Towards Lower Bounds on Embedding Distortion in Information Hiding

  • Younhee Kim
  • Zoran Duric
  • Dana Richards
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4283)


We propose two efficient information hiding algorithms in the least significant bits of JPEG coefficients of images. Our algorithms embed information by modifying JPEG coefficients in such a way that the introduced distortion is minimized. We derive the expected value of the additional error due to distortion as a function of the message length and the probability distribution of the JPEG quantization errors of cover images. We have implemented our methods in Java and performed the extensive experiments with them. The experiments have shown that our theoretical predictions agree closely with the actual introduced distortions.


Discrete Cosine Transform Cover Image Information Hiding Stego Image Joint Photographic Expert Group 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Beser, N.D., Duerr, T.E., Staisiunas, G.P.: Authentication of digital video evidence. In: Proceedings of the SPIE International Conference on Applications of Digital Image Processing XXVI, vol. 5203, pp. 407–416 (2003)Google Scholar
  2. 2.
    Pramateftakis, A., Oelbaum, T., Diepold, K.: Authentication of mpeg-4-based surveillance video. In: Proceedings of International Conference on Image Processing, October 2004, vol. 1, pp. 33–37 (2004)Google Scholar
  3. 3.
    Anderson, R.J., Petitcolas, F.A.: On the limits of steganography. IEEE Journal on Selected Areas in Communications 16(4), 474–481 (1998)CrossRefGoogle Scholar
  4. 4.
    Mouline, P., Koetter, R.: Data-hiding codes. Proceedings of the IEEE 93(12), 2083–2126 (2005)CrossRefGoogle Scholar
  5. 5.
    Bartolini, F., Tefas, A., Barni, M., Pitas, I.: Image authentication techniques for surveillance applications. Proceedings of the IEEE 89(10), 1403–1418 (2001)CrossRefGoogle Scholar
  6. 6.
    Lin, E.T., Delp, E.J.: A review of fragile image watermarks. In: Proceedings of the Multimedia and Security Workshop Multimedia Contents, October 1999, pp. 25–29 (1999)Google Scholar
  7. 7.
    Tirkel, A.Z., Van Schyndel, R.G., Osborne, C.F.: A digital watermark. In: Proceedings of IEEE International Conference on Image Processing, November 1994, vol. 2, pp. 86–90 (1994)Google Scholar
  8. 8.
    Wolfgang, R., Delp, E.: A watermark for digital images. In: Proceedings of IEEE Internatinal Conference on Image Processing, September 1996, vol. 3, pp. 219–222 (1996)Google Scholar
  9. 9.
    Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for imageauthentication and ownership verification. IEEE Transactions on Image Processing 10(10) (2001)Google Scholar
  10. 10.
    Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proceedings of IEEE Internatinal Conference on Image Processing, October 1997, vol. 2, pp. 680–683 (1997)Google Scholar
  11. 11.
    Fridrich, J., Goljan, M., Baldoza, A.C.: New fragile authentication watermark for images. In: Proceedings of IEEE Internatinal Conference on Image Processing, September 2000, pp. 446–449 (2000)Google Scholar
  12. 12.
    Crandall, R.: Some Notes on Steganography. Posted on Steganography Mailing List (1998),
  13. 13.
    Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  14. 14.
    Fridrich, J., Goljan, M., Du, R.: Detecting LSB Steganography in color and gray-scale images. In: IEEE Multimedia Magazine, pp. 22–28 (October 2001)Google Scholar
  15. 15.
    Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  16. 16.
    Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography with wet paper codes. In: Proc. ACM Multimedia Workshop, Magdeburg, Germany (2004)Google Scholar
  17. 17.
    Gonzales, R.C., Woods, R.E.: Digital Image Processing. Addison-Wesley, Reading (2002)Google Scholar
  18. 18.
    Johnson, N., Duric, Z., Jajodia, S.: Information Hiding: Steganography and Watermarking — Attacks and Countermeasures. Kluwer Academic Publishers, Boston (2000)Google Scholar
  19. 19.
    Joint Photographic Experts Group,
  20. 20.
    Kim, Y., Duric, Z., Richards, D.: Limited Distortion in LSB Steganography. In: Proc. SPIE Electronic Image (2006)Google Scholar
  21. 21.
    Kundur, D., Hatzinakos, D.: Towards a telltale watermarking technique for tamper-proofing. In: Proceedings of IEEE Internatinal Conference on Image Processing, October 1998, vol. 2, pp. 409–413 (1998)Google Scholar
  22. 22.
    Liehua, G., Arce, X.: Joint wavelet compression and authentication watermarking. In: Proceedings of IEEE Internatinal Conference on Image Processing, October 1998, vol. 2, pp. 427–431 (1998)Google Scholar
  23. 23.
    Paopoulis, A.: Probability, Random Variables, and Stochastic Processes. McGraw-Hill, Boston (1991)Google Scholar
  24. 24.
    Sallee, P.: Model-Based Steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  25. 25.
    Schneier, B.: Applied Cryptography. John Willey & Sons Inc., West Sussex (1996)Google Scholar
  26. 26.
    Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: IH 1999. LNCS, vol. 1768, pp. 61–75. Springer, New York (1999)CrossRefGoogle Scholar
  27. 27.
    Westfeld, A.: F5—a steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  28. 28.
    Wayner, P.: Disappearing Cryptography, 2nd edn. Morgan Kaufmann, San Francisco (2002)Google Scholar
  29. 29.
    Wu, M., Liu, B.: Watermarking for image authentication. In: Proceedings of IEEE Internatinal Conference on Image Processing, October 1998, vol. 2, pp. 437–441 (1998)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Younhee Kim
    • 1
  • Zoran Duric
    • 1
  • Dana Richards
    • 1
  1. 1.George Mason UniversityFairfaxUSA

Personalised recommendations