{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:11:03Z","timestamp":1654128663771},"reference-count":33,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,4,1]]},"abstract":"<p>Minimizing the embedding impact is a practically feasible philosophy in designing steganographic systems. The development of steganographic systems can be formulated as the construction of distortion profile reflecting the embedding impact and the design of syndrome coding based on a certain code. The authors devise a new distortion profile exploring both the block complexity and the distortion effect due to flipping and rounding errors, and incorporate it in the framework of syndrome trellis coding (STC) to propose a new JPEG steganographic scheme. The STC provides multiple candidate solutions to embed messages to a block of coefficients while the constructed content-adaptive distortion profile guides the determination of the best solution with minimal distortion effect. The total embedding distortion or impact would be significantly reduced and lead to the less detectability of steganalysis. Extensive experimental results demonstrate that the proposed JPEG steganographic scheme greatly increases the secure embedding capacity against steganalysis and shows significant superiority over some existing JPEG steganographic approaches.<\/p>","DOI":"10.4018\/jdcf.2012040102","type":"journal-article","created":{"date-parts":[[2012,6,14]],"date-time":"2012-06-14T17:41:49Z","timestamp":1339695709000},"page":"13-27","source":"Crossref","is-referenced-by-count":0,"title":["An Adaptive JPEG Steganographic Scheme Based on the Block Entropy of DCT Coefficients"],"prefix":"10.4018","volume":"4","author":[{"given":"Chang","family":"Wang","sequence":"first","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Jiangqun","family":"Ni","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Chuntao","family":"Wang","sequence":"additional","affiliation":[{"name":"South China Agricultural University, China"}]},{"given":"Ruiyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]}],"member":"2432","reference":[{"key":"jdcf.2012040102-0","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69019-1_1"},{"key":"jdcf.2012040102-1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009715923555"},{"key":"jdcf.2012040102-2","doi-asserted-by":"crossref","unstructured":"Cachin, C. (1998). An information-theoretic model for steganography. In Proceedings of the 2nd International Workshop on Information Hiding (pp. 306-318).","DOI":"10.1007\/3-540-49380-8_21"},{"key":"jdcf.2012040102-3","unstructured":"Chang, C. C., & Lin, C. J. (2001). LIBSVM: A library for support vector machines. Retrieved from http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm"},{"key":"jdcf.2012040102-4","unstructured":"Chen, C., & Shi, Y. Q. (2008). JPEG image steganalysis utilizingboth intrablock and interblock correlations. In Proceedings of the IEEE International Symposium on Circuits and Systems (pp. 18-21)."},{"key":"jdcf.2012040102-5","doi-asserted-by":"crossref","unstructured":"Choi, Y., & Kim, H. (2009). Improving the modified matrix encoding on steganography Method. In Proceedings of the International Conference on Information Assurance and Security (pp. 205-208).","DOI":"10.1109\/IAS.2009.340"},{"key":"jdcf.2012040102-6","author":"I. J.Cox","year":"2008","journal-title":"Digital watermarking and steganography"},{"key":"jdcf.2012040102-7","unstructured":"Dijk, M. M., & Willems, F. (2001). Embedding information in grayscale image. In Proceedings of the Symposium on Information and Communication Theory (pp. 147-154)."},{"key":"jdcf.2012040102-8","doi-asserted-by":"crossref","unstructured":"Filler, T., & Fridrich, J. (2009). Wet ZZW construction for steganography. In Proceedings of the IEEE Workshop on Information Forensic and Security (pp. 131-135).","DOI":"10.1109\/WIFS.2009.5386467"},{"key":"jdcf.2012040102-9","doi-asserted-by":"crossref","unstructured":"Filler, T., Judas, J., & Fridrich, J. (2010). Minimizing embedding impact in steganography using trellis-coded quantization. In Proceedings of the SPIE Conference on Security and Forensics of Multimedia XII (Vol. 7541, pp. 501-504).","DOI":"10.1117\/12.838002"},{"key":"jdcf.2012040102-10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.879281"},{"key":"jdcf.2012040102-11","doi-asserted-by":"crossref","unstructured":"Fridrich, J. (2006). Minimizing embedding impact in steganography. In Proceedings of the 8th ACM Workshop on Multimedia and Security (pp. 2-10).","DOI":"10.1145\/1161366.1161369"},{"key":"jdcf.2012040102-12","doi-asserted-by":"crossref","unstructured":"Fridrich, J., & Filler, T. (2007). Practical methods for minimizing embedding impact in steganography. In Proceedings of the SPIE Conference on Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX (Vol. 6505, pp. 2-3).","DOI":"10.1117\/12.697471"},{"key":"jdcf.2012040102-13","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., & Soukal, D. (2005). Efficient wet paper codes. In Proceedings of the 7th International Workshop on Information Hiding (pp. 204-218).","DOI":"10.1007\/11558859_16"},{"key":"jdcf.2012040102-14","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-005-0194-3"},{"key":"jdcf.2012040102-15","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Pevny, T., & Kodavsky, J. (2007). Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In Proceedings of the 9th Workshop on Multimedia and Security (pp. 3-14).","DOI":"10.1145\/1288869.1288872"},{"key":"jdcf.2012040102-16","doi-asserted-by":"crossref","unstructured":"Kim, H. Y., Duric, Z., & Rechards, D. (2007) Modified matrix encoding technique for minimal distortion steganography. In Proceedings of the 8th International Workshop on Information Hiding (pp. 314-327).","DOI":"10.1007\/978-3-540-74124-4_21"},{"key":"jdcf.2012040102-17","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"jdcf.2012040102-18","doi-asserted-by":"crossref","unstructured":"Pevny, T., & Fridrich, J. (2007). Merging markov and DCT features for multi-class JPEG steganalysis. In Proceedings of the SPIE Conference on Security, Steganography and Watermarking of Multimedia Contents IX.","DOI":"10.1117\/12.696774"},{"key":"jdcf.2012040102-19","unstructured":"Provos, N. (1999). OutGuess - Universal steganography. Retrieved from http:\/\/www.outguess.org\/"},{"key":"jdcf.2012040102-20","unstructured":"Provos, N. (2001). Defending against statistical steganalysis. In Proceedings of the 10th USENIX Security Symposium, Washington, DC."},{"key":"jdcf.2012040102-21","doi-asserted-by":"crossref","unstructured":"Sachnev, V., Kim, H.-J., & Zhang, R. (2009). Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In Proceedings of the 11th ACM Workshop on Multimedia and Security (pp. 131-139).","DOI":"10.1145\/1597817.1597841"},{"key":"jdcf.2012040102-22","doi-asserted-by":"crossref","unstructured":"Sallee, P. (2003). Model-based steganography. In Proceedings of the 2nd International Workshop on Digital Forensics and Watermarking (pp. 154-167).","DOI":"10.1007\/978-3-540-24624-4_12"},{"key":"jdcf.2012040102-23","doi-asserted-by":"crossref","unstructured":"Sch\u00f6nfeld, D., & Winkler, A. (2006). Embedding with syndrome coding based on BCH codes. In Proceedings of the 8th ACM Multimedia & Security Workshop (pp. 214-223).","DOI":"10.1145\/1161366.1161405"},{"key":"jdcf.2012040102-24","doi-asserted-by":"crossref","unstructured":"Sharp, T. (2001). An implementation of key-based digital signal steganography. In Proceedings of the 4th International Workshop on Information Hiding (pp. 13-26).","DOI":"10.1007\/3-540-45496-9_2"},{"key":"jdcf.2012040102-25","doi-asserted-by":"crossref","unstructured":"Shi, Y. Q., Chen, C., & Chen, W. (2006). A Markov process based approach to effective attacking JPEG steganography. In Proceedings of the 8th International Workshop on Information Hiding (pp. 249-264).","DOI":"10.1007\/978-3-540-74124-4_17"},{"key":"jdcf.2012040102-26","doi-asserted-by":"crossref","unstructured":"Shi, Y. Q., Guo, X., & Zou, D. (2005). Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. In Proceedings of the IEEE International Conference on Multimedia and Expo.","DOI":"10.1109\/ICME.2005.1521412"},{"key":"jdcf.2012040102-27","unstructured":"Upham, D. (1997). Jsteg. Retrieved from http:\/\/www.tiac.net\/users\/korejwa\/jsteg.htm"},{"key":"jdcf.2012040102-28","doi-asserted-by":"crossref","unstructured":"Westfeld, A. (2001). F5 - A steganographic algorithm: high capacity despite better steganalysis. In Proceedings of the 4th International Workshop on Information Hiding (pp. 289-302).","DOI":"10.1007\/3-540-45496-9_21"},{"key":"jdcf.2012040102-29","doi-asserted-by":"crossref","unstructured":"Zhang, R., Sachnev, V., & Kim, H.-J. (2009). Fast BCH syndrome coding for steganography. In Proceedings of the 11th International Workshop on Information Hiding (pp. 48-58).","DOI":"10.1007\/978-3-642-04431-1_4"},{"key":"jdcf.2012040102-30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2065804"},{"key":"jdcf.2012040102-31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2024720"},{"key":"jdcf.2012040102-32","doi-asserted-by":"crossref","unstructured":"Zhang, X., Wang, S., & Zhang, K. (1998). Steganography with least histogram abnormality. In V. Gorodetsky, L. Popyack, & V. Skormin (Eds.), Proceedings of the Second International Workshop on Computer Network Security (LNCS 2776, pp. 395-406.","DOI":"10.1007\/978-3-540-45215-7_34"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=68407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T23:44:33Z","timestamp":1654127073000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdcf.2012040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,4,1]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jdcf.2012040102","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4,1]]}}}