Journal of Guangxi Normal University(Natural Science Edition) ›› 2012, Vol. 30 ›› Issue (3): 119-124.

Previous Articles     Next Articles

Information Hiding Algorithm for JPEG Images Based on Block

ZHANG Xian-quan1,2, WANG Xian-hui1, WANG Xiao-yun3, YUChun-qiang1   

  1. 1.College of Computer Science and Information Technology,Guangxi Normal University,Guilin Guangxi 541004, China;
    2.Network Center,Guangxi Normal University,Guilin Guangxi 541004,China;
    3.College of Mathematics and Computer Science,Yangtze Normal University,Chongqing 408100,China
  • Received:2012-05-22 Online:2012-09-20 Published:2018-12-04

Abstract: The cover image is firstly divided into non-overlapping blocks,whichare then classified into different categories according to quantized DCT coefficients of each block and the characteristics of Human Visual System.Different methods are adopted to hide the secret data in AC coefficients for different typesof blocks in order to reduce the influence on the cover image.The types of imageblock remain unchanged after secret is hidden in these blocks,thereby the secretdata can be extracted exactly.Experimental results show that the proposed algorithm can not only maintain visual quality of JPEG image but also achieve high capacity.

Key words: information hiding, JPEG, DCT coefficients, block

CLC Number: 

  • TN919.81
[1] 周清雷,黄明磊.JPEG图像的信息隐藏方法[J].计算机工程与设计,2010,31(19):4178-4181.
[2] 张玉金,蒋品群.基于离散余弦变换和Arnold变换的数字水印算法[J].广西师范大学学报:自然科学版,2009,27(1):13-16.
[3] WONG P H W,AU O C,WONG J W C.Data hiding and watermarking in JPEG compressed domin by DC coefficient modification[C]//Security and Watermarking of Multimedia Contents Ⅱ:Proceedings of SPIE Vol 3971.Bellingham,WA:SPIE,2000:237-244.
[4] WONG P H W,AU O C,WONG J W C.A Data hiding technique in JPEG compressed domain[C]//Security and Watermarking of Multimedia Contents Ⅲ:Proceedings ofSPIE Vol 4314.Bellingham,WA:SPIE,2001:309-320.
[5] JOHNSON N F,JAJODIA S.Steganalysis of image created using currentsteganography software[C]//Information Hiding:Second International Workshop:LNCS Vol 1525.Berlin:Springer,1998:273-289.
[6] WESTFELD A.F5:a steganographic algorithm high capacity despite better steganalysis[C]//Information Hiding:4th International Workshop on Information Hiding:LNCS Vol 2137.Berlin:Springer-Verlag,2001:289-302.
[7] 刘光杰,戴跃伟,孙金生,等.用于JPEG图像的高容量信息隐藏算法[J].电路与系统,2007,36 (1):102-135.
[8] TSENG Hsien-wen,CHANG Chin-chen.High capacity data hiding in JPEG-compressed images[J].Informatica,2004,15(1):127-142.
[9] 龚发根,秦拯.分块自适应JPEG图像数据隐藏算法[J].计算机应用研究,2010,27(10):3883-3888.
[1] ZHANG Canlong, LI Yanru, LI Zhixin, WANG Zhiwen. Block Target Tracking Based on Kernel Correlation Filter and Feature Fusion [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(5): 12-23.
[2] BAI Shuyi, ZHOU Tao, PENG Shali, GAN Lingfang, ZHAN Xiaoqin. Block-transitive 2-(v,k,λ) Designs with Imprimitive Group ScwrSd [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(4): 59-65.
[3] WANG Han, WANG Xu’an, ZHOU Neng, LIU Yudong. Blockchain-based Public Verifiable Scheme for Sharing Data [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 1-7.
[4] CHEN Xiong, ZHU Yu, FENG Ke, YU Tongwei. Identity Authentication of Power System Safetyand Stability Control Terminals Based on Blockchain [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 8-18.
[5] SUN Ronghai, SHI Linfu, HUANG Liyan, TANG Zhenjun, YU Chunqiang. Reversible Data Hiding Based on Image Interpolation and Reference Matrix [J]. Journal of Guangxi Normal University(Natural Science Edition), 2019, 37(2): 90-104.
[6] YU Chunqiang, DENG Fangzhou, ZHANG Xianquan, TANG Zhenjun, CHEN Yan, HE Nan. A Reversible Information Hiding Method Based on Multiple Prediction Values [J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(2): 24-32.
[7] YU Chunqiang , FU Rui , CHEN Yan , LEI Yun , ZHANG Xianquan , WANG Xiaoyun. Protecting Method of Regions of Interest of ImageBased on Information Hiding [J]. Journal of Guangxi Normal University(Natural Science Edition), 2016, 34(2): 67-73.
[8] LIU Xi-fu. The Group Inverses and Drazin Inverses of a Class of Anti-triangular Block Matrices [J]. Journal of Guangxi Normal University(Natural Science Edition), 2015, 33(3): 61-65.
[9] DING Xin-yue, XU Mei-ping. Computing VaR and ES Based on the Extreme Value Theory:A Case Study of ZTE Data [J]. Journal of Guangxi Normal University(Natural Science Edition), 2015, 33(2): 76-81.
[10] LIANG Qiu-yue, CUI Yao-dong, YOU Ling-wei. Solving Two-dimensional Cutting Stock Problem with Three-block Patterns [J]. Journal of Guangxi Normal University(Natural Science Edition), 2014, 32(3): 41-45.
[11] LEI Yun, WANG Xian-hui, WANG Xiao-yun, SUN Ze-rui, YU Chun-qiang, ZHANG Xian-quan. An Information Hiding Method Based on JPEG Images [J]. Journal of Guangxi Normal University(Natural Science Edition), 2013, 31(4): 48-53.
[12] QIN Yong-song, YANG Cui-lian. Empirical Likelihood for Marginal Joint Probability Density Functions of a Negatively Associated Sample [J]. Journal of Guangxi Normal University(Natural Science Edition), 2012, 30(3): 22-29.
[13] SHANG Jing, NI Qing-ling, GUI Liu-cheng, WANG Xiu-jian, HUANG Ting-hong, MA Kai, ZENG Jian-qiang. Synthesis of Crystal Structure of {HgBr22-Cu(C26H22O2N4)]}n [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(2): 61-64.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!