TY - GEN
T1 - A high-performance YASS-like scheme using randomized big-blocks
AU - Yu, Lifang
AU - Zhao, Yao
AU - Ni, Rongrong
AU - Shi, Yun Q.
PY - 2010
Y1 - 2010
N2 - Randomly selecting 8 × 8 host blocks in big-blocks for data embedding, YASS [1], a recently developed advanced steganographic scheme makes these blocks not coincident with the 8×8 grids used in JPEG compression. As a result, it effectively invalidates the self-calibration technique used in modern steganalysis. However, the randomization is not sufficient enough, i.e., some positions in an image are possible to hold host blocks and some are definitely not. Based on this observation, the newly developed specific steganalyzer [2] can effectively defeat YASS. In this paper, a new steganographic scheme is presented. Through randomizing the size and position of each big-block, our improved steganographic method makes almost every position possible to hold a host block, which has been verified by our statistical analysis. Consequently, the proposed scheme can survive the attack made by the specific steganalyzer. Experimental results have demonstrated that the detection rate achieved by the specific steganalyzer on our proposed method is less than 58%, while that on YASS is about 95% and above.
AB - Randomly selecting 8 × 8 host blocks in big-blocks for data embedding, YASS [1], a recently developed advanced steganographic scheme makes these blocks not coincident with the 8×8 grids used in JPEG compression. As a result, it effectively invalidates the self-calibration technique used in modern steganalysis. However, the randomization is not sufficient enough, i.e., some positions in an image are possible to hold host blocks and some are definitely not. Based on this observation, the newly developed specific steganalyzer [2] can effectively defeat YASS. In this paper, a new steganographic scheme is presented. Through randomizing the size and position of each big-block, our improved steganographic method makes almost every position possible to hold a host block, which has been verified by our statistical analysis. Consequently, the proposed scheme can survive the attack made by the specific steganalyzer. Experimental results have demonstrated that the detection rate achieved by the specific steganalyzer on our proposed method is less than 58%, while that on YASS is about 95% and above.
KW - JPEG
KW - Randomization
KW - Steganalysis
KW - Steganography
KW - YASS
UR - http://www.scopus.com/inward/record.url?scp=78349262285&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78349262285&partnerID=8YFLogxK
U2 - 10.1109/ICME.2010.5582542
DO - 10.1109/ICME.2010.5582542
M3 - Conference contribution
AN - SCOPUS:78349262285
SN - 9781424474912
T3 - 2010 IEEE International Conference on Multimedia and Expo, ICME 2010
SP - 474
EP - 479
BT - 2010 IEEE International Conference on Multimedia and Expo, ICME 2010
T2 - 2010 IEEE International Conference on Multimedia and Expo, ICME 2010
Y2 - 19 July 2010 through 23 July 2010
ER -