Cryptography Reference
In-Depth Information
N
d
−
d
and that of negative coe
cients N
in the dead zone are described as
N
d
= N (0 <x<t
d
)andN
−
d
−
d
<x<0), respectively. t
d
−
d
= N (t
and t
are
determined by optimum N
d
−
d
and N
values which minimize the histogram
changes for 0 and1bins.
After-embedding histogram h
′
i
, shown in Eq. (8.19), it can be rewritten as
1
2
(h
i
i+1
)+
1
h
′
i
=
−
−
i
+ h
i−1
),
+ h
2
(h
(8.20)
where (h
i
i
+ h
i−1
)/2 correspond to half of DCT coe
cients
in the interval i<x<i+ 1 and half in i−1 <x<i, respectively, and they
are quantized to i. By introducing the aforementioned dead zone, part of h
0
and h
−
i+1
)/2 and (h
−
+ h
−
0
, i.e., h
0
−N
d
−
0
−
d
and h
−N
are used for embedding, and therefore
h
′
0
, h
′
1
and h
′
−1
become as follows,
1
2
1
2
h
′
0
= N
d
(h
0
−N
d
−
1
−
d
−
0
−
d
)+h
+
−1
+
)+h
+ N
+
(h
−N
, (8.21)
1
2
(h
1
+ h
2
)+
1
h
′
1
=
−
−
1
+(h
0
−N
d
h
),
(8.22)
2
1
2
1
2
(h
h
′
−1
=
h
+
−1
+(h
−
0
−
d
−
−1
+ h
+
−2
).
−N
)+
(8.23)
The optimum values for N
d
−
d
can be derived by minimizing the sum
of squared histogram changes over 0 and1bins,
and N
1
i=−1
(h
i
−h
′
i
)
2
.
Note that in the proposed QIM-JPEG steganography, quantized coe
-
cients 0s cannot be treated as zeroes embedded in them, because they cannot
be discriminated from 0s in the dead zone. Therefore, if 0 coe
cient is se-
lected to embed a zero at quantization step, the embedding process to embed
the zero should be continued until other even coe
cient except 0 is chosen.
This causes a serious problem on the histogram that a surplus of even coef-
ficients is produced resulting in a significant change of the after-embedding
histogram. This problem can be resolved by applying the exclusive OR (XOR)
operation to a message bit with a random bit whenever embedding a message
bit. That is, an embedding bit is the XOR-applied message bit. When 0 coef-
ficient is selected to embed a zero of embedding bit, which means no message
embedded, an embedding bit at subsequent embedding is not necessarily kept
same though the message bit is same until non-0 coe
cient is selected. The
message bits can be recovered from the embedded XOR-applied message bits
using the same random binary sequence as one used in embedding.
8.6.3 Histogram Preserving HM-JPEG Steganography
Consider histogram matching at quantization step of DCT coe
cients, as-
suming that the probabilities of zero and one are same in binary data to be
embedded. Histogram matching is here considered separately for positive coef-
ficient part and negative one, since there sometimes exists asymmetry between