A DCT-based image steganographic method resisting statistical attacks

The aim of steganography is to conceal the very existence of hidden communication, so its demand on security is serious. The security includes both imperceptibility and undetectability. However, most steganographic methods do not pay enough attention to the undetectability. We propose a novel DCT-ba...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Rufeng Chu, Xinggang You, Xtangwei Kong, Xiaohui Ba
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 953
container_issue
container_start_page V
container_title
container_volume 5
creator Rufeng Chu
Xinggang You
Xtangwei Kong
Xiaohui Ba
description The aim of steganography is to conceal the very existence of hidden communication, so its demand on security is serious. The security includes both imperceptibility and undetectability. However, most steganographic methods do not pay enough attention to the undetectability. We propose a novel DCT-based steganographic method for images. The method takes advantage of the similarities of DCT coefficients between the adjacent image blocks and makes the embedding distortion spread to the adjacent image blocks. Experimental results demonstrate that not only can the proposed method preserve good image quality, but it can also resist some typical statistical attacks.
doi_str_mv 10.1109/ICASSP.2004.1327270
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_6IE</sourceid><recordid>TN_cdi_ieee_primary_1327270</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1327270</ieee_id><sourcerecordid>17611067</sourcerecordid><originalsourceid>FETCH-LOGICAL-i507-b5ff6ca3d4556f15ce86561ccd4d7712a523bdb1207358af20da63ca7ba430a23</originalsourceid><addsrcrecordid>eNpFUMtqwzAQFH1A0zRfkIsvPdpdveVjcNMHBFpIDr2FtSQ7ahPHWL7076viQmFhFmaYGYaQJYWCUigfXqvVdvteMABRUM4003BBZozrMqclfFySRakNpONGGMGuyIxKBrmiorwhtzF-AoDRwszIepU9Vru8xuhdFk7Y-iyOvsXu3A7YH4LNTn48nF02-BjiGLo28Tj-vhaPGY4j2q94R64bPEa_-MM52T2td9VLvnl7Tl03eZCg81o2jbLInZBSNVRab5RU1FonnNaUoWS8djVloLk02DBwqLhFXaPggIzPyf1k22NM6c2AnQ1x3w-p-PC9p1qldZROuuWkC977f3oaiv8AWLRaaw</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A DCT-based image steganographic method resisting statistical attacks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Rufeng Chu ; Xinggang You ; Xtangwei Kong ; Xiaohui Ba</creator><creatorcontrib>Rufeng Chu ; Xinggang You ; Xtangwei Kong ; Xiaohui Ba</creatorcontrib><description>The aim of steganography is to conceal the very existence of hidden communication, so its demand on security is serious. The security includes both imperceptibility and undetectability. However, most steganographic methods do not pay enough attention to the undetectability. We propose a novel DCT-based steganographic method for images. The method takes advantage of the similarities of DCT coefficients between the adjacent image blocks and makes the embedding distortion spread to the adjacent image blocks. Experimental results demonstrate that not only can the proposed method preserve good image quality, but it can also resist some typical statistical attacks.</description><identifier>ISSN: 1520-6149</identifier><identifier>ISBN: 9780780384842</identifier><identifier>ISBN: 0780384849</identifier><identifier>EISSN: 2379-190X</identifier><identifier>DOI: 10.1109/ICASSP.2004.1327270</identifier><language>eng</language><publisher>Piscataway, N.J: IEEE</publisher><subject>Applied sciences ; Cryptography ; Detection, estimation, filtering, equalization, prediction ; Discrete cosine transforms ; Educational technology ; Exact sciences and technology ; Histograms ; Humans ; Image quality ; Information, signal and communications theory ; Miscellaneous ; National security ; Research and development ; Resists ; Signal and communications theory ; Signal processing ; Signal, noise ; Statistical distributions ; Steganography ; Telecommunications and information theory</subject><ispartof>2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2004, Vol.5, p.V-953</ispartof><rights>2006 INIST-CNRS</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1327270$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,4036,4037,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1327270$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=17611067$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Rufeng Chu</creatorcontrib><creatorcontrib>Xinggang You</creatorcontrib><creatorcontrib>Xtangwei Kong</creatorcontrib><creatorcontrib>Xiaohui Ba</creatorcontrib><title>A DCT-based image steganographic method resisting statistical attacks</title><title>2004 IEEE International Conference on Acoustics, Speech, and Signal Processing</title><addtitle>ICASSP</addtitle><description>The aim of steganography is to conceal the very existence of hidden communication, so its demand on security is serious. The security includes both imperceptibility and undetectability. However, most steganographic methods do not pay enough attention to the undetectability. We propose a novel DCT-based steganographic method for images. The method takes advantage of the similarities of DCT coefficients between the adjacent image blocks and makes the embedding distortion spread to the adjacent image blocks. Experimental results demonstrate that not only can the proposed method preserve good image quality, but it can also resist some typical statistical attacks.</description><subject>Applied sciences</subject><subject>Cryptography</subject><subject>Detection, estimation, filtering, equalization, prediction</subject><subject>Discrete cosine transforms</subject><subject>Educational technology</subject><subject>Exact sciences and technology</subject><subject>Histograms</subject><subject>Humans</subject><subject>Image quality</subject><subject>Information, signal and communications theory</subject><subject>Miscellaneous</subject><subject>National security</subject><subject>Research and development</subject><subject>Resists</subject><subject>Signal and communications theory</subject><subject>Signal processing</subject><subject>Signal, noise</subject><subject>Statistical distributions</subject><subject>Steganography</subject><subject>Telecommunications and information theory</subject><issn>1520-6149</issn><issn>2379-190X</issn><isbn>9780780384842</isbn><isbn>0780384849</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFUMtqwzAQFH1A0zRfkIsvPdpdveVjcNMHBFpIDr2FtSQ7ahPHWL7076viQmFhFmaYGYaQJYWCUigfXqvVdvteMABRUM4003BBZozrMqclfFySRakNpONGGMGuyIxKBrmiorwhtzF-AoDRwszIepU9Vru8xuhdFk7Y-iyOvsXu3A7YH4LNTn48nF02-BjiGLo28Tj-vhaPGY4j2q94R64bPEa_-MM52T2td9VLvnl7Tl03eZCg81o2jbLInZBSNVRab5RU1FonnNaUoWS8djVloLk02DBwqLhFXaPggIzPyf1k22NM6c2AnQ1x3w-p-PC9p1qldZROuuWkC977f3oaiv8AWLRaaw</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Rufeng Chu</creator><creator>Xinggang You</creator><creator>Xtangwei Kong</creator><creator>Xiaohui Ba</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>A DCT-based image steganographic method resisting statistical attacks</title><author>Rufeng Chu ; Xinggang You ; Xtangwei Kong ; Xiaohui Ba</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i507-b5ff6ca3d4556f15ce86561ccd4d7712a523bdb1207358af20da63ca7ba430a23</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>Cryptography</topic><topic>Detection, estimation, filtering, equalization, prediction</topic><topic>Discrete cosine transforms</topic><topic>Educational technology</topic><topic>Exact sciences and technology</topic><topic>Histograms</topic><topic>Humans</topic><topic>Image quality</topic><topic>Information, signal and communications theory</topic><topic>Miscellaneous</topic><topic>National security</topic><topic>Research and development</topic><topic>Resists</topic><topic>Signal and communications theory</topic><topic>Signal processing</topic><topic>Signal, noise</topic><topic>Statistical distributions</topic><topic>Steganography</topic><topic>Telecommunications and information theory</topic><toplevel>online_resources</toplevel><creatorcontrib>Rufeng Chu</creatorcontrib><creatorcontrib>Xinggang You</creatorcontrib><creatorcontrib>Xtangwei Kong</creatorcontrib><creatorcontrib>Xiaohui Ba</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Rufeng Chu</au><au>Xinggang You</au><au>Xtangwei Kong</au><au>Xiaohui Ba</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A DCT-based image steganographic method resisting statistical attacks</atitle><btitle>2004 IEEE International Conference on Acoustics, Speech, and Signal Processing</btitle><stitle>ICASSP</stitle><date>2004</date><risdate>2004</risdate><volume>5</volume><spage>V</spage><epage>953</epage><pages>V-953</pages><issn>1520-6149</issn><eissn>2379-190X</eissn><isbn>9780780384842</isbn><isbn>0780384849</isbn><abstract>The aim of steganography is to conceal the very existence of hidden communication, so its demand on security is serious. The security includes both imperceptibility and undetectability. However, most steganographic methods do not pay enough attention to the undetectability. We propose a novel DCT-based steganographic method for images. The method takes advantage of the similarities of DCT coefficients between the adjacent image blocks and makes the embedding distortion spread to the adjacent image blocks. Experimental results demonstrate that not only can the proposed method preserve good image quality, but it can also resist some typical statistical attacks.</abstract><cop>Piscataway, N.J</cop><pub>IEEE</pub><doi>10.1109/ICASSP.2004.1327270</doi></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1520-6149
ispartof 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2004, Vol.5, p.V-953
issn 1520-6149
2379-190X
language eng
recordid cdi_ieee_primary_1327270
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Applied sciences
Cryptography
Detection, estimation, filtering, equalization, prediction
Discrete cosine transforms
Educational technology
Exact sciences and technology
Histograms
Humans
Image quality
Information, signal and communications theory
Miscellaneous
National security
Research and development
Resists
Signal and communications theory
Signal processing
Signal, noise
Statistical distributions
Steganography
Telecommunications and information theory
title A DCT-based image steganographic method resisting statistical attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-16T11%3A35%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20DCT-based%20image%20steganographic%20method%20resisting%20statistical%20attacks&rft.btitle=2004%20IEEE%20International%20Conference%20on%20Acoustics,%20Speech,%20and%20Signal%20Processing&rft.au=Rufeng%20Chu&rft.date=2004&rft.volume=5&rft.spage=V&rft.epage=953&rft.pages=V-953&rft.issn=1520-6149&rft.eissn=2379-190X&rft.isbn=9780780384842&rft.isbn_list=0780384849&rft_id=info:doi/10.1109/ICASSP.2004.1327270&rft_dat=%3Cpascalfrancis_6IE%3E17611067%3C/pascalfrancis_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1327270&rfr_iscdi=true