Scientific and Technical Journal


ISSN Print 2221-3937
ISSN Online 2221-3805

Some image statistics changes for embedding information with container image statistics accounting and without were checked.As a container considered static digital images in JPEG file format, data hiding in least significant bits of container discrete cosine transform coefficients provided. Container distortion parameters were measured and chi-square test was conducted for embedding information with container image statistics accounting and without. Also values distribution for container discrete cosine transform coefficients was checked. Obtained data allow improving algorithm with image statistic features considering. Decreasing image distortions and statistics changes will reduce probability of hidden message detection with histogram-based and statistical steganoanalysis.

DOI 10.15276/eltecs.23.99.2016.13

1.  Konahovich G.F., and Puzyrenko A. Ju.,Komp'juternaja ste-ganografija. Teorija i praktika [Computer Steganography. Theory and Practice],(2006), Kiev, Ukraine, МК-Press”, 288p. (In Russian).

2.  Chin-Chen Chang, Tung-Shou Chen, and Lou-Zo Chung, (2002), A steganographic Method based upon JPEG and Quantization table, Information Sciences, Vol.141 pp. 123 –138 (in English).

3.  Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani, 2012, Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, pp. 458 – 462 (In English).

4.  Prokhozhev N.N., Mikhailichenko O. V., Korobeinikov A.G. Povyshenie ustoichivosti steganoalgoritmov chastotnoi oblasti na osnove diskretno-kosinusnogo preobrazovaniya k vneshnim vozdeistviyam [Improving Robustness for Frequency domain Steganographic Algorithms based on Discrete cosine Transform], (2009), Nauchno-tekhnicheskii Vestnik Sankt-Peterburgskogo Gosudarstvennogo Universiteta Informatsionnykh Tekhnologii, Mekhaniki i Optiki, Vol.2(60),pp. 102 – 106 (In Russian).

5.  Siwei Lyu, (2005), Natural Image Statistics for Digital Image Forensics, a Thesis Submitted to the Faculty in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Computer Science, Siwei Lyu, Hanover, USA, 102 p.

6.  Quan Weiwei, Guo Yanqing, and Kong Xiangwei, (2006), JPEG Quantization-Distribution Steganalytic Method Attacking Jsteg, IJCSNS International Journal of Computer Science and Network Security, Vol. 6, No.7 B, pp. 192 – 195 (In English).

7.  Xiaoyi Yu, Yunhong Wang, and Tieniu Tan, (2004), On Estimation of Secret Message Length in JSteg-like Steganography, Proceedings of the 17th International Conference on Pattern Recognition, pp. 673 –676 (In English).

8.  Aapo Hyvärinen, Jarmo Hurri, and Patrik O. Hoyer, (2009), Natural Image Statistics, Aapo Hyvärinen, Springer, 467 p.

9.  Zontak M., and  Irani M., (2011), Internal Statistics of a Single Natural Image, Proceedings of the IEEE International Conference on Computer Vision and Pattern Recognition, pp. 977 – 984 (In English).

10.  Kalashnіkov M., Jakovenko O., Kushnіrenko N., and Chechel'nic'kij V.,Rozrobka steganografіchnogo algoritmu іz urahuvannjam statistiki zobrazhennja-kontejnera [ADevelopmentofSteganographicAlgorithmConsideringContainerimageStatistic], (2015), Materіali IV mіzhnarodnoї Naukovo-tehnіchnoї Konfe-rencії Zahist Informacії і Bezpeka Informacіjnih Sistem, Lviv, Ukraine, pp. 129 – 131 (InUkrainian).

11.  Kushnіrenko N.І., Chechel'nic'kij V. Ja., Metod kriptografіchnoї peredachі іnformacії na bazі ekvіvalentnogo klasu doskonalih dvіjkovih reshіtok [Method of Cryptographic data Transfer based on Equivalent class of Perfect Binary Lattices], (2014), Іnformatika ta Matematichnі Metodi v Modeljuvannі, Odessa, Ukraine, Vol. 3, pp. 210 – 218 (inRussian).

12.  Independent JPEG Group [Electronic resource], Independent JPEG Group, (In English), Mode of access: www. Url:, (accessed 27.05.2016). – Title from the screen.

Last download:
2018-05-27 14:59:06

[ © KarelWintersky ] [ All articles ] [ All authors ]
[ © Odessa National Polytechnic University, 2014. Any use of information from the site is possible only under the condition that the source link! ]