-486. (b) ClbMp-324. (c) POMM-98.
Fig. 12. Detection accuracy rates of N-MME2 against aforementioned four JPEG steganalyzers (with linear kernel). (a) ClbJFMP-274. (b) MP-486. (c) ClbMp324. (d) POMM-98.
factors, i.e., QS and MQ are considered besides PE. Various experimental results have demonstrated that the proposed two new
factors have significant contributions to decrease the detection
capability of todays universal JPEG steganalyzers. Moreover,
by combing these two new factors with PE simultaneously, the
efficiency of our new channel selection rule can be improved
even further. The proposed channel selection rule is easy to con-
1190
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 4, AUGUST 2012
Fig. 13. Detection accuracy rates of N-MME3 against aforementioned four JPEG steganalyzers (with linear kernel). (a) ClbJFMP-274. (b) MP-486. (c) ClbMp324. (d) POMM-98.
1191
Jiwu Huang (M98SM00) received the B.S. degree from Xidian University, China, in 1982, the M.S.
degree from Tsinghua University, China, in 1987, and
the Ph.D. degree from the Institute of Automation,
Chinese Academy of Science, in 1998.
He is currently a Professor with the School of Information Science and Technology, Sun Yat-sen University, Guangzhou, China. His current research interests include multimedia forensics and security.
Dr. Huang received the China National Funds for
Distinguished Young Scientists from NSF of China in
2003. He received the First-Grade Award in science research from the National
Ministry of Education, China, in 2004. He and his students won the best student paper award in the 8th International Workshop on Digital Watermarking
(Pusan, Korea) in 2008. He serves as a member of IEEE CASS Multimedia
Systems and Applications Technical Committee, and a member of IEEE SPS
Information Forensics and Security Technical Committee. He is an Associate
Editor for IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
LNCS Transactions on Data Hiding and Multimedia Security (Springer), and
EURASIP Journal on Information Security (Hindawi).