A DCT-based image steganographic method resisting statistical attacks
The aim of steganography is to conceal the very existence of hidden communication, so its demand on security is serious. The security includes both imperceptibility and undetectability. However, most steganographic methods do not pay enough attention to the undetectability. We propose a novel DCT-ba...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 953 |
---|---|
container_issue | |
container_start_page | V |
container_title | |
container_volume | 5 |
creator | Rufeng Chu Xinggang You Xtangwei Kong Xiaohui Ba |
description | The aim of steganography is to conceal the very existence of hidden communication, so its demand on security is serious. The security includes both imperceptibility and undetectability. However, most steganographic methods do not pay enough attention to the undetectability. We propose a novel DCT-based steganographic method for images. The method takes advantage of the similarities of DCT coefficients between the adjacent image blocks and makes the embedding distortion spread to the adjacent image blocks. Experimental results demonstrate that not only can the proposed method preserve good image quality, but it can also resist some typical statistical attacks. |
doi_str_mv | 10.1109/ICASSP.2004.1327270 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_6IE</sourceid><recordid>TN_cdi_ieee_primary_1327270</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1327270</ieee_id><sourcerecordid>17611067</sourcerecordid><originalsourceid>FETCH-LOGICAL-i507-b5ff6ca3d4556f15ce86561ccd4d7712a523bdb1207358af20da63ca7ba430a23</originalsourceid><addsrcrecordid>eNpFUMtqwzAQFH1A0zRfkIsvPdpdveVjcNMHBFpIDr2FtSQ7ahPHWL7076viQmFhFmaYGYaQJYWCUigfXqvVdvteMABRUM4003BBZozrMqclfFySRakNpONGGMGuyIxKBrmiorwhtzF-AoDRwszIepU9Vru8xuhdFk7Y-iyOvsXu3A7YH4LNTn48nF02-BjiGLo28Tj-vhaPGY4j2q94R64bPEa_-MM52T2td9VLvnl7Tl03eZCg81o2jbLInZBSNVRab5RU1FonnNaUoWS8djVloLk02DBwqLhFXaPggIzPyf1k22NM6c2AnQ1x3w-p-PC9p1qldZROuuWkC977f3oaiv8AWLRaaw</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A DCT-based image steganographic method resisting statistical attacks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Rufeng Chu ; Xinggang You ; Xtangwei Kong ; Xiaohui Ba</creator><creatorcontrib>Rufeng Chu ; Xinggang You ; Xtangwei Kong ; Xiaohui Ba</creatorcontrib><description>The aim of steganography is to conceal the very existence of hidden communication, so its demand on security is serious. The security includes both imperceptibility and undetectability. However, most steganographic methods do not pay enough attention to the undetectability. We propose a novel DCT-based steganographic method for images. The method takes advantage of the similarities of DCT coefficients between the adjacent image blocks and makes the embedding distortion spread to the adjacent image blocks. Experimental results demonstrate that not only can the proposed method preserve good image quality, but it can also resist some typical statistical attacks.</description><identifier>ISSN: 1520-6149</identifier><identifier>ISBN: 9780780384842</identifier><identifier>ISBN: 0780384849</identifier><identifier>EISSN: 2379-190X</identifier><identifier>DOI: 10.1109/ICASSP.2004.1327270</identifier><language>eng</language><publisher>Piscataway, N.J: IEEE</publisher><subject>Applied sciences ; Cryptography ; Detection, estimation, filtering, equalization, prediction ; Discrete cosine transforms ; Educational technology ; Exact sciences and technology ; Histograms ; Humans ; Image quality ; Information, signal and communications theory ; Miscellaneous ; National security ; Research and development ; Resists ; Signal and communications theory ; Signal processing ; Signal, noise ; Statistical distributions ; Steganography ; Telecommunications and information theory</subject><ispartof>2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2004, Vol.5, p.V-953</ispartof><rights>2006 INIST-CNRS</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1327270$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,4036,4037,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1327270$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17611067$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Rufeng Chu</creatorcontrib><creatorcontrib>Xinggang You</creatorcontrib><creatorcontrib>Xtangwei Kong</creatorcontrib><creatorcontrib>Xiaohui Ba</creatorcontrib><title>A DCT-based image steganographic method resisting statistical attacks</title><title>2004 IEEE International Conference on Acoustics, Speech, and Signal Processing</title><addtitle>ICASSP</addtitle><description>The aim of steganography is to conceal the very existence of hidden communication, so its demand on security is serious. The security includes both imperceptibility and undetectability. However, most steganographic methods do not pay enough attention to the undetectability. We propose a novel DCT-based steganographic method for images. The method takes advantage of the similarities of DCT coefficients between the adjacent image blocks and makes the embedding distortion spread to the adjacent image blocks. Experimental results demonstrate that not only can the proposed method preserve good image quality, but it can also resist some typical statistical attacks.</description><subject>Applied sciences</subject><subject>Cryptography</subject><subject>Detection, estimation, filtering, equalization, prediction</subject><subject>Discrete cosine transforms</subject><subject>Educational technology</subject><subject>Exact sciences and technology</subject><subject>Histograms</subject><subject>Humans</subject><subject>Image quality</subject><subject>Information, signal and communications theory</subject><subject>Miscellaneous</subject><subject>National security</subject><subject>Research and development</subject><subject>Resists</subject><subject>Signal and communications theory</subject><subject>Signal processing</subject><subject>Signal, noise</subject><subject>Statistical distributions</subject><subject>Steganography</subject><subject>Telecommunications and information theory</subject><issn>1520-6149</issn><issn>2379-190X</issn><isbn>9780780384842</isbn><isbn>0780384849</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFUMtqwzAQFH1A0zRfkIsvPdpdveVjcNMHBFpIDr2FtSQ7ahPHWL7076viQmFhFmaYGYaQJYWCUigfXqvVdvteMABRUM4003BBZozrMqclfFySRakNpONGGMGuyIxKBrmiorwhtzF-AoDRwszIepU9Vru8xuhdFk7Y-iyOvsXu3A7YH4LNTn48nF02-BjiGLo28Tj-vhaPGY4j2q94R64bPEa_-MM52T2td9VLvnl7Tl03eZCg81o2jbLInZBSNVRab5RU1FonnNaUoWS8djVloLk02DBwqLhFXaPggIzPyf1k22NM6c2AnQ1x3w-p-PC9p1qldZROuuWkC977f3oaiv8AWLRaaw</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Rufeng Chu</creator><creator>Xinggang You</creator><creator>Xtangwei Kong</creator><creator>Xiaohui Ba</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>A DCT-based image steganographic method resisting statistical attacks</title><author>Rufeng Chu ; Xinggang You ; Xtangwei Kong ; Xiaohui Ba</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i507-b5ff6ca3d4556f15ce86561ccd4d7712a523bdb1207358af20da63ca7ba430a23</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>Cryptography</topic><topic>Detection, estimation, filtering, equalization, prediction</topic><topic>Discrete cosine transforms</topic><topic>Educational technology</topic><topic>Exact sciences and technology</topic><topic>Histograms</topic><topic>Humans</topic><topic>Image quality</topic><topic>Information, signal and communications theory</topic><topic>Miscellaneous</topic><topic>National security</topic><topic>Research and development</topic><topic>Resists</topic><topic>Signal and communications theory</topic><topic>Signal processing</topic><topic>Signal, noise</topic><topic>Statistical distributions</topic><topic>Steganography</topic><topic>Telecommunications and information theory</topic><toplevel>online_resources</toplevel><creatorcontrib>Rufeng Chu</creatorcontrib><creatorcontrib>Xinggang You</creatorcontrib><creatorcontrib>Xtangwei Kong</creatorcontrib><creatorcontrib>Xiaohui Ba</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Rufeng Chu</au><au>Xinggang You</au><au>Xtangwei Kong</au><au>Xiaohui Ba</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A DCT-based image steganographic method resisting statistical attacks</atitle><btitle>2004 IEEE International Conference on Acoustics, Speech, and Signal Processing</btitle><stitle>ICASSP</stitle><date>2004</date><risdate>2004</risdate><volume>5</volume><spage>V</spage><epage>953</epage><pages>V-953</pages><issn>1520-6149</issn><eissn>2379-190X</eissn><isbn>9780780384842</isbn><isbn>0780384849</isbn><abstract>The aim of steganography is to conceal the very existence of hidden communication, so its demand on security is serious. The security includes both imperceptibility and undetectability. However, most steganographic methods do not pay enough attention to the undetectability. We propose a novel DCT-based steganographic method for images. The method takes advantage of the similarities of DCT coefficients between the adjacent image blocks and makes the embedding distortion spread to the adjacent image blocks. Experimental results demonstrate that not only can the proposed method preserve good image quality, but it can also resist some typical statistical attacks.</abstract><cop>Piscataway, N.J</cop><pub>IEEE</pub><doi>10.1109/ICASSP.2004.1327270</doi></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1520-6149 |
ispartof | 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2004, Vol.5, p.V-953 |
issn | 1520-6149 2379-190X |
language | eng |
recordid | cdi_ieee_primary_1327270 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Applied sciences Cryptography Detection, estimation, filtering, equalization, prediction Discrete cosine transforms Educational technology Exact sciences and technology Histograms Humans Image quality Information, signal and communications theory Miscellaneous National security Research and development Resists Signal and communications theory Signal processing Signal, noise Statistical distributions Steganography Telecommunications and information theory |
title | A DCT-based image steganographic method resisting statistical attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-16T11%3A35%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20DCT-based%20image%20steganographic%20method%20resisting%20statistical%20attacks&rft.btitle=2004%20IEEE%20International%20Conference%20on%20Acoustics,%20Speech,%20and%20Signal%20Processing&rft.au=Rufeng%20Chu&rft.date=2004&rft.volume=5&rft.spage=V&rft.epage=953&rft.pages=V-953&rft.issn=1520-6149&rft.eissn=2379-190X&rft.isbn=9780780384842&rft.isbn_list=0780384849&rft_id=info:doi/10.1109/ICASSP.2004.1327270&rft_dat=%3Cpascalfrancis_6IE%3E17611067%3C/pascalfrancis_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1327270&rfr_iscdi=true |