IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 6    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 6,June 2012
Improving the F5 Steganography Method through Shrinkage Mapping
Full Text(PDF, )  PP.949-953  
Ali Akbar hashemi , Navid daryasafar
Steganography, JPEG images, F5 method, shrinkagemapping
There are a lot of methods for embedding hidden information in JPEG format but no method have been presented so far with a high capacity and same accuracy. The loss of JPEG compression and the effects of such compression on the images have prevented the location area from being easily used for embedding and most of the methods apply the DCT coefficients of JPEG algorithm for this aspect. This paper illustrates the shrinkage phenomenon which happens during F5 embedding process. It also shows all of the effects of shrinkage on F5 algorithm and presents a new F5 model based on the original method in order to reduce the shrinkage rate. The suggested method controlled the shrinkage rate by making a shrinkage map. Afterward, a comparison would be performed between the suggested method and the common F5me. Of course, considering the main factors of steganography such as embedding capacity and image quality, it indicates how the suggested method provides more capacity for embedding and preserves the image quality.
[1] Wayner, p., “Disappearing Cryptography”, 2nd Edition , by Elsivier Science (USA), 2002.

[2] Anderson, R.J, Petitcolas, F.A.P., “On the Limits of Steganography”, IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and privacy Protection, Vol. 16(4), pp. 474-481, May 1998.

[3] R.C.Gonzales and R.E Woods ,Digital Image processing ,Addison publishing Co ,1993.

[4] Fridrich, J., Goljan, M., Du, R., “Steganalysis Based on JPEG Compatibility”, Proc. SPIE Multimedia System and Applications IV, Denver Vol. 4518,pp. 275-280 Colorado, 2001.

[5] Westfeld, A., Pfitzman, A., “Attacks on Steganographic Systems”, Proc. 3rd Int’l Information Hiding Workshop , Springer-Verlog, Berlin Heidelberg New York, , pp. 61-76, 1999.

[6] Westfeld, A., “F5__ A Steganographic Algorithm :High Capacity Despite Better Steganalysis”, Proc. 4th Int’l Information Hiding Workshop, Springer-Verlog Vol.2137, Berlin Heidelberg New York , pp.289-302, 2001.

[7] Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes, 6th Information Hiding Workshop, J. Fridrich (ed), LNCS, vol. 3200, Springer-Verlag, pp. 67-81, 2004.Determining

[8] New Methodology for Breaking Steganographic Techniques for JPEGs, with M. Goljan and D. Hogea, in Proc. SPIE Electronic Imaging Santa Clara, CA, Jan 2003, pp. 143-155.

Untitled Page