This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Improving Dither Modulation based Robust Steganography by Overflow Suppression

Kai Zeng, Kejiang Chen, Weiming Zhang, Yaofei Wang, Nenghai Yu This work was supported in part by the Natural Science Foundation of China under Grant 62002334 and 62072421, and by Anhui Science Foundation of China under Grant 2008085QF296, and by Anhui Initiative in Quantum Information Technologies under Grant AHY150400. All the authors are with Key Laboratory of Electromagnetic Space Information, School of Information Science and Technology, University of Science and Technology of China, Hefei 230026, China. Corresponding authors: Kejiang Chen and Weiming Zhang (Email:[email protected], [email protected]).
Abstract

Nowadays, people are sharing their pictures on online social networks (OSNs), so OSN is a good platform for Steganography. But OSNs usually perform JPEG compression on the uploaded image, which will invalidate most of the existing steganography algorithms. Recently, some works try to design robust steganography which can resist JPEG compression, such as Dither Modulation-based robust Adaptive Steganography (DMAS) and Generalized dither Modulation-based robust Adaptive Steganography (GMAS). They relieve the problem that the receivers cannot extract the message correctly when the quality factor of channel JPEG compression is larger than that of cover images. However, they only can realize limited resistance to detection and compression due to robust domain selection. To overcome this problem, we meticulously explore three lossy operations in the JPEG recompression and discover that the key problem is spatial overflow. Then two preprocessing methods Overall Scaling (OS) and Specific Truncation (ST) are presented to remove overflow before message embedding as well as generate a reference image. The reference image is employed as the guidance to build asymmetric distortion for removing overflow during embedding. Experimental results show that the proposed methods significantly surpass GMAS in terms of security and achieve comparable robustness.

Index Terms:
OSNs, robust steganography, asymmetric distortion, dither modulation, overflow.

1 Introduction

Steganography is a science and art of covert communication that transmits secret messages through digital media without attracting the attention of others [1, 2]. Many different mediums can be used in steganography, such as texts, audios, images and videos. Among them, JPEG images are now widely used in people’s lives because they can provide high-level visual quality with low storage costs [3]. At present, the most remarkable steganographic schemes at JPEG images are based on the framework of minimizing distortion [4, 5]. Within this framework, researchers define a modification cost to each cover element and use Syndrome-Trellis Codes (STCs) [6] to embed message, where STCs can asymptotically reach the payload-distortion bound for additive distortion.

With the practical steganographic code STCs, the latest researches focused on how to design effective distortion function. There are a lot of distortion functions about JPEG image, such as J-UNIWARD (JPEG UNIverlet WAvelet Relative Distortion) [7], UERD (Uniform Embedding Revisited Distortion) [8], RBV (Residual Block Value) [9], BET (Block Entropy Transformation) [10], GUED (Generalized Uniform Embedding Distortion) [11] and J-MiPOD (Minimizing the Power of Optimal Detector for JPEG domain) [12]. Their main purpose is to assign low costs to the coefficients in complex areas of an image and high costs to the coefficients in smooth areas according to the “Complexity-First Rule” [13]. Non-additive cost functions on JPEG images are defined to keep the continuity of adjacent blocks in the spatial domain [14, 15, 16].

The aforementioned works have been performed well on lossless channels. However, images transmitted over online social networks (OSNs), such as Facebook and Twitter, generally suffer from lossy processes. To ensure image quality while saving storage space, OSN usually performs JPEG compression on the uploaded images. JPEG recompression will invalidate the traditional steganography scheme because the stego changes during transmission [17]. Therefore, JPEG recompression resistance is the major concern due to the wide use of the JPEG recompression in OSNs [18]. In recent years, there has been a growing number of publications [19, 20, 21, 22, 23, 24] focusing on the steganography in this real-world communication and aiming to resist these lossy processes.

We summarize existing steganographic algorithms against JPEG compression into two categories according to their application scenarios. The first category performs well only if we know the quality factor (QF) for channel recompression or can use the channel at will, and is called “White-Box Robust”. The representative of this category is TCM (Transport Channel Matching) proposed by Zhao et al. [19], which repeatedly processes the image by applying channel manipulations until the image is nearly identical before and after processing. They additionally utilized the Error Correction Code (ECC) to reduce the Bit Error Rate (BER). However, this method requires repeatedly uploading and downloading cover images on OSNs, which is abnormal behaviour and will arouse the suspicion of the attacker.

The other category, which does not require a priori knowledge of the channel and cannot be used arbitrarily, is named “Black-Box Robust”. Zhang et al. [20] proposed Dither Modulation-based robust Adaptive Steganography (DMAS) based on “Robust Domain Selection + ECC-STCs Codes” [21] to achieve undetectability and robustness in this situation. This approach avoids behavioral insecurity. They chose middle frequency AC (Alternating Current) coefficients as the cover and utilized dither modulation for message embedding. Yu et al. [22] further upgraded dither modulation to generalized dither modulation by expanding robust domain and introducing asymmetric distortion in Generalized dither Modulation-based robust Adaptive Steganography (GMAS). However, they only perform well when the QF of the cover image is less than that of the channel recompression, which is called “Upward Robust”. Concerning the other case that the QF of channel JPEG compression is less than that of cover image, Tao et al. [23] proposed an enjoyable scheme. They deduce the JPEG compression process in mathematical to adjust the DCT coefficients so that the receiver can exactly extract the secret messages from the stego after compression. Nevertheless, this method does not consider the rounding and truncation in the spatial domain so is hardly used in practice. Thus, designing the algorithm available in this case is still an open problem.

In summary, black-box robust steganography, such as GMAS and DMAS, are the current practical algorithms with wide application scope, yet they can realize desirable resistance to detection and compression only at low capacity due to the limitations of robust domain selection. To overcome these problems, we first explore the reasons for the errors of previous upward robust steganography algorithms: lossy operations in the JPEG recompression. Then we investigate the impacts caused by spatial operations, a key issue that has not received much attention in previous studies, and find that spatial overflow is the severest operation. Based on this finding, we propose a novel robust steganographic method by cover-preprocessing and asymmetric cost definition. In detail, cover-preprocessing can effectively reduce spatial overflow to enhance the robustness of the coefficient as well as generate a reference image. The asymmetric distortion is designed according to the reference images to make steganography towards the direction which produces a more robust image. The security of the proposed scheme is verified with detailed experiments under different compression QFs and valid steganalysis with CCPEV (PEV features [25] enhanced by Cartesian Calibration) [26], DCTR (Discrete Cosine Transform Residual) [27] and SRNet [28]. Notably, we use the image before preprocessing as cover and image through steganography as stego for steganalysis when evaluating the security of the algorithm, which is more practical than the assessment method used in [19]. The experimental results show that the proposed scheme can reach higher robustness and security compared to previous algorithms.

The contributions of this work are summarized as follows.

  1. 1)

    This paper explores the lossy process of JPEG compression in detail and finds that the key problem in anti-compression steganography is spatial overflow. Reducing the impact of spatial truncation operations is a effective way to improve robust steganography.

  2. 2)

    With the analysis of the JPEG compression, we first propose a preprocessing method that completely removes spatial overflow and theoretically proves its effectiveness. In the pursuit of greater security, a heuristic preprocessing method with fewer modifications is proposed. Both methods enhance the stability of the coefficients, allowing the entire image to be used as a robust region.

  3. 3)

    Considering both security and robustness, a novel asymmetric distortion definition method is proposed, which combines the embedding process with the removal of the spatial overflow together.

The rest of this paper is organized as follows. We introduce the related work in Section 2. An investigation of the JPEG recompression on the dither modulation based algorithms is in Section 3. The exhaustive process of the proposed scheme are described in  Section 4. The consequences of contrast experiments and tests on their performance are shown in Section 5. Finally,  Section 6 concludes the paper.

2 Related Work

2.1 Notations and JPEG Recompression

Throughout the paper, matrices, vectors and sets are written in capital letters. Unless otherwise indicated, we use symbol 𝑫\boldsymbol{D} to denote the matrices of quantized DCT coefficients, 𝑸\boldsymbol{Q} to denote the matrices of quantization table, 𝑺\boldsymbol{S} to denote the matrices of spatial values derived from 𝑫\boldsymbol{D} by IDCT and 𝑿\boldsymbol{X} to denote the matrices of pixels. Elements in the matrix are denoted by corresponding lowercase letters, for example 𝑫=(du,v)\boldsymbol{D}=(d_{u,v}), 𝑸=(qu,v)\boldsymbol{Q}=(q_{u,v}), 𝑺=(si,j)\boldsymbol{S}=(s_{i,j}), 𝑿=(xi,j)\boldsymbol{X}=(x_{i,j}), where the subscripts mean their position. Considering the way JPEG compression chunking operates we normally use 8×88\times 8 block, namely, u,v,i,j{1,2,,8}u,v,i,j\in\{1,2,\cdots,8\}. Also considering the storage limitations in JPEG, du,v(ord){1024,,1023}d_{u,v}\;(or\;d)\in\{-1024,\cdots,1023\}, qu,v(orq){1,,255}q_{u,v}\;(or\;q)\in\{1,\cdots,255\}, si,j(ors){128,,127}s_{i,j}\;(or\;s)\in\{-128,\cdots,127\} and xi,j(orx){0,,255}x_{i,j}\;(or\;x)\in\{0,\cdots,255\}. The transformation functions are denoted by bold symbols, additionally, []\left[\;\cdot\;\right], \left\lceil\;\cdot\;\right\rceil and \left\lfloor\;\cdot\;\right\rfloor are denote rounding methods round, ceil and floor in mathematics. The aforesaid notations and the relationship among the above elements can be briefly explained through the JPEG compression process as follows.

The JPEG recompression process first converts the DCT coefficients to spatial values, then truncates and rounds them to obtain spatial image, finally converts spatial image into quantized DCT coefficients with the QF of channel. For detail, the process of recompressing an 8×88\times 8 DCT block 𝑫\boldsymbol{D} from quality factor q1q_{1} to q2q_{2} is as follows:

  • coefficients dequantization:

    𝑫~q1=𝑫q1×𝑸q1,\boldsymbol{\widetilde{D}}_{q_{1}}=\boldsymbol{D}_{q_{1}}\times\boldsymbol{Q}_{q_{1}}, (1)
  • inverse discrete cosine transformation:

    𝑺=IDCT(𝑫~),\boldsymbol{S}=\textbf{IDCT}(\boldsymbol{\widetilde{D}}), (2)
  • spatial truncation:

    𝑺˙=TRU(𝑺),\boldsymbol{\dot{S}}=\textbf{TRU}(\boldsymbol{S}), (3)
  • spatial rounding:

    𝑿=[𝑺˙+128],\boldsymbol{X}=\left[\boldsymbol{\dot{S}}+128\right], (4)
  • spatial shift:

    𝑺¨=𝑿128,\boldsymbol{\ddot{S}}=\boldsymbol{X}-128, (5)
  • discrete cosine transformation:

    𝑫~q2=DCT(𝑺¨),\boldsymbol{\widetilde{D}}_{q_{2}}=\textbf{DCT}(\boldsymbol{\ddot{S}}), (6)
  • coefficients quantization:

    𝑫q2=[𝑫~q2/𝑸q2].\boldsymbol{D}_{q_{2}}=\left[\boldsymbol{\widetilde{D}}_{q_{2}}/\boldsymbol{Q}_{q_{2}}\right]. (7)

We use 𝑫~\boldsymbol{\widetilde{D}} to denote the matrices of unquantized DCT coefficients. The function TRU()(\;\cdot\;) is truncation of the pixel which value is out of the spatial range thus called overflow:

TRU(x)={127x>127128x<128xelse.\textbf{TRU}(x)=\left\{\begin{array}[]{lc}127&x>127\\ -128&x<-128\\ x&else\end{array}\right.. (8)

Notably, DCT coefficient quantization referred to in this paper usually includes both quantization and rounding operations unless specified. Greek letters denote costs of the coefficients and parameters. Specific explanations of the notations, or elements not mentioned, will be elaborated on later.

2.2 Dither Modulation

Refer to caption
Figure 1: Embedding scheme in different circumstances : (a) Dither modulation in the watermarking algorithm and DMAS; (b) Generalized dither modulation in GMAS; (c) The situation discussed in Section 3.1 .

Dither modulation is an extension of the original uniform quantized index modulation (QIM) algorithm [29]. Since dither modulation can be robust in embedding while maintaining high visual quality of the image, it is widely used in watermarking algorithms. In the below, we briefly introduce the embedding process of dither modification on DCT coefficients in [30].

The modification method of algorithm [30] is shown in Figure 1(a). We use d1d_{1} and d2d_{2} to represent the unquantized DCT coefficients and the quantization step associated with them is qq. The axes which represent the unquantized DCT coefficients can be divided into many segments by quantization step qq. As seen in the Figure 1(a), d1d_{1} in the odd segment represents the message bit ‘1’, and d2d_{2} in the even segment represents the message bit ‘0’. If we want d2d_{2} to represent the message bit ‘0’, we will add h2h_{2} to it and adjust it to the center of the nearest even segment. A similar modification will be performed if the message represented by d1d_{1} is changed.

2.3 DMAS and GMAS

Dither Modulation-based robust Adaptive Steganography (DMAS) [20] is a recent robust steganographic algorithm under the “Robust Domain Selection + ECC-STCs Codes” framework. It constructs compression-resistant domain mainly by choosing middle frequency DCT coefficients as the embedding domain in conjunction with dither modulation. DMAS can be applied in either spatial or DCT domain.

Generalized dither Modulation-based robust Adaptive Steganography (GMAS) [22] improves resistance to detection and compression by generalized dither modulation and expanding the embedding domain of DMAS. The embedding scheme of generalized dither modulation is illustrated in the Figure 1(b). Unlike DMAS, which modifies the coefficients to the center of the nearest interval. GMAS considers the possibility of modifying to both sides as well as introduces ternary embedding and asymmetric distortion for hiding message. We will only describe GMAS in detail here:

  1. i.

    Select Cover Elements from Expended Robust Domain. The expended embedding domain are composed of coefficients di,jd_{i,j} satisfying the (i+j=7,8,9)(i+j=7,8,9). These coefficients are selected as steganographic cover and embedded using generalized dither modulation.

  2. ii.

    Calculate Asymmetric Distortion. Calculate the spatial pixels that eliminate the JPEG compression block effect.

    𝑿=𝑿𝑭,\boldsymbol{X^{\prime}}=\boldsymbol{X}\otimes\boldsymbol{F}, (9)
    𝑭=[1/91/91/91/91/91/91/91/91/9].\boldsymbol{F}=\begin{bmatrix}1/9&1/9&1/9\\ 1/9&1/9&1/9\\ 1/9&1/9&1/9\end{bmatrix}. (10)

    To improve the performance, use this 𝑿\boldsymbol{X^{\prime}} as a reference and define asymmetric distortion to encourage modifications toward the reference image. In detail, a block DCT transformation of 𝑿\boldsymbol{X^{\prime}} yields unquantized DCT coefficients d¯i,j{\overline{d}}_{i,j}, calculate symmetric costs ρi,j\rho_{i,j} with existing distortion functions then asymmetric costs of the quantized DCT coefficients can be defined as follows:

    ρi,j+={λρi,j,di,j<d¯i,j/qi,jρi,j,else,\rho_{i,j}^{+}=\left\{\begin{array}[]{l}\lambda\cdot\rho_{i,j}\;,\;d_{i,j}<{\overline{d}}_{i,j}/q_{i,j}\\ \rho_{i,j}\;,\;else\end{array}\right., (11)
    ρi,j={λρi,j,di,j>d¯i,j/qi,jρi,j,else,\rho_{i,j}^{-}=\left\{\begin{array}[]{l}\lambda\cdot\rho_{i,j}\;,\;d_{i,j}>{\overline{d}}_{i,j}/q_{i,j}\\ \rho_{i,j}\;,\;else\end{array}\right., (12)

    where di,jd_{i,j} denotes the quantized DCT coefficients and λ(0,1)\lambda\in(0,1) controls the intensity of the adjustment. The final asymmetric costs ξi,j+\xi_{i,j}^{+} and ξi,j\xi_{i,j}^{-} for the unquantized DCT coefficients are calculated as follow:

    ζi,j+\displaystyle\zeta_{i,j}^{+} =ρi,j+/qi,j,\displaystyle=\rho_{i,j}^{+}/q_{i,j}, (13)
    hi,j+\displaystyle h_{i,j}^{+} =(k+1)qi,jd~i,j,\displaystyle=(k+1)q_{i,j}-\tilde{d}_{i,j},
    ξi,j+\displaystyle\xi_{i,j}^{+} =ζi,j+×hi,j+,\displaystyle=\zeta_{i,j}^{+}\times h_{i,j}^{+},
    ζi,j\displaystyle\zeta_{i,j}^{-} =ρi,j/qi,j,\displaystyle=\rho_{i,j}^{-}/q_{i,j}, (14)
    hi,j\displaystyle h_{i,j}^{-} =d~i,j(k1)qi,j,\displaystyle=\tilde{d}_{i,j}-(k-1)q_{i,j},
    ξi,j\displaystyle\xi_{i,j}^{-} =ζi,j×hi,j,\displaystyle=\zeta_{i,j}^{-}\times h_{i,j}^{-},

    where kNk\in N is an integer. d~i,j((k1/2)qi,j,(k+1/2)qi,j)\tilde{d}_{i,j}\in((k-1/2)q_{i,j},(k+1/2)q_{i,j}) and qi,jq_{i,j} denote the unquantized DCT coefficients and the corresponding quantization step, respectively.

  3. iii.

    RS Encoding and Ternary STC Embedding. Utilizing RS codes to encode the messages. A modifiable ternary sequence can be obtained from the selected coefficients using generalized dither modulation so ternary STC is used to embed to attain a lower bit error rate and stronger security. Specifically, ternary STC can be implemented using double-layered STCs [31].

After receiving the compressed stego image, the receiver first converts JPEG images to spatial values, then obtains the unquantized DCT coefficients derived from spatial images, finally calculates the quantized DCT coefficients with the same quantization table as that used for embedding, and we call this entire operation “DCT Coefficients Restoration”. After that, the same middle frequency DCT coefficients are chosen to gain the message using STCs and RS decoding.

3 Anti-compression Analysis of Dither Modulation

Refer to caption
(a) Original Block
Refer to caption
(b) Truncation Loss
Refer to caption
(c) Rounding Loss
Figure 2: Effect of spatial truncation and rounding operations on specific DCT coefficients. Randomly select a block from an image in BOSSbase 1.01 [32] with QF = 65. (a) demonstrates the value of the concrete quantized DCT coefficients. We then convert this block to the spatial values and perform respectively truncation and rounding operations at each position. (b) and (c) illustrate the absolute values of the modifications on the regained unquantized DCT coefficients compared to the original.

State-of-the-art black-box robust steganography is based on dither modulation, which is the main reason why they do not require knowledge of channel to achieve robustness. In this section we will explore the advantages and disadvantages of this approach.

As displayed in Section 2.1, there are three lossy steps in the recompression process: spatial truncation, spatial rounding and coefficients quantization. These three operations have different effects on the DCT coefficients. Let’s start our detailed analysis by probing the principle of upward robust.

3.1 Explanation of Upward Robustness

Yu et al. [22] experimentally found that steganographic algorithms using dither modulation for embedding (such as DMAS and GMAS) generally behave excellently when the QF of channel compression is larger than that of the cover image and called this phenomenon “Upward Robust”. This part will provide a theoretical analysis of this phenomenon.

Generally, we denote the unquantized DCT coefficient of a stego JPEG image by d~\tilde{d}. Then the relation among d~\tilde{d} , the corresponding quantized coefficients dd, and quantization steps qq is as follows:

d~=dq.\tilde{d}=d\cdot q. (15)

This means that the unquantized DCT coefficients of the JPEG image are exactly at the center of the region divided by the quantization step. If the quantization step used for this coefficient in channel compression is qq^{\prime}, the maximum modifications caused by channel compression is q/2q^{\prime}/2 without considering the processing of the spatial pixels. So after channel compression we have:

d~q[d~q2,d~+q2],\tilde{d}_{q^{\prime}}\in[\tilde{d}-\frac{q^{\prime}}{2},\tilde{d}+\frac{q^{\prime}}{2}], (16)

where d~q\tilde{d}_{q^{\prime}} is unquantized DCT coefficient after channel compression. As described in the Section 2.3, it is necessary to perform DCT coefficients restoration. Denote the coefficient after restoration at this situation as dqd_{q^{\prime}}. When the channel compression QF is larger than the cover QF (the corresponding quantization step of channel compression is less than that of the cover), it is obvious from the Figure 1(c) that

q2<q2,d~qmodq=d~modq,d=dq.\frac{q^{\prime}}{2}<\frac{q}{2}\;,\;\tilde{d}_{q^{\prime}}\;mod\;q\;=\;\tilde{d}\;mod\;q\;,\;d\;=\;d_{q^{\prime}}. (17)

In this case, the coefficients after coefficients restoration are the same as the original ones, so the message can be extracted accurately. If the QF of channel compression is smaller than the QF of cover, the corresponding quantization steps q′′q^{\prime\prime} will produce a contrary consequence. Also as shown in Figure 1(c):

d~q′′[d~q′′2,d~+q′′2],q′′2>q2,ddq′′,\tilde{d}_{q^{\prime\prime}}\in[\tilde{d}-\frac{q^{\prime\prime}}{2},\tilde{d}+\frac{q^{\prime\prime}}{2}]\;,\;\frac{q^{\prime\prime}}{2}>\frac{q}{2}\;,\;d\;\neq\;d_{q^{\prime\prime}}, (18)

where d~q′′\tilde{d}_{q^{\prime\prime}} and dq′′d_{q^{\prime\prime}} are unquantized and quantized coefficients in this situation. Such cases usually involve extraction errors and error propagation due to the utilization of STCs. Here we consider the generalized dither modulation.The above analysis explained the fundamental principle of dither modulation to achieve upward robustness. So dither modulation based algorithms (DMAS and GMAS) require the selection of the image with a lower QF to meet the real-world application scenarios.

In summary, the embedding using dither modulation is theoretically error-free when the channel compression QF is larger than the cover QF (Upward Robust). But this method still has errors in a real-world implementation even if the QF meets the requirement of Upward Robust. The reason is that we have considered only one of the three lossy processes in the recompression (coefficients quantization). The influences of spatial truncation and rounding were not considered, which will be discussed in the next subsection.

3.2 Exploration of Spatial Operation

According to the inference of Section 3.1, dither modulation-based algorithms are unaffected by coefficients quantization. However, when considering the impact of spatial operations, Equation (16) will not necessarily be true. So we will explore this below.

To measure the effect of the spatial truncation and rounding, we summarize the JPEG recompression process in Section 2.1 as follows,

𝑫q2=[DCT([TRU(IDCT(𝑫q1×𝑸q1))])/𝑸q2].\boldsymbol{D}_{q_{2}}=[\textbf{DCT}([\textbf{TRU}(\textbf{IDCT}(\boldsymbol{D}_{q_{1}}\times\boldsymbol{Q}_{q_{1}}))])/\boldsymbol{Q}_{q_{2}}]. (19)

First we investigate the impact of spatial rounding. We ignore the truncation operations on the spatial domain. Then the recompression process is represented as follows,

𝑫q2\displaystyle\boldsymbol{D}_{q_{2}} =[DCT([IDCT(𝑫q1×𝑸q1)])/𝑸q2]\displaystyle=[\textbf{DCT}([\textbf{IDCT}(\boldsymbol{D}_{q_{1}}\times\boldsymbol{Q}_{q_{1}})])/\boldsymbol{Q}_{q_{2}}] (20)
=[DCT(IDCT(𝑫q1×𝑸q1)+𝑬)/𝑸q2]\displaystyle=[\textbf{DCT}(\textbf{IDCT}(\boldsymbol{D}_{q_{1}}\times\boldsymbol{Q}_{q_{1}})+\boldsymbol{E})/\boldsymbol{Q}_{q_{2}}]
=𝑫q2+[DCT(𝑬)/𝑸q2]\displaystyle=\boldsymbol{D}_{q_{2}}+[\textbf{DCT}(\boldsymbol{E})/\boldsymbol{Q}_{q_{2}}]
=𝑫q2+[𝑾/𝑸q2],\displaystyle=\boldsymbol{D}_{q_{2}}+[\boldsymbol{W}/\boldsymbol{Q}_{q_{2}}],

where 𝑬\boldsymbol{E} is a rounding error block and all the elements (ei,j)8×8(e_{i,j})_{8\times 8} of 𝑬\boldsymbol{E} belong to [0.5,0.5)[-0.5,0.5). Here, we assume that ei,je_{i,j} in 𝑬\boldsymbol{E} is an independent identically distributed (i.i.d.) random variable with uniform distribution in the range of [0.5,0.5)[-0.5,0.5). Then, based on the central limit theorem, for each element wi,jw_{i,j} in 𝑾\boldsymbol{W}, wi,jw_{i,j} can be approximately regarded as a Gaussian distribution 𝒩(0,1/12)\mathcal{N}(0,1/12) [33]. Consequently, we see that

P{[wi,jqi,j]=0}\displaystyle P\left\{\left[\frac{w_{i,j}}{q_{i,j}}\right]=0\right\} =P{qi,j2wi,j<qi,j2}\displaystyle=P\left\{-\frac{q_{i,j}}{2}\leqslant w_{i,j}<\frac{q_{i,j}}{2}\right\} (21)
{0.9160,ifqi,j=10.9995,ifqi,j=21,ifqi,j3,\displaystyle\approx\left\{\begin{array}[]{lc}0.9160,&\text{if}\;q_{i,j}=1\\ 0.9995,&\text{if}\;q_{i,j}=2\\ 1,&\text{if}\;q_{i,j}\geqslant 3\end{array}\right.,

where qi,jq_{i,j} is the quantization step corresponding to the recompression quality factor q2q_{2}. Therefore, spatial rounding has almost no effect on the recompressed DCT coefficients with recompression QF92\text{QF}\leqslant 92, since each element of the quantization matrix is larger than 1. This way we can exclude the effect of the spatial rounding operation on the robust steganography algorithm. As a conclusion, in the case where the recompression QF is larger than the cover QF, spatial truncation operation is the primary cause of the error. Here is an experiment to verify the above conclusion. We characterize the magnitude to which the DCT coefficient is affected by spatial operations as the stability of the coefficient. From Figure 2, we can observe experimentally that truncation operations in the spatial values are the major contributor to the instability of the DCT coefficients, and that rounding operations in the spatial values contribute only relatively small effects.

Refer to caption
Figure 3: The violin chart of overflow extent. We transformed the image in BOSSbase 1.01 [32] with different QF to the spatial domain and then counted the extent of overflow at different locations. The area of each color map indicates the number of overflow locations.

The specific operation of spatial truncation is shown in Equation (8). Compared to spatial rounding, truncation operations usually cause larger variation, correspondingly also have a greater impact on DCT coefficients, as shown in Figure 2. Obviously, the exact extent of the impact caused by the truncation operation is related to the magnitude of the corresponding block overflow. And the cause of spatial overflow is that the DCT coefficient derived from the unoverflowed spatial value becomes a coefficient with a larger absolute value during quantization when the image is saved in JPEG format. From the cause of overflow, it is known that the magnitude of overflow depends on the size of the corresponding quantization step. Notably, this quantization step is a save-time one, which is in the quantization table of the cover for the steganographer. We counted the overflow extent of the images in BOSSbase 1.01 [32] with different QFs and the results are shown in Figure 3. The smaller the QF of the cover image, the larger the quantization step, the greater the degree of overflow, and the greater the impact suffered from the spatial truncation operation. For robustness, dither modulation based steganography need to choose the image with long quantization step as cover, but this makes them subject to the spatial truncation, even if GMAS chooses to embed in the middle frequency regions with large quantization steps, it is impossible to avoid errors. The reason why repeatedly processing the images through channels can improve the robustness is also that the spatial overflow of the images can be reduced in repeated compression, making the instability of the DCT coefficients diminished. But repeated uploads and downloads are behaviorally insecure. Through the above analysis, we can fundamentally improve the robustness and security by dealing with the image overflow.

Refer to caption
Figure 4: The flowchart of removing spatial overflow. The core operations are Overall Scale and Specific Truncation and details of the operation procedures are introduced in Section 4.1 and Section 4.3, respectively.

In conclusion, coefficient quantization results in the primary effect among the three lossy operations, but the application of dither modulation solves this problem. In the two remaining problems, spatial truncation plays a major role, while the effect of spatial rounding is almost negligible. Consequently, in the procedure of channel compressing, the DCT coefficients of the blocks with the overflow spatial values tend to change dramatically. Inspired by the above discoveries, we have designed a strategy called Removing Overflow based Adaptive robuSt sTeganography (ROAST) to effectively remove the spatial overflow of cover images, which strengthens the stability of the DCT coefficients, thus we do not need to select the robust domain as previous steganography algorithms and can embed on the entire image, which not only significantly enlarges the embedding capacity, but also improves the anti-detection performance remarkably. The proposed strategy ROAST can resist compression primarily because of the removal of spatial overflow, which can be accomplished in two methods: Overall Scale and Specific Truncation. We designed corresponding steganography schemes based on the respective properties of the two approaches. Each is described in detail later.

4 Proposed Methods

Refer to caption
Figure 5: Flowchart of the Overall Scale based Steganography (ROAST-OS). The cover, robust cover, and stego are JPEG images and the method of removing overflow is the Overall Scale. Detailed procedures of the algorithm are described in Section 4.2.

4.1 Overall Scale to Remove Overflow

The first method of removing spatial overflow is Overall Scale (OS). This method is primarily concerned with theoretical rigor and enabling greater removal of spatial overflow in particular. The concrete process can be outlined in Figure 4, and the subsequent part will describe the details and prove the feasibility of this approach.

  1. i.

    Inverse DCT and Inspection. The object of the algorithm is an 8×88\times 8 DCT coefficient block 𝑫\boldsymbol{D} of a JPEG image. Convert it to spatial block 𝑺\boldsymbol{S} with inverse DCT. Denote the unquantized DCT coefficients of row uu column vv in the DCT block by d~u,v\tilde{d}_{u,v} and the spatial values of row ii column jj in the spatial block by si,js_{i,j}. Note that the spatial value here is not a pixel, an shifting is required to convert it to a pixel. The relationship between the DCT coefficient and the spatial value can be obtained by the formula of DCT:

    d~u,v=14\displaystyle\tilde{d}_{u,v}\!=\!\frac{1}{4}\cdot 𝑪(u)𝑪(v)[i=07j=07si,jcos(2i+1)uπ16cos(2j+1)vπ16],\displaystyle\boldsymbol{C}(u)\!\cdot\!\boldsymbol{C}(v)[\sum_{i=0}^{7}\!\sum_{j=0}^{7}\!s_{i,j}\!\cdot\!\cos\!\frac{(2i\!+\!1)u\pi}{16}\!\cdot\!\cos\!\frac{(2j\!+\!1)v\pi}{16}]\;, (22)
    𝑪(u)={1Nu=02Nu0,\displaystyle\boldsymbol{C}(u)=\left\{\begin{array}[]{lc}\sqrt{\frac{1}{N}}&u=0\\ \sqrt{\frac{2}{N}}&u\neq 0\end{array}\right.,

    where N=8N=8 denotes the side length of the block. For a more intuitive description, we rewrite Equation (22) to the following form:

    d~u,v=i,jsi,jΦi,j;u,v,i,j,u,v{0,1,,7},\tilde{d}_{u,v}=\sum_{i,j}s_{i,j}\cdot\Phi_{i,j;u,v}\;,\;i,j,u,v\in\{0,1,\cdots,7\}, (23)

    where Φi,j;u,v\Phi_{i,j;u,v} denotes the value of d~u,v\tilde{d}_{u,v} when si,j=1s_{i,j}=1, which is the variation caused by a single spatial value on this DCT coefficient. Once the conversion is complete, the overflow can be observed via the spatial value, namely, check if si,js_{i,j} satisfies si,j>127s_{i,j}>127 or si,j<128s_{i,j}<-128. If there exists an overflow in a block, then this block will be processed to remove the overflow. If not, then the block will be skipped.

  2. ii.

    Scale of Spatial Values. Remove spatial overflow by scaling the whole block to a block without overflow:

    si,j=αsi,j,i,j{0,1,,7},s^{\prime}_{i,j}=\alpha\cdot s_{i,j}\;,\;i,j\in\{0,1,\cdots,7\}, (24)

    where si,js^{\prime}_{i,j} denotes the spatial value after scaling and α\alpha is the parameter. The amount of α\alpha depends on the degree of spatial overflow of the block:

    α=s0|s|max||,s0={127,s|max|>0128,else,\alpha=\frac{s_{\text{0}}}{\left|s_{\left|\text{max}\right|}\right|}\;,\;\;s_{\text{0}}=\left\{\begin{array}[]{lc}127,&s_{\left|\text{max}\right|}>0\\ 128\;,&\;else\end{array}\right., (25)

    where s|max|s_{\left|\text{max}\right|} denotes the spatial value with the maximum absolute value. So that α\alpha calculated in this way makes the scaled block without overflow.

  3. iii.

    DCT and Quantization. Convert the block which has been removed overflow into DCT coefficients. The DCT coefficients corresponding to the scaled block are d~u,v\tilde{d}^{\prime}_{u,v}:

    d~u,v=i,jsi,jΦi,j;u,v=αi,jsi,jΦi,j;u,v=αd~u,v.\tilde{d}^{\prime}_{u,v}=\sum_{i,j}s^{\prime}_{i,j}\cdot\Phi_{i,j;u,v}\;=\alpha\sum_{i,j}s_{i,j}\cdot\Phi_{i,j;u,v}\;=\alpha\cdot\tilde{d}_{u,v}. (26)

    At this time, this block gets rid of overflow. Thereafter, the DCT coefficients will be quantized to integer. Generally, the round function “[]\left[\;\cdot\;\right]” is adopted which modifies a number to the nearest integer for quantization. However, the round operation will cause undesirable changes, e.g. the coefficient increases. The former scaling changes intend to reduce the amplitude of DCT coefficients, therefore FIX()(\;\cdot\;) which modifies the number to the nearest integer with a smaller absolute value is utilized here for quantization.

    FIX(x)={xx0xelse.\textbf{FIX}(x)=\left\{\begin{array}[]{lc}\left\lfloor x\right\rfloor&x\geqslant 0\\ \left\lceil x\right\rceil&else\end{array}\right.. (27)

    The final processed DCT coefficient is du,vd_{u,v}^{*},

    du,v=FIX(d~u,v/qu,v),d_{u,v}^{*}=\textbf{FIX}(\tilde{d}^{\prime}_{u,v}/q_{u,v}), (28)

    where qu,vq_{u,v} is the corresponding quantization step.

Here gives the proof that the processed block is without the overflow. The unquantized DCT coefficient corresponding to the finally stored DCT coefficient is d~u,v\tilde{d}_{u,v}^{*}:

d~u,v=du,vqu,v=FIX(d~u,v/qu,v)qu,v=βu,vd~u,v,\tilde{d}_{u,v}^{*}=d_{u,v}^{*}\cdot q_{u,v}=\textbf{FIX}(\tilde{d}^{\prime}_{u,v}/q_{u,v})\cdot q_{u,v}=\beta_{u,v}\cdot\tilde{d}_{u,v}, (29)

where βu,v\beta_{u,v} is a parameter jointly determined by quantization and overall scale. It is obvious from the above process that βu,vα\beta_{u,v}\leqslant\alpha. Similar to the way the DCT formula in Equation (23), rewrite the inverse DCT in the following format:

si,j=u,vd~u,vΨu,v;i,j,s_{i,j}=\sum_{u,v}\tilde{d}_{u,v}\cdot\Psi_{u,v;i,j}, (30)

where Ψu,v;i,j\Psi_{u,v;i,j} denotes the value of si,js_{i,j} when du,v=1d_{u,v}=1. The spatial value corresponding to the adjusted coefficients is si,js_{i,j}^{*} :

si,j=u,vd~u,vΨu,v;i,j=u,vβu,vd~u,vΨu,v;i,j.s_{i,j}^{*}=\sum_{u,v}\tilde{d}_{u,v}^{*}\cdot\Psi_{u,v;i,j}=\;\sum_{u,v}\beta_{u,v}\cdot\tilde{d}_{u,v}\cdot\Psi_{u,v;i,j}. (31)

Apparently, si,jsi,js_{i,j}^{*}\leqslant s^{\prime}_{i,j} as a result of βu,vα<1\beta_{u,v}\leqslant\alpha<1. Hence, the corresponding spatial values diminish spatial overflow after adjusting the DCT coefficients. Even though it may occasionally cause overflow after steganography, the effect will be minimal compared to before.

4.2 Overall Scale based Steganography: ROAST-OS

The stability of the coefficients can be significantly improved via the Overall Scale method introduced in the previous section, so we use this method and generalized dither modulation to design an upward robust steganography scheme named ROAST-OS. Figure 5 illustrates the procedure of the scheme. The process and details are described hereunder:

  1. i.

    Preprocessing of Cover Image. Removing the spatial overflow of cover image by the Overall Scale method. The cover after preprocessing is generally considered to be sufficiently robust that the whole image can be regarded as a robust region, which we called robust cover.

  2. ii.

    Define Distortion for Robust Cover. Define the asymmetric distortion of robust cover using the Equation (11) and Equation (12). Here the distortion of the quantized DCT coefficients instead of the unquantized DCT coefficients are calculated, that is, Equation (13) and Equation (14) are not required here. This is according to the Equation (15) which means the unquantized DCT coefficients of the JPEG image are exactly at the center of the region divided by the quantization step.

  3. iii.

    RS Encoding and Ternary STC Embedding. Utilizing RS codes to encode the messages and ternary STC to embed.

The receiver first performs the DCT coefficients restoration introduced in Section 2.3 on the compressed stego image. The message is then decoded with the RS code and STCs.

4.3 Specific Truncation to Remove Overflow

Refer to caption
Figure 6: Flowchart of the Specific Truncation based Steganography (ROAST-ST). The scheme consists of three components: preprocessing, calculate robust asymmetric distortion, and STCs Embedding. Detailed procedures of the algorithm are described in Section 4.4. Note that the overflow blocks here refer to the blocks that satisfy the condition proposed in Section 4.4.

Although the aforesaid Overall Scale method can remove the overflow to produce a robust cover and is also outstanding in practical steganography schemes, we need to consider the anti-detection performance while pursuing robustness in robust steganography. The employment of the Overall Scale generates a large number of modifications, which greatly affects the anti-detection performance, so we devised a method named Specific Truncation (ST) for targeted tuning of the overflow location and parameterizing the processing intensity to remove spatial overflow with relatively fewer modifications. The concrete procedure of the method is shown in Figure 4, and the details are presented as follows.

  1. i.

    Inverse DCT and Inspection. Convert the DCT block to spatial values and detect whether the block is overflowing or not, namely, check if there is si,js_{i,j} satisfying si,j>127s_{i,j}>127 or si,j<128s_{i,j}<-128. If there exists an overflow, then the block will be processed to remove the overflow. If not, then it will be ignored.

  2. ii.

    Specific Truncation of Overflow Values. For all out-of-range positions, denoted as s^i,j\hat{s}_{i,j} (s^i,j>127\hat{s}_{i,j}>127 or s^i,j<128\hat{s}_{i,j}<-128), the truncation operation is performed as follows:

    s^i,j={127T1,s^i,j>127128+T1,s^i,j<128,\hat{s}_{i,j}=\left\{\begin{array}[]{lc}127-T_{1},&\hat{s}_{i,j}>127\\ -128+T_{1},&\hat{s}_{i,j}<-128\end{array}\right., (32)

    T1T_{1} is a parameter to control the intensity of the truncation operation and the magnitude of the modification, which pursues a better trade-off between robustness and resistance to detection. Denote the processed spatial block as 𝑺^\boldsymbol{\widehat{S}}.

  3. iii.

    DCT and Quantization. Convert the processed spatial block 𝑺^\boldsymbol{\widehat{S}} to coefficients 𝑫~\boldsymbol{\widetilde{D}} using DCT:

    𝑫~=DCT(𝑺^).\boldsymbol{\widetilde{D}}=\textbf{DCT}(\boldsymbol{\widehat{S}}). (33)

    Following the setting in section Section 4.1, we apply FIX() in the quantization phase as well.

    𝑫=FIX(𝑫~/𝑸)=FIX(DCT(𝑺^)/𝑸),\boldsymbol{D}=\textbf{FIX}(\boldsymbol{\widetilde{D}}/\boldsymbol{Q})=\textbf{FIX}(\textbf{DCT}(\boldsymbol{\widehat{S}})/\boldsymbol{Q}), (34)

    𝑫\boldsymbol{D} is the robust block after the removal of the spatial overflow.

4.4 Specific Truncation based Steganography: ROAST-ST

Specific Truncation is a de-overflow method with relatively smaller modifications compared to Overall Scale, but it also unavoidably weakens the performance of overflow removing. The steganographic scheme called ROAST-ST is designed to enhance the robustness by using robust asymmetric distortion. As shown in Figure 6, it consists of three parts: preprocessing, calculate robust asymmetric distortion, and STCs embedding. Each step of the scheme is described in detail below:

  1. i.

    Preprocessing. The preprocess is designed to enhance the stability of the DCT coefficients by removing the spatial overflow with Specific Truncation operations. When determining whether a block is overflowed or not, it is not as straightforward as before, but instead first calculates the extent of the overflow. Because the preprocessing always has a more significant impact on the image compared to the embedding process and an intuitive way to improve security is to make fewer changes. The overflow of a block is measured by Ω\Omega, which is calculated as follow:

    Ω=i,jδi,j,δi,j={|si,j|127,si,j>127|si,j|128,si,j<1280,else.\Omega=\sum_{i,j}\delta_{i,j}\;,\;\delta_{i,j}=\left\{\begin{array}[]{lc}\left|s_{i,j}\right|-127\;,&s_{i,j}>127\\ \left|s_{i,j}\right|-128\;,&s_{i,j}<-128\\ 0\;,&else\end{array}\right.. (35)

    Actually, it is the de-overflow operation rather than steganographic modification impacts on the security of the block. We therefore introduce T2T_{2} to control whether or not the block is considered overflow. The block will be considered as overflow block if Ω>T2\Omega>T_{2} or not if ΩT2\Omega\leq T_{2}. This way we can divide the blocks of cover 𝑪\boldsymbol{C} into two groups: 𝑨\boldsymbol{A} with overflow and 𝑩\boldsymbol{B} without overflow. A de-overflow operation on 𝑨\boldsymbol{A} yields 𝑨\boldsymbol{A^{\prime}} and 𝑩\boldsymbol{B} doesn’t do the processing, thus obtain a robust cover 𝑪o\boldsymbol{C_{\text{o}}} for steganography. While reducing the magnitude of the modification in the Specific Truncation, it also leads to the consequence that it is difficult to completely remove all spatial overflow with this method used only once. So we expect to remove spatial overflow further during embedding. A de-overflow operation on 𝑨\boldsymbol{A^{\prime}} again yields 𝑨′′\boldsymbol{A^{\prime\prime}} and twice de-overflow operations on 𝑩\boldsymbol{B} yields 𝑩′′\boldsymbol{B^{\prime\prime}}, thus obtain a reference cover 𝑪e\boldsymbol{C_{\text{e}}} with less overflow than robust cover. Making 𝑪o\boldsymbol{C_{\text{o}}} close to 𝑪e\boldsymbol{C_{\text{e}}} in the process of embedding modifications can enhance coefficient stability.

  2. ii.

    Define Robust Asymmetric Distortion. In the aforementioned preprocessing, not only a robust cover is prepared, but also a reference image is given for designing asymmetric distortion. Therefore we can combine the de-overflow into the process of message embedding. In detail, we employ the distortions ρi,j+\rho_{i,j}^{+} and ρi,j\rho_{i,j}^{-} calculated by the Equation (11) and Equation (12) on the robust cover as the basic distortions. Denote the quantized DCT coefficient of the robust cover and the reference image as di,jod_{i,j}^{\text{o}} and di,jed_{i,j}^{\text{e}}, respectively. Robust asymmetric distortion is calculated as follows:

    εi,j+={μρi,j+,di,je>di,joρi,j+,else,\varepsilon_{i,j}^{+}=\left\{\begin{array}[]{lc}\mu\cdot\rho_{i,j}^{+},&d_{i,j}^{\text{e}}>d_{i,j}^{\text{o}}\\ \rho_{i,j}^{+},&else\end{array}\right., (36)
    εi,j={μρi,j,di,je<di,joρi,j,else,\varepsilon_{i,j}^{-}=\left\{\begin{array}[]{lc}\mu\cdot\rho_{i,j}^{-},&d_{i,j}^{\text{e}}<d_{i,j}^{\text{o}}\\ \rho_{i,j}^{-},&else\end{array}\right., (37)

    εi,j+\varepsilon_{i,j}^{+} and εi,j\varepsilon_{i,j}^{-} are asymmetric distortion after performing robustness adjustment. 0<μ10<\mu\leqslant 1 is a parameter for adjusting distortion. This defines a smaller “+1” cost for locations where the coefficient of the reference image is larger than that of the robust cover and a smaller “-1” cost for locations where the coefficient of the reference image is less than that of the robust cover.

  3. iii.

    RS Encoding and Ternary STC Embedding. This part is the same as mentioned before.

The receiver extracts the message in the same way as Section 4.2, which is not repeated here.

5 Experiment

5.1 Setups

All experiments in this paper are conducted on BOSSbase 1.01 [32] containing 10,000 grayscale 512×512512\times 512 images. We randomly selected 2000 of them and the original images are JPEG compressed using quality factor 65 as the cover image. From Section 3 we know that the dither modulation based algorithm needs to choose a cover with a relatively low QF to achieve robustness. Therefore, we use 65 as an example in our experiments. The relative payload is nm/nnzacn_{\textrm{m}}/n_{\textrm{nzac}}, where nmn_{\textrm{m}} is the length of the original embedded messages rather than the encoded messages by RS codes and nnzacn_{\textrm{nzac}} is the number of non-zero AC DCT coefficients of the original cover image rather than the robust cover after de-overflow processing. Previous steganographic algorithms typically set the range of the relative payloads of robust adaptive steganography from 0.050.05 to 0.150.15 bits per non-zero AC DCT coefficients (bpnzac) due to their limited performance. We refer to such payloads as low payloads and perform experiments with high payload from 0.10.1 to 0.50.5 (bpnzac) in this paper. The extraction error rate Rerror=nerror/nmR_{\textrm{error}}=n_{\textrm{error}}/n_{\textrm{m}}, where nerrorn_{\textrm{error}} is the number of wrong message bits. The QF of the cover image and channel JPEG compression is denoted as QcoverQ_{\textrm{cover}} and QchannelQ_{\textrm{channel}}, respectively. Two effective feature sets (CCPEV [26], DCTR [27]) and SRNet [28] are selected for steganalysis of JPEG image. We will set the secure parameter h=10h=10 of STCs, and RS (31,15) will be adopted in the following experiments. As for (nn^{*}, kk^{*}) RS codes, nn^{*} and kk^{*} denote the code length and message length respectively, and the greater the ratio of kk^{*} to nn^{*}, the stronger the error correction ability of RS codes.

The detectors are trained as binary classifiers implemented using the FLD ensemble with default settings [34]. The ensemble by default minimizes the total classification error probability under equal priors PE=minPFA12(PFA+PMD)P_{\textrm{E}}=\min_{P_{\textrm{FA}}}\frac{1}{2}(P_{\textrm{FA}}+P_{\textrm{MD}}), where PFAP_{\textrm{FA}} and PMDP_{\textrm{MD}} are the false-alarm probability and the missed-detection probability respectively. SRNet is fed the cover and stego images. The training first runs for 300 epocks with an initial learning rate of r1=0.001r_{1}=0.001 and then for an additional 100 epochs with a learning rate of r2=0.0001r_{2}=0.0001. A separate classifier and a deep network are trained for each embedding algorithm and payload. The ultimate security is qualified by average error rate P¯E\overline{P}_{\textrm{E}}, and larger P¯E\overline{P}_{\textrm{E}} means stronger security.

5.2 Investigation of the Preprocessing

The preprocessing improves the stability of the DCT coefficients by removing the spatial overflow of the cover image. It is an operation that has a relatively high impact on security and robustness therefore we use parameters to find a trade-off between them. Subsequently, we will explore these in detail through experiments.

5.2.1 Security of Preprocessing

Refer to caption
Figure 7: Comparison of two methods Overall Scale (OS) and Specific Truncation (ST) for removing spatial overflow on anti-detection performance as well as the effect of parameter T1T_{1} on Specific Truncation (Qcover=65Q_{\textrm{cover}}=65).

Both methods of removing overflow in the preprocessing modify the original images. Although the final steganography process is performed on the modified images, the attacker is likely to use the original image for training in steganalysis. It generally seems to us that the original image should be more readily available. In contrast to [19], this paper proposes that the practical security of robust steganography should be evaluated by the original image before processing and the image after steganography.

The effect of the preprocessing process on steganography security is shown in Figure 7. The error detection rate in the figure is detected on the preprocessed image when the payload is 0. The horizontal coordinates are about the parameter T1T_{1} in Specific Truncation which has no influence on the Overall Scale. From the experimental results, it can be seen that the preprocessing operation has a sharp decrease in anti-detection performance. The Specific Truncation has less decrease on the anti-detection ability than the Overall Scale method. Additionally, the change in the parameter T1T_{1} has little influence on the anti-detection performance of ROAST-ST. The above consequences are consistent with expectations because of a large number of coefficients modified during preprocessing and there are relatively slight number of points modified as T1T_{1} changes.

5.2.2 Effect of Preprocessing on Robustness

Refer to caption
Figure 8: Comparison of compression resistance between applying GMAS on images preprocessed with the Specific Truncation method (T1=8T_{1}=8) and applying GMAS on the original images (Qcover=65Q_{\textrm{cover}}=65 and Qchannel=85Q_{\textrm{channel}}=85). R¯error\overline{R}_{\textrm{error}} is average extraction error rate.

To demonstrate the improvement in the anti-compression capability of the preprocessing operation, we have compared the robustness of employing GMAS on images preprocessed by the Specific Truncation method (T1=8T_{1}=8) with that of employing GMAS directly on the original images. The experimental results presented in Figure 8 show that the preprocessing operation has a significant effect on improving the stability of the coefficient and the robustness of the algorithm. It can also be noted that combining the preprocessing with the GMAS algorithm can virtually make Rerror=0R_{error}=0 at low payloads, indicating that the preprocessing does make sense for improving robustness. It is clear from Figure 7 and Figure 8 that preprocessing can dramatically improve robustness at the sacrifice to security through extensive modifications. So we use T1T_{1} and T2T_{2} to make a trade-off. The effect of each parameter on the robustness is shown below.

5.2.3 Effect of Parameter T1T_{1} on Robustness

Refer to caption
Figure 9: The influence of the parameter T1T_{1} in the Specific Truncation method on the robustness of ROAST-ST (Qcover=65Q_{\textrm{cover}}=65 , Qchannel=85Q_{\textrm{channel}}=85 , payload=0.3payload=0.3).

In Section 5.2.1, we discovered that changes of T1T_{1} in the preprocessing have an ignorable effect on the anti-detection performance because the additional modifications due to parameter variations are marginal. However, changes in T1T_{1} can have a tangible effect on the robustness of the ROAST-ST as shown in Figure 9. As T1T_{1} increases, the robustness of the ROAST-ST algorithm improves considerably, and when T18T_{1}\geqslant 8, it becomes more robust than the ROAST-OS algorithm. Utilization of T1T_{1} can enhance robustness with little impact on security. This phenomenon suggests that the preprocessing of the algorithm is effective in conjunction with the robust asymmetric distortion design.

5.2.4 Effect of Parameter T2T_{2}

Refer to caption
(a) Security
Refer to caption
(b) Robustness
Figure 10: Effect of Parameter T2T_{2} in ROAST-ST on (1) security and (2) robustness (Qcover=65Q_{\textrm{cover}}=65 , Qchannel=85Q_{\textrm{channel}}=85 , payload=0.3payload=0.3 , T1=0T_{1}=0).

The parameter T2T_{2} is the threshold for determining whether preprocessing is performed. See Section 4.4 for details and Figure 10 for experimental results. Obviously, as T2T_{2} increases, the number of modified blocks decreases, the robustness of the ROAST-ST algorithm decreases and the security increases. This confirms the previous statement and makes the algorithm more flexible to adjust security and robustness to achieve practical requirements.

5.3 Investigation of Robust Asymmetric Distortion

5.3.1 Effect of Robust Asymmetric Distortion on Robustness

Refer to caption
Figure 11: The influence of the parameter μ\mu in the ROAST-ST on the robustness (Qcover=65Q_{\textrm{cover}}=65 , Qchannel=85Q_{\textrm{channel}}=85 , payload=0.3payload=0.3 , T1=8T_{1}=8 , T2=0T_{2}=0).

In this section, we examine the effect of robust asymmetric distortion on robustness. This asymmetric distortion concept is analogous to the side information steganography [35], in which the side information is used to improve security, while this asymmetric distortion is used to improve robustness. Therefore, we adopt the image after the second de-overflow operation as the reference image. The exact calculation of distortion is described in detail by Section 4.4. The robustness of the ROAST-ST, which employs asymmetric distortion, varies with μ\mu as shown in Figure 11. As the effect of asymmetric distortion increases with decreasing μ\mu, the robustness of the ROAST-ST is considerably improved. The robustness of the ROAST-ST is comparable to that of the ROAST-OS at μ=0.5\mu=0.5, and stronger robustness is obtained at a smaller μ\mu. This means that the definition of robust asymmetric distortion indeed contributes to the robustness. Notably, the robust distortion adjustment only adjusts a relatively small amount of the distortion, so even if μ\mu is chosen to be very small, the impact on security is also acceptable. This will be discussed in the next section.

5.3.2 Security of Robust Asymmetric Distortion

Refer to caption
Figure 12: Security comparison between basic asymmetric distortion and robust asymmetric distortion. Only images before and after steganography are used here for steganalysis experiments to avoid interference of preprocessing (Qcover=65Q_{\textrm{cover}}=65 , Qchannel=85Q_{\textrm{channel}}=85 , μ=0.5\mu=0.5 , T1=8T_{1}=8 , T2=0T_{2}=0).

The above experiments demonstrate that the proposed asymmetric distortion can effectively improve robustness. To investigate the role of robust adjustment on security, we compare the security between the asymmetric distortion in GMAS and the robust asymmetric distortion proposed in this paper. The covers utilized here are all images processed by the Specific Truncation method (T1=8T_{1}=8). The experimental results and concrete parameters are shown in Figure 12. Only images before and after steganography are used here for steganalysis experiments to avoid interference of preprocessing. As can be seen, robustness adjustments do cause a decrease in anti-detection performance. However, the difference of security is a trivially visible difference when using feature CCPEV for steganalysis, and even more trivial when using feature DCTR. An essential observation from previous experiments is that security and robustness cannot always be achieved perfectly at the same time. There will always be some sacrifices to security involved in improving robustness. Overall, the impact on security is still acceptable when applying parameters and asymmetric distortion to enhance robustness. This is the reason ROAST-ST has an advantage over ROAST-OS in terms of both security and robustness at lower payloads. The following is a detailed demonstration.

5.4 Comparison with the State-of-the-art Algorithms

Refer to caption
(a) Qchannel=85Q_{\textrm{channel}}=85
Refer to caption
(b) Qchannel=95Q_{\textrm{channel}}=95
Figure 13: Comparison of the robustness among various algorithms at (1) Qchannel=85Q_{\textrm{channel}}=85 and (2) Qchannel=95Q_{\textrm{channel}}=95 (Qcover=65Q_{\textrm{cover}}=65 , T1=8T_{1}=8 , T2=0T_{2}=0 , μ=0.5\mu=0.5).
Refer to caption
(a) CCPEV
Refer to caption
(b) DCTR
Figure 14: Comparison of the security among various algorithms utilizing (1) CCPEV and (2) DCTR as steganalysis features (Qcover=65Q_{\textrm{cover}}=65 , T1=8T_{1}=8 , T2=0T_{2}=0 , μ=0.5\mu=0.5).
Refer to caption
Figure 15: Comparison of the security among various algorithms utilizing SRNet (Qcover=65Q_{\textrm{cover}}=65 , T1=8T_{1}=8 , T2=0T_{2}=0 , μ=0.5\mu=0.5).

In this section, we compare the proposed algorithms with state-of-the-art algorithms. First of all, in terms of applicability, the algorithm proposed by Tao et al. [23] only works in the scenario that the QF of channel compression is less than that of cover images (Downward Robust). TCM [19] works well only if the channel parameters are known or if the channel can be used at will. Therefore, we compare the proposed algorithms to GMAS [22] and DMAS [20] that have the same application environment. After that, we choose parameters for ROAST-ST that make it perform comparable to ROAST-OS according to the results of the previous experiment. The specific values are T1=8T_{1}=8 , T2=0T_{2}=0 , μ=0.5\mu=0.5.

The comparison of robustness is shown in Figure 13 and the security is shown in Figure 14. In terms of robustness, except for Qchannel=85Q_{\text{channel}}=85 with payloads near 0.10.1 bpnzac, both algorithms proposed in this paper have significant advantages over the previous algorithms. Comparing robustness at Qchannel=85Q_{\text{channel}}=85 and Qchannel=95Q_{\text{channel}}=95, we can obtain that as the recompression QF decreases, the robustness performance of the algorithm decreases. This is consistent with the inference in Section 3.1 regarding the recompression QF. In terms of security, it is also the proposed algorithms that have significant advantages, except when using CCPEV feature and the payload is near 0.10.1 bpnzac. Representatively, average detection error rate P¯E\overline{P}_{\textrm{E}} is increased by +18% when utilizing DCTR features with payload=0.1payload=0.1 bpnzac and +14% when utilizing CCPEV features with payload=0.3payload=0.3 bpnzac. It is worth mentioning that both DMAS and GMAS almost fail to resist detection at payload0.2(bpnzac)payload\geqslant 0.2\;\;(\text{bpnzac}) when utilizing more powerful DCTR features, and the proposed algorithms are even more outstanding in this situation. We also compare the security when using the popular CNN-based steganalysis in Figure 15. The security of the proposed method is enhanced at low embedding rate compared with DMAS and GMAS. Average detection error rate P¯E\overline{P}_{\textrm{E}} is increased by +5% when utilizing SRNet with payload=0.12payload=0.12 bpnzac. Overall ROAST-ST and ROAST-OS achieve notable robustness and security.

The two algorithms proposed in this paper have their strengths and weaknesses, due to the use of de-overflow operations and corresponding steganographic strategies. From Figure 14, roughly divided by payload=0.3(bpnzac)payload=0.3\;\;(\text{bpnzac}), ROAST-ST has superiority in both robustness and security when the payload is small, and ROAST-OS has superiority in both when the payload is large. With smaller payloads, the security of the algorithm is substantially determined by the method of preprocessing, so this case can demonstrate the benefits of fewer preprocessing modifications and robust asymmetric distortions in ROAST-ST. When the payload is large, the modifications caused by embedding also progressively take effect, and therefore the strengths of fewer modifications in preprocessing operations are not so much, instead, the stable robustness of more preprocessing modifications and the security of distortion without robust adjustment will be exhibited. Consequently, both of these two algorithms are characterized by their properties.

6 Conclusions

Robust steganography is a research dedicated to the practical application of steganography. JPEG compression is the current primary processing operation for user-uploaded images in social networks, which is also the major focus of robust steganography research.

This paper explores the effect of JPEG recompression on the dither modulation algorithms by theoretical derivation based on DMAS and GMAS. Then we propose the critical steps required to implement effective upward robust steganography: the removal of spatial overflow. The advanced robust steganography algorithms are designed accordingly. The proposed algorithm enhances the stability of coefficients by eliminating overflow thus does not require the selection of a robust domain when embedding message and greatly improves robustness and security. This also enables a much higher embedding capacity than previous algorithms. Besides the concise steganography scheme ROAST-OS, we design a more practical scheme ROAST-ST by utilizing asymmetric distortion. ROAST-ST can improve the detection resistance by reasonably reducing the modification magnitude while ensuring robustness. Based on this, we discuss the dichotomy between robustness and security as well as how to make a trade-off or find a reasonable balance. Even though the algorithm in this paper has been significantly improved in performance compared to the previous algorithm, it is still necessary to reasonably adjust the performance for the practical scenario under the defined performance limits, which is why we have designed multiple parameters. In the future, we will improve the method to more realistic and complex scenarios.

Acknowledgment

The authors would like to thank DDE Laboratory of SUNY Binghamton for sharing the source code of steganography, steganalysis and ensemble classifier on the webpage (http://dde.binghamton.edu/download/).

References

  • [1] L. Y. Zhang, Y. Zheng, J. Weng, C. Wang, Z. Shan, K. Ren, You can access but you cannot leak: defending against illegal content redistribution in encrypted cloud media center, IEEE Transactions on Dependable and Secure Computing (2018).
  • [2] A. El-Atawy, Q. Duan, E. Al-Shaer, A novel class of robust covert channels using out-of-order packets, IEEE Transactions on Dependable and Secure Computing 14 (2) (2015) 116–129.
  • [3] G. K. Wallace, The JPEG still picture compression standard, IEEE transactions on consumer electronics 38 (1) (1992) xviii–xxxiv.
  • [4] W. Lu, Y. Xue, Y. Yeung, H. Liu, J. Huang, Y. Shi, Secure halftone image steganography based on pixel density transition, IEEE Transactions on Dependable and Secure Computing (2019).
  • [5] Z. Qian, H. Zhou, X. Zhang, W. Zhang, Separable reversible data hiding in encrypted jpeg bitstreams, IEEE Transactions on Dependable and Secure Computing 15 (6) (2016) 1055–1067.
  • [6] T. Filler, J. Judas, J. Fridrich, Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE Transactions on Information Forensics and Security. 6 (3-2) (2011) 920–935.
  • [7] V. Holub, J. J. Fridrich, T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP Journal of Information Security. 2014 (2014) 1.
  • [8] L. Guo, J. Ni, W. Su, C. Tang, Y. Shi, Using statistical image model for JPEG steganography: Uniform embedding revisited, IEEE Transactions on Information Forensics and Security. 10 (12) (2015) 2669–2680.
  • [9] Q. Wei, Z. Yin, Z. Wang, X. Zhang, Distortion function based on residual blocks for JPEG steganography, Multimedia Tools and Applications. 77 (14) (2018) 17875–17888.
  • [10] X. Hu, J. Ni, Y. Shi, Efficient JPEG steganography using domain transformation of embedding entropy, IEEE Signal Processing Letters. 25 (6) (2018) 773–777.
  • [11] W. Su, J. Ni, X. Li, Y. Shi, A new distortion function design for JPEG steganography using the generalized uniform embedding strategy, IEEE Transactions on Circuits Systems and Video Technology. 28 (12) (2018) 3545–3549.
  • [12] R. Cogranne, Q. Giboulot, P. Bas, Steganography by minimizing statistical detectability: The cases of JPEG and color images., in: ACM Information Hiding and MultiMedia Security (IH&MMSec), 2020.
  • [13] B. Li, S. Tan, M. Wang, J. Huang, Investigation on cost assignment in spatial image steganography, IEEE Transactions on Information Forensics and Security. 9 (8) (2014) 1264–1277.
  • [14] W. Li, W. Zhang, K. Chen, W. Zhou, N. Yu, Defining joint distortion for JPEG steganography, in: R. Böhme, C. Pasquini, G. Boato, P. Schöttle (Eds.), Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018, ACM, 2018, pp. 5–16.
  • [15] Y. Wang, W. Li, W. Zhang, X. Yu, K. Liu, N. Yu, BBC++: Enhanced block boundary continuity on defining non-additive distortion for jpeg steganography, IEEE Transactions on Circuits and Systems for Video Technology. (2020) 1–1.
  • [16] Y. Wang, W. Zhang, W. Li, N. Yu, Non-additive cost functions for jpeg steganography based on block boundary maintenance, IEEE Transactions on Information Forensics and Security. (2020) 1–1.
  • [17] C. Kin-Cleaves, A. D. Ker, Adaptive steganography in the noisy channel with dual-syndrome trellis codes, in: 2018 IEEE International Workshop on Information Forensics and Security (WIFS), IEEE, 2018, pp. 1–7.
  • [18] W. Sun, J. Zhou, Y. Li, M. Cheung, J. She, Robust high-capacity watermarking over online social network shared images, IEEE Transactions on Circuits and Systems for Video Technology. (2020).
  • [19] Z. Zhao, Q. Guan, H. Zhang, X. Zhao, Improving the robustness of adaptive steganographic algorithms based on transport channel matching, IEEE Transactions on Information Forensics and Security. 14 (7) (2019) 1843–1856.
  • [20] Y. Zhang, X. Zhu, C. Qin, C. Yang, X. Luo, Dither modulation based adaptive steganography resisting jpeg compression and statistic detection, Multimedia Tools and Applications. 77 (14) (2018) 17913–17935.
  • [21] Y. Zhang, X. Luo, C. Yang, D. Ye, F. Liu, A framework of adaptive steganography resisting JPEG compression and detection, Security and Communication Networks 9 (15) (2016) 2957–2971.
  • [22] X. Yu, K. Chen, Y. Wang, W. Li, W. Zhang, N. Yu, Robust adaptive steganography based on generalized dither modulation and expanded embedding domain, Signal Processing. 168 (2020).
  • [23] J. Tao, S. Li, X. Zhang, Z. Wang, Towards robust image steganography, IEEE Transaction on Circuits and Systems for Video Technology. 29 (2) (2019) 594–600.
  • [24] W. Lu, J. Zhang, X. Zhao, W. Zhang, J. Huang, Secure robust jpeg steganography based on autoencoder with adaptive bch encoding, IEEE Transactions on Circuits and Systems for Video Technology (2020).
  • [25] T. Pevný, J. J. Fridrich, Merging markov and DCT features for multi-class JPEG steganalysis, in: E. J. D. III, P. W. Wong (Eds.), Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, USA, January 28, 2007, Vol. 6505 of SPIE Proceedings, SPIE, 2007, p. 650503.
  • [26] J. Kodovský, J. J. Fridrich, Calibration revisited, in: E. W. Felten, J. Dittmann, J. J. Fridrich, S. Craver (Eds.), Multimedia and Security Workshop, MM&Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009, ACM, 2009, pp. 63–74.
  • [27] V. Holub, J. J. Fridrich, Low-complexity features for JPEG steganalysis using undecimated DCT, IEEE Transactions on Information Forensics and Security. 10 (2) (2015) 219–228.
  • [28] M. Boroumand, M. Chen, J. Fridrich, Deep residual network for steganalysis of digital images, IEEE Transactions on Information Forensics and Security 14 (5) (2018) 1181–1193.
  • [29] B. Chen, G. W. Wornell, Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, IEEE Transactions on Information theory 47 (4) (2001) 1423–1443.
  • [30] A. Miyazaki, A. Okamoto, Analysis of watermarking systems in the frequency domain and its application to design of robust watermarking systems, in: IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2001, 7-11 May, 2001, Salt Palace Convention Center, Salt Lake City, Utah, USA, Proceedings, IEEE, 2001, pp. 1969–1972.
  • [31] W. Zhang, X. Zhang, S. Wang, A double layered ”plus-minus one” data embedding scheme, IEEE Signal Processing Letters. 14 (11) (2007) 848–851.
  • [32] P. Bas, T. Filler, T. Pevný, ”break our steganographic system”: The ins and outs of organizing BOSS, in: T. Filler, T. Pevný, S. Craver, A. D. Ker (Eds.), Information Hiding - 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers, Vol. 6958 of Lecture Notes in Computer Science, Springer, 2011, pp. 59–70.
  • [33] W. Luo, J. Huang, G. Qiu, JPEG error analysis and its applications to digital image forensics, IEEE Transactions on Information Forensics and Security 5 (3) (2010) 480–491.
  • [34] J. Kodovský, J. J. Fridrich, V. Holub, Ensemble classifiers for steganalysis of digital media, IEEE Transactions on Information Forensics and Security. 7 (2) (2012) 432–444.
  • [35] W. Li, K. Chen, W. Zhang, H. Zhou, Y. Wang, N. Yu, JPEG steganography with estimated side-information, IEEE Transactions on Circuits and Systems for Video Technology (2019).
[Uncaptioned image] Kai Zeng received his B.S. degree in 2019 from the University of Science and Technology of China (USTC). Currently, he is pursuing the M.S. degree with Key Laboratory of Electromagnetic Space Information, School of Information Science and Technology, University of Science and Technology of China, Hefei. His research interests include information hiding and deep learning.
[Uncaptioned image] Kejiang Chen received his B.S. degree in 2015 from Shanghai University (SHU) and a Ph.D. degree in 2020 from the University of Science and Technology of China (USTC). Currently, he is a postdoctoral researcher at the University of Science and Technology of China. His research interests include information hiding, image processing and deep learning.
[Uncaptioned image] Weiming Zhang received his M.S. degree and Ph.D. degree in 2002 and 2005, respectively, from the Zhengzhou Information Science and Technology Institute, P.R. China. Currently, he is a professor with the School of Information Science and Technology, University of Science and Technology of China. His research interests include information hiding and multimedia security.
[Uncaptioned image] Yaofei Wang received the B.S. degree from the School of Physical Science and Technology, Southwest Jiaotong University, in 2017. He is currently pursuing the Ph.D. degree in information security with the University of Science and Technology of China. His research interests include information hiding, image processing, and deep learning.
[Uncaptioned image] Nenghai Yu received his B.S. degree in 1987 from Nanjing University of Posts and Telecommunications, an M.E. degree in 1992 from Tsinghua University and a Ph.D. degree in 2004 from the University of Science and Technology of China, where he is currently a professor. His research interests include multimedia security, multimedia information retrieval, video processing and information hiding.