Proceedings of International Conference on Applied Innovation in IT
2025/06/27, Volume 13, Issue 2, pp.59-68
Robust Steganography for Online Secure Communication with Binary Text Image in JPEG Compressed Domain
Zainalabideen Abdulsamad, Naseer Aljawad and Athar Ali Abstract: This paper introduces a novel steganography method of secure communication to mitigate the perceptual degradation associated with the quantization process in JPEG compression, particularly when images are recompressed at standard quality levels by potential attackers. Our approach operates within the compressed domain, optimizing the selection of cover images based on the presence of high-texture blocks, thereby enhancing robustness and capacity while avoiding visual artifacts. This technique ensures a high Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index (SSIM) without the common compromise on visual quality. Additionally, our method allows for the retrieval of embedded messages without the need for the original image, making it highly applicable to real-time communication scenarios. Through extensive experimentation, we demonstrate that cover images containing over 80% textured blocks, with blocks selected for embedding having at least two non-zero quantized Discrete Cosine Transform (DCT) coefficients beyond the DC component, significantly improve PSNR values over existing methods while maintaining high payload capacity. The system exhibits robustness against JPEG recompression across a wide range of quality factors (42 to 99) and resilience to various image processing attacks, marking a significant advancement in the field of image compression and secure communication.
Keywords: Imperceptibility, Robustness, Rich Texture Image, Texture Block, JPEG domain, Visual Artifact.
DOI: 10.25673/120394
Download: PDF
References:
- A. Z. Al-Othmani, A. A. Manaf, and A. M. Zeki, "A survey on steganography techniques in real time audio signals and evaluation," Int. J. Comput. Sci. Issues IJCSI, vol. 9, no. 1, p. 30, 2012.
- M. B. Pope, M. Warkentin, E. Bekkering, and M. BSchmidt, "Digital Steganography—An Introduction to Techniques and Tools," Commun. Assoc. Inf. Syst., vol. 30, no. 1, Art. no. 1, 2012.
- N. F. Johnson and S. Jajodia, "Steganalysis of images created using current steganography software," in International Workshop on Information Hiding, Springer, 1998, pp. 273-289.
- M. Begum and M. S. Uddin, "Digital image watermarking techniques: a review," Information, vol. 11, no. 2, Art. no. 2, 2020.
- A. Bahrushin, G. Bahrushina, and R. Bazhenov, "Robust to JPEG Compression Image Watermarking Scheme Based on Even-Odd Modulation and Error-Correcting Codes," in 2018 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon), IEEE, 2018, pp. 1-6.
- X. Yu, K. Chen, Y. Wang, W. Li, W. Zhang, and N. Yu, "Robust adaptive steganography based on generalized dither modulation and expanded embedding domain," Signal Process., vol. 168, p. 107343, 2020.
- J. Zhang, X. Zhao, and X. He, "Robust JPEG steganography based on the robustness classifier," EURASIP J. Inf. Secur., vol. 2023, no. 1, p. 11, Dec. 2023, [Online]. Available: https://doi.org/10.1186/s13635-023-00148-x.
- S. D. Lin, S.-C. Shie, and J. Y. Guo, "Improving the robustness of DCT-based image watermarking against JPEG compression," Comput. Stand. Interfaces, vol. 32, no. 1, Art. no. 1, Jan. 2010, doi: 10.1016/j.csi.2009.06.004.
- I. A. Ansari, M. Pant, and C. W. Ahn, "ABC optimized secured image watermarking scheme to find out the rightful ownership," Optik, vol. 127, no. 14, pp. 5711-5721, 2016.
- M. Moosazadeh and G. Ekbatanifard, "An improved robust image watermarking method using DCT and YCoCg-R color space," Optik, vol. 140, pp. 975-988, 2017.
- R. A. Watheq, F. Almasalha, and M. H. Qutqut, "A new steganography technique using JPEG images," Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 11, Art. no. 11, 2018.
- R. R. Kishore, "A novel and efficient blind image watermarking in transform domain," Procedia Comput. Sci., vol. 167, pp. 1505-1514, 2020.
- S. Sharma, J. J. Zou, and G. Fang, "A Novel Signature Watermarking Scheme for Identity Protection," in 2020 Digital Image Computing: Techniques and Applications (DICTA), Nov. 2020, pp. 1-5, [Online]. Available: https://doi.org/10.1109/DICTA51227.2020.9363396.
- S. E. Ghrare, A. A. M. Alamari, and H. A. Emhemed, "Digital Image Watermarking Method Based on LSB and DWT Hybrid Technique," in 2022 IEEE 2nd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA), IEEE, 2022, pp. 465-470.
- M. Begum et al., "Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition for Enhanced Imperceptibility and Robustness," Algorithms, vol. 17, no. 1, Art. no. 1, Jan. 2024, [Online]. Available: https://doi.org/10.3390/a17010032.
- R. Shmueli, D. Mishra, T. Shmueli, and O. Hadar, "A novel technique for image steganography based on maximum energy seam," Multimed. Tools Appl., Feb. 2024, [Online]. Available: https://doi.org/10.1007/s11042-024-18476-6.
- D. Hu, L. Wang, W. Jiang, S. Zheng, and B. Li, "A novel image steganography method via deep convolutional generative adversarial networks," IEEE Access, vol. 6, pp. 38303-38314, 2018.
- C. Yu, D. Hu, S. Zheng, W. Jiang, M. Li, and Z. Zhao, "An improved steganography without embedding based on attention GAN," Peer--Peer Netw. Appl., vol. 14, no. 3, pp. 1446-1457, May 2021, doi: 10.1007/s12083-020-01033-x.
- Z. Zhou et al., "Secret-to-image reversible transformation for generative steganography," IEEE Trans. Dependable Secure Comput., 2022, Accessed: Jun. 08, 2024, [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9931463/.
- Z. Zhou et al., "Latent vector optimization-based generative image steganography for consumer electronic applications," IEEE Trans. Consum Electron., vol. 70, no. 1, pp. 4357-4366, 2024.
- I. Hamamoto and M. Kawamura, "Neural watermarking method including an attack simulator against rotation and compression attacks," IEICE Trans. Inf. Syst., vol. 103, no. 1, pp. 33-41, 2020.
- M. Bagheri, M. Mohrekesh, N. Karimi, S. Samavi, S. Shirani, and P. Khadivi, "Image watermarking with region of interest determination using deep neural networks," in 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA), IEEE, 2020, pp. 1067-1072.
- S. Ingaleshwar, N. V. Dharwadkar, and J. D., "Water chaotic fruit fly optimization-based deep convolutional neural network for image watermarking using wavelet transform," Multimed. Tools Appl., vol. 82, no. 14, pp. 21957-21981, Jun. 2023, [Online]. Available: https://doi.org/10.1007/s11042-020-10498-0.
- T. Bui, S. Agarwal, N. Yu, and J. Collomosse, "Rosteals: Robust steganography using autoencoder latent space," in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2023, pp. 933-942.
- R. Xu et al., "InvisMark: Invisible and Robust Watermarking for AI-generated Image Provenance," Nov. 19, 2024, arXiv: arXiv:2411.07795, [Online]. Available: https://doi.org/10.48550/arXiv.2411.07795.
- M. Fallahpour and D. Megías, "Flexible image watermarking in JPEG domain," in 2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), IEEE, 2016, pp. 311-316.
- "CVG - UGR - Image database," Accessed: Mar. 29, 2025, [Online]. Available: https://ccia.ugr.es/cvg/dbimagenes/.
|

HOME

- Conference
- Journal
- Paper Submission to Journal
- For Authors
- For Reviewers
- Important Dates
- Conference Committee
- Editorial Board
- Reviewers
- Last Proceedings

PROCEEDINGS
-
Volume 13, Issue 2 (ICAIIT 2025)
-
Volume 13, Issue 1 (ICAIIT 2025)
-
Volume 12, Issue 2 (ICAIIT 2024)
-
Volume 12, Issue 1 (ICAIIT 2024)
-
Volume 11, Issue 2 (ICAIIT 2023)
-
Volume 11, Issue 1 (ICAIIT 2023)
-
Volume 10, Issue 1 (ICAIIT 2022)
-
Volume 9, Issue 1 (ICAIIT 2021)
-
Volume 8, Issue 1 (ICAIIT 2020)
-
Volume 7, Issue 1 (ICAIIT 2019)
-
Volume 7, Issue 2 (ICAIIT 2019)
-
Volume 6, Issue 1 (ICAIIT 2018)
-
Volume 5, Issue 1 (ICAIIT 2017)
-
Volume 4, Issue 1 (ICAIIT 2016)
-
Volume 3, Issue 1 (ICAIIT 2015)
-
Volume 2, Issue 1 (ICAIIT 2014)
-
Volume 1, Issue 1 (ICAIIT 2013)

PAST CONFERENCES
ICAIIT 2025
-
Photos
-
Reports
ICAIIT 2024
-
Photos
-
Reports
ICAIIT 2023
-
Photos
-
Reports
ICAIIT 2021
-
Photos
-
Reports
ICAIIT 2020
-
Photos
-
Reports
ICAIIT 2019
-
Photos
-
Reports
ICAIIT 2018
-
Photos
-
Reports
ETHICS IN PUBLICATIONS
ACCOMODATION
CONTACT US
|
|