New JPEG steganographic scheme with high security performance

Fangjun Huang, Yun-Qing Shi, Jiwu Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations


In this paper, we present a new JPEG steganographic scheme. Three measures are taken in our method: 1) The secret message bits are not spread into the quantized block discrete cosine transform (BDCT) coefficients of all frequencies, and only those coefficients (including those of value 0) belonging to relatively low frequencies are selected for data embedding; 2) For any coefficients selected for embedding, the rounding error in JPEG quantization is utilized directly to guide the data embedding; 3) Matrix embedding. The experiments have demonstrated that these three measures can help to achieve small distortion in spatial domain, preserve the histogram of quantized block discrete cosine transform coefficients, and enhance the embedding efficiency of matrix embedding, etc. Consequently, the proposed steganographic scheme has achieved a high security performance. It can resist today's most powerful JPEG steganalyzers effectively.

Original languageEnglish (US)
Title of host publicationDigital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers
Number of pages13
StatePublished - Feb 1 2011
Event9th International Workshop on Digital Watermarking, IWDW 2010 - Seoul, Korea, Republic of
Duration: Oct 1 2010Oct 3 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6526 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other9th International Workshop on Digital Watermarking, IWDW 2010
Country/TerritoryKorea, Republic of

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science


  • BDCT
  • Frequency
  • JPEG steganographic scheme


Dive into the research topics of 'New JPEG steganographic scheme with high security performance'. Together they form a unique fingerprint.

Cite this