{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T22:41:31Z","timestamp":1775169691052,"version":"3.50.1"},"reference-count":35,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T00:00:00Z","timestamp":1715040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22A2030"],"award-info":[{"award-number":["U22A2030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1936212"],"award-info":[{"award-number":["U1936212"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2020B0101360001"],"award-info":[{"award-number":["2020B0101360001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["PCL2021A02"],"award-info":[{"award-number":["PCL2021A02"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22A2030"],"award-info":[{"award-number":["U22A2030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1936212"],"award-info":[{"award-number":["U1936212"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2020B0101360001"],"award-info":[{"award-number":["2020B0101360001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["PCL2021A02"],"award-info":[{"award-number":["PCL2021A02"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key-Area Research and Development Program of Guangdong Province","award":["U22A2030"],"award-info":[{"award-number":["U22A2030"]}]},{"name":"Key-Area Research and Development Program of Guangdong Province","award":["U1936212"],"award-info":[{"award-number":["U1936212"]}]},{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2020B0101360001"],"award-info":[{"award-number":["2020B0101360001"]}]},{"name":"Key-Area Research and Development Program of Guangdong Province","award":["PCL2021A02"],"award-info":[{"award-number":["PCL2021A02"]}]},{"name":"Peng Cheng Laboratory Project","award":["U22A2030"],"award-info":[{"award-number":["U22A2030"]}]},{"name":"Peng Cheng Laboratory Project","award":["U1936212"],"award-info":[{"award-number":["U1936212"]}]},{"name":"Peng Cheng Laboratory Project","award":["2020B0101360001"],"award-info":[{"award-number":["2020B0101360001"]}]},{"name":"Peng Cheng Laboratory Project","award":["PCL2021A02"],"award-info":[{"award-number":["PCL2021A02"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Nowadays, most image steganographic schemes embed secret messages by minimizing a well-designed distortion cost function for the corresponding domain, i.e., the spatial domain for spatial image steganography or the JPEG (Joint Photographic Experts Group) domain for JPEG image steganography. In this paper, we break the boundary between these two types of schemes by establishing a theoretical link between the distortion costs in the spatial domain and those in the JPEG domain and thus propose a scheme for domain transformations of distortion costs for efficient JPEG steganography with symmetric embedding, which can directly convert the spatial distortion cost into its JPEG counterpart. Specifically, by formulating the distortion cost function for JPEG images in the decompressed spatial domain, a closed-form expression for a distortion cost cross-domain transformation is derived theoretically, which precisely characterizes the conversion from the distortion costs obtained by existing spatial steganographic schemes to those applied in JPEG steganography. Experimental results demonstrate that the proposed method outperforms other advanced JPEG steganographic schemes, e.g., JUNIWARD (JPEG steganography with Universal Wavelet Relative Distortion), JMiPOD (JPEG steganography by Minimizing the Power of the Optimal Detector), and DCDT (Distortion Cost Domain Transformation), in resisting the detection of various advanced steganalyzers.<\/jats:p>","DOI":"10.3390\/sym16050575","type":"journal-article","created":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T09:03:38Z","timestamp":1715072618000},"page":"575","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Domain Transformation of Distortion Costs for Efficient JPEG Steganography with Symmetric Embedding"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0673-1290","authenticated-orcid":false,"given":"Yuanfeng","family":"Pan","sequence":"first","affiliation":[{"name":"School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou 510006, China"}]},{"given":"Jiangqun","family":"Ni","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen 518000, China"},{"name":"Department of New Networks, Peng Cheng Laboratory, Shenzhen 518000, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,5,7]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Khalifa, A., and Guzman, A. (2022). Imperceptible image steganography using symmetry-adapted deep learning techniques. Symmetry, 14.","DOI":"10.3390\/sym14071325"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Li, X., Guo, D., and Qin, C. (2023). Diversified cover selection for image steganography. Symmetry, 15.","DOI":"10.3390\/sym15112024"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"108711","DOI":"10.1016\/j.sigpro.2022.108711","article-title":"The infinite race between steganography and steganalysis in images","volume":"201","author":"Muralidharan","year":"2022","journal-title":"Signal Process"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Shehab, D.A., and Alhaddad, M.J. (2022). Comprehensive survey of multimedia steganalysis: Techniques, evaluations, and trends in future research. Symmetry, 14.","DOI":"10.3390\/sym14010117"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"108908","DOI":"10.1016\/j.sigpro.2022.108908","article-title":"Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)","volume":"206","author":"Setiadi","year":"2023","journal-title":"Signal Process."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Milosav, P., Milosavljevi\u0107, M., and Banjac, Z. (2023). Steganographic method in selected areas of the stego-carrier in the spatial domain. Symmetry, 15.","DOI":"10.3390\/sym15051015"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1109\/TIFS.2010.2077629","article-title":"Gibbs construction in steganography","volume":"5","author":"Filler","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Filler, T., Judas, J., and Fridrich, J. (2010, January 18\u201320). Minimizing embedding impact in steganography using trellis-coded quantization. Proceedings of the Media Forensics and Security II, San Jose, CA, USA.","DOI":"10.1117\/12.838002"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3948","DOI":"10.1109\/TCOMM.2020.2982624","article-title":"Designing near-optimal steganographic codes in practice based on polar codes","volume":"68","author":"Li","year":"2020","journal-title":"IEEE Trans. Commun."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Holub, V., and Fridrich, J. (2012, January 2\u20135). Designing steganographic distortion using directional filters. Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, Tenerife, Spain.","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","article-title":"Universal distortion function for steganography in an arbitrary domain","volume":"2014","author":"Holub","year":"2014","journal-title":"EURASIP J. Inf. Secur."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Li, B., Wang, M., Huang, J., and Li, X. (2014, January 27\u201330). A new cost function for spatial image steganography. Proceedings of the 2014 IEEE International Conference on Image Processing, Paris, France.","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"109370","DOI":"10.1016\/j.sigpro.2023.109370","article-title":"An efficient distortion cost function design for image steganography in spatial domain using quaternion representation","volume":"219","author":"Liu","year":"2023","journal-title":"Signal Process."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2669","DOI":"10.1109\/TIFS.2015.2473815","article-title":"Using statistical image model for JPEG steganography: Uniform embedding revisited","volume":"10","author":"Guo","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"3545","DOI":"10.1109\/TCSVT.2018.2865537","article-title":"A new distortion function design for JPEG steganography using the generalized uniform embedding strategy","volume":"28","author":"Su","year":"2018","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Fridrich, J., and Kodovsk\u00fd, J. (2013, January 26\u201331). Multivariate gaussian model for designing additive distortion for steganography. Proceedings of the 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, Vancouver, BC, Canada.","DOI":"10.1109\/ICASSP.2013.6638198"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","article-title":"Content-adaptive steganography by minimizing statistical detectability","volume":"11","author":"Sedighi","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.1109\/TIFS.2021.3111713","article-title":"Efficient steganography in JPEG images by minimizing performance of optimal detector","volume":"17","author":"Cogranne","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1109\/TIFS.2019.2922229","article-title":"An embedding cost learning framework using GAN","volume":"15","author":"Yang","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"952","DOI":"10.1109\/TIFS.2020.3025438","article-title":"An automatic cost learning framework for image steganography using deep reinforcement learning","volume":"16","author":"Tang","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1970","DOI":"10.1109\/TCSVT.2023.3294291","article-title":"Payload-independent direct cost learning for image steganography","volume":"34","author":"Li","year":"2024","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Yang, J., Ruan, D., Kang, X., and Shi, Y.Q. (2019, January 3\u20135). Towards automatic embedding cost learning for JPEG steganography. Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, Paris, France.","DOI":"10.1145\/3335203.3335713"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"4081","DOI":"10.1109\/TCSVT.2021.3115600","article-title":"Improving cost learning for JPEG steganography by exploiting JPEG domain knowledge","volume":"32","author":"Tang","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1109\/LSP.2018.2818674","article-title":"Efficient JPEG steganography using domain transformation of embedding entropy","volume":"25","author":"Hu","year":"2018","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"108319","DOI":"10.1016\/j.sigpro.2021.108319","article-title":"New design paradigm of distortion cost function for efficient JPEG steganography","volume":"190","author":"Su","year":"2022","journal-title":"Signal Process."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","article-title":"Low-complexity features for JPEG steganalysis using undecimated DCT","volume":"10","author":"Holub","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Holub, V., and Fridrich, J. (2015, January 9\u201311). Phase-aware projection model for steganalysis of JPEG images. Proceedings of the Media Watermarking, Security, and Forensics 2015, San Francisco, CA, USA.","DOI":"10.1117\/12.2075239"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Song, X., Liu, F., Yang, C., Luo, X., and Zhang, Y. (2015, January 17\u201319). Steganalysis of adaptive JPEG steganography using 2D Gabor filters. Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, Portland, OR, USA.","DOI":"10.1145\/2756601.2756608"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Kodovsk\u00fd, J., and Fridrich, J. (2012, January 23\u201325). Steganalysis of JPEG images using rich models. Proceedings of the Media Watermarking, Security, and Forensics 2012, Burlingame, CA, USA.","DOI":"10.1117\/12.907495"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Bas, P., Filler, T., and Pevn\u00fd, T. (2011, January 18\u201320). \u201cBreak Our Steganographic System\u201d: The ins and outs of organizing BOSS. Proceedings of the 13th International Conference on Information Hiding, Prague, Czech Republic.","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"xviii","DOI":"10.1109\/30.125072","article-title":"The JPEG still picture compression standard","volume":"38","author":"Wallace","year":"1992","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Filler, T., and Fridrich, J. (2010, January 12\u201315). Minimizing additive distortion functions with non-binary embedding operation in steganography. Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, Seattle, WA, USA.","DOI":"10.1109\/WIFS.2010.5711444"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","article-title":"Minimizing additive distortion in steganography using syndrome-trellis codes","volume":"6","author":"Filler","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1736","DOI":"10.1109\/TIFS.2016.2555281","article-title":"Steganalysis features for content-adaptive JPEG steganography","volume":"11","author":"Denemark","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","article-title":"Ensemble classifiers for steganalysis of digital media","volume":"7","author":"Fridrich","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/5\/575\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:40:59Z","timestamp":1760107259000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/5\/575"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,7]]},"references-count":35,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["sym16050575"],"URL":"https:\/\/doi.org\/10.3390\/sym16050575","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,7]]}}}