Abstract

Image steganalysis has been widely studied, most of which can only complete the binary task of identifying the existence of hidden bits in an inquiry image. Currently, although some algorithms have been proposed to locate hidden bits, most of them mainly focus on the spatial domain, while usually ignoring the study of locating secret bits hidden in DCT domain for JPEG image. To address that challengeable problem, in this paper, towards two classical steganographic algorithms JSteg and F5, hiding bits in DCT domain, we propose a novel payload location method. The principal step of payload location is to estimate the cover image. We novelly propose to assign the different weights to the DCT coefficient residual in virtue of the texture of regions measured by the local variance, leading to the remarkable improvement of location results. Compared with the state of the art, the numerical experiments empirically verify that our proposed location method achieves the superior performance. In particular, when locating hidden bits in JSteg steganographic images with quality factor of 95 at the payload 0.1, the accuracy of location is remarkably improved from 46.18% to 90.22%.

1. Introduction

Steganography is an emerging technology that conceals secret information to achieve the aim of covert communication. In contrast, steganalysis focuses on the detection of multimedia carriers containing secret information operated by steganography. In particular, image steganography is to embed hidden bits in an image carrier. Considering the undetectability, one usually makes tiny changes to pixels in the spatial or frequency domain. Thus, image steganography in the spatial and frequency domains is, respectively, proposed. Accordingly, steganalysis can arbitrarily be classified into two categories: spatial steganalysis and frequency steganalysis (see details in [1]).

In the early stage, in the spatial domain, LSBR (least significant bit replacement) is usually considered as a classical steganographic algorithm. It enables the embedding by only flipping the pixels. Thereafter, LSBM (least significant bit matching) steganography is designed, which overcomes the histogram artifacts of LSBR through randomly adding or subtracting one to the cover pixels. In the frequency domain, JSteg inherits the idea of LSBR, extending to the DCT domain while excluding 0 and 1 coefficients from AC [2]. Afterwards, to further improve the undetectability and capacity, F5 serves as the updated version of DCT domain-based steganography [3]. In the modern image steganography, one of the most successful models rather treats the message embedding as a source coding problem with a fidelity constraint [4]. Specifically, one intends to minimize the distortion traces left by embedding and to construct the cost function that guides the embedding path to hide information in the texture region. Besides, relying on Industrial Internet of Things (IIoT) [5] and 3-D mesh [6], many novel steganography techniques have been proposed to enrich the study of this community. Recently, the study of RDH has also advanced [7, 8].

Many modern adaptive steganographic algorithms have been devised, such as HUGO [9], WOW [10], S-UNIWARD [4], and HILL [11] for spatial domain and J-UNIWARD [4], UED [12], UERD [13], and GMRF [14] for DCT domain. To resist against postprocessing attacks such JPEG compression, some robust methodologies are recently proposed [1519]. By contrast, mainly relying on hand-crafted feature extraction [2023] or statistical models [24], image steganalysis is also well developed, classifying between cover and stego images. Meanwhile, with the advance of deep neural networks, the end-to-end automatic image steganalysis gradually dominates the detection field (see [2532] for instance).

Traditionally, image steganalysis is primarily established to counter steganography, mainly completing the binary task. However, in general, we tend to extend the study of steganalysis onto four principal layers (from easy to hard mode) in the progressive relations:(1)Determine if an inquiry image contains hidden bits.(2)Estimate the payload of hidden bits.(3)Locate the position of hidden bits.(4)Extract and reconstruct hidden bits.

To our knowledge, most of steganographic algorithms focus on the first and second layer while ignoring the latter two layers of studies [3341]. In practice, the ultimate goal of steganalysis is to reconstruct the hidden bits, namely, forensic steganalysis [42]. Although a few payload location methods have been proposed, most of them extract hidden bits in the spatial domain while only the work in [40] opens the new way of locating bits hidden in the frequency domain towards JPEG image steganography. Nevertheless, the accuracy of location in [40] needs to be improved.

In this context, to address that tough issue, we carry out further research on payload location in the frequency domain for JPEG image. For clarity and simplicity, it is proposed to estimate the cover DCT coefficients in each subband, where the impact of different DCT coefficients on the cover estimation is well investigated. Straightforward, we propose a cover estimation algorithm based on the idea of weight assignment, in order to address the problem of payload location. The main contributions of this paper are as follows:(i)In order to improve the accurate estimate of low-texture region and to reduce the negative effects of high-texture region on payload location accuracy, the well-designed weights are assigned according to each factor’s importance.(ii)Based on the coefficients in the same subband, the cover estimate is established from spatial to DCT domain. Meanwhile, the proposed weight assigning based method further improves the accuracy of payload location for JPEG image steganography.(iii)Extensive experiments are comprehensively conducted on JPEG steganographic payload location. In particular, when locating hidden bits in JSteg steganographic images with quality factor of 95 at the payload 0.1, the accuracy of location is remarkably improved from 46.18% to 90.22%, better than the prior art.

The rest of the paper is organized as follows. Section 2 presents the related works. In Section 3, we mainly revisit the fundamental of payload location. Our proposed location method is mainly extended in Section 4. Section 5 demonstrates and analyzes the numerical results. Finally, Section 6 concludes this paper.

Ker [33] first proposed an algorithm for locating hidden bits of LSBR based on the idea of weighted stego (WS) in 2008. The linear filter was adopted for predicting the average residual value of each pixel, where residual-based threshold is empirically prescribed for locating embedding position. In 2009, Ker [34] proposed a payload location method based on the wavelet absolute moment (WAM) filter, in which in the wavelet domain, the WAM filter is used to extract residuals for payload location. Luo et al. [35] improved the accuracy of payload location in [34]. In particular, two methods were presented by calculating residuals with Gaussian weighted averaging, which indeed outperform the WAM method [34].

To unify the location of hidden bits embedded by LSBR or LSBM, Quach [36] proposed maximum a posteriori (MAP) vector estimation method based on Viterbi decoding for cover image estimation, where the detection performance of the WS and WAM was enhanced. Quach [37] further proposed a Markov random field-based approach, which uses pairwise constraints to capture the two-dimensional statistic from cover image, coupled with existing estimators, effectively improving the accuracy of payload location.

Next, in order to further improve the payload location accuracy of LSBM steganography, Sun et al. [43] proposed a payload location algorithm based on deep learning, which takes payload location as a pixel binary classification problem. The features extracted from the stego image are fed into the pretrained deep neural network to distinguish the payload and non-payload pixels. However, this algorithm is designed for payload location in the spatial domain and is not applicable to frequency domain.

Towards JPEG decompressed image, Liu et al. [44] presented a steganographic payload location method for secret hidden in the spatial domain. This method firstly recovered most of the cover pixels by recompression and then determined the pixel difference distribution between the cover image and the stego image. Finally, the hypothesis testing theory was adopted to confirm the correctness of the embedding positions. Inspired by the work of Liu et al. [44], series of steganalysis methods are proposed to recover the stego key towards LSBR, LSBM [38], F5 [41], and OutGuess [45]. Recently, towards adaptive steganography, [46] proposed a solution.

The aforementioned payload location methods mainly deal with the issue of extracting bits hidden in the spatial domain, in which the location accuracy is endlessly enhanced by improving the accuracy of cover image estimation. However, the study of the location method for frequential domain steganalysis is less developed.

To overcome that limitation, Wang et al. [40] first proposed a payload location method for JPEG image steganography relying on estimating the DCT coefficients. More specifically, this method first constructed the subimage consisting of the coefficients from the same subband, in which the correlation among DCT coefficients is investigated for estimation. Moreover, it introduced the well-designed linear filter and the WAM filter to estimate the quantized DCT coefficient. Meanwhile, to enhance the accuracy of payload location, the idea of maximum posterior probability was proposed. However, the location performance is not optimal in [40], which can be improved [47]. Without the loss of generality, the linear correlation among the corresponding DCT coefficients in the subimage is not as remarkable as that among the neighboring pixels in the spatial domain. Thus, the key step of improving the accuracy is to study the correlation among coefficients, in order to acquire more accurate DCT estimation.

To further improve the accuracy of payload location in JPEG image steganography, we explore the correlation of coefficients and adopt the idea of the weight assignment in DCT domain. Inspired by the work in [46], for simplicity, it is assumed that the correlation between the quantized DCT coefficient and its adjacent coefficients in the same subimage is not uniform. Intuitively, the high-texture regions are less correlated; the low-texture regions are more correlated. Therefore, we adaptively assign different weights to different DCT coefficients to improve the accuracy of payload location.

3. Fundamentals of Payload Location

In this article, we assume that the steganographer arbitrarily embeds the secret bits into a JPEG cover image with the same size and uses the same stego key. In fact, to our knowledge, the current payload location methods are always conducted on the premise of that. In this section, we will review the fundamentals of payload location, which guides us to design the proposed method.

Let denote a set of cover elements, in which can represent the pixel intensity in the spatial domain or the DCT coefficient in the frequency domain. In this context, we only focus on the frequency domain. Accordingly, a set of stego elements is denoted as , where the secret bits are hidden. Straightforward, it is assumed that for stego image, the residual of the coefficients at position is formulated aswhere denotes the coefficient by flipping the LSB of coefficient . That is, denotes the inverse coefficient of . For instance, in the procedure of JSteg steganography, the inverse coefficient of 4 is 5; the inverse coefficient of is . In addition, in the procedure of F5 steganography, the value of the inverse conversion coefficient for coefficient 2 is 3, while the value of the inverse conversion coefficient for is .

Let us define and as the probability of non-changed and changed coefficients in . Supposing that the secret bits consist of a pseudo-random sequence, the change magnitude of each available coefficient is defined as . If is confirmed as the payload position, the mean of residual of stego images at the same position can be described as

In contrast, if is not the payload position, the mean of residual is described as

From (2), we derive that the residual mean from payload positions is larger than zero, that is to say, the expectation value of the residual is estimated as (proof in (8)). Accordingly, from (3), we infer that the residual mean from non-payload positions would be equal to zero (proof in (9)). However, in practice, it hardly holds true that the cover image can be acquired. Instead, the cover element has to be estimated. Then, (1) can be modified as

In our assumption, the cover element needs to offset for better estimation. Thus, let us define as the estimation error of cover DCT coefficient , and then the following expression can be established:

Moreover, let us assume that if is confirmed as the payload position, the mean of residual can be expressed as

Otherwise, if is not the payload position, the mean of residual is formulated as

When , the estimation error does not exist. Then, according to (6), the expected mean of the estimated residuals in the payload position can be given by

According to (7), the expected mean of the estimated residuals in the non-payload position is defined as

In this context, for clarity and simplicity, it is proposed to assume that estimation error is not considered, where denotes the unbias estimation of . Therefore, based on the mathematical and fundamental analysis of payload location, even in the case that no cover images can be acquired, if each stego image has the payload at the same locations, one has the ability of effectively distinguishing between payload and non-payload positions. To further visualize the feasibility of payload location relying on the DCT residual, let us illustrate the histogram of residual mean. In Figure 1, the horizontal coordinate indicates the values of residual mean; the vertical coordinate indicates the frequency of occurrence of each residual mean. By using (4), the residual mean can be smoothly calculated. It can be observed that the distributions of the residual between non-payload and payload positions behave remarkably discriminatively.

4. Our Proposed Payload Location

Prior to our discussion of the proposed method, we first illustrate the flowchart of the overall framework (see Figure 2). A set of stego images with size , generated by adopting F5 or JSteg steganography, is used for locating the payload. The specific procedure of locating hidden bits in DCT domain is elaborated as follows:(1)First, one can extract the DCT coefficients and regroup them into a subimage, where all the coefficients are from the same DCT subband. It is worth noting that the DCT coefficients are arranged in order. Thus, 64 subbands lead to 64 subimages.(2)Next, cover element is accurately estimated by adopting the well-designed filter such as averaging filter or wavelet filter. Meanwhile, the flipped version of stego element is obtained. According to (4), residual at each position can be easily acquired.(3)The main contribution of this paper is to adopt the scheme of weight assignment. We calculate the weight based on the texture regions of inquiry image. By referring to (10), the weight can be obtained.(4)For images, it is proposed to normalize the residual (see (11)) based on the adaptive weight factor.(5)By sorting all residuals in descending order, the payload can be successfully located relying on the location map labeling the corresponding position of sorted residual.

In this paper, towards two classical steganographic algorithms JSteg and F5, we design the payload location method. The main contribution of this paper is to introduce the scheme of weight assignment, which indeed remarkably improves the accuracy of cover element estimation, leading to the more accurate payload location. In this section, we first present the specific scheme of weight assignment, which is applied to DCT estimation. At last, for practical location, we present the detailed procedure of payload location for JSteg and F5 steganography.

4.1. Weight Assignment of DCT Residual

In Section 3, we have already revisited the estimation procedure of the residuals. In this section, we consider to further improve the accuracy in the process of payload location by assigning different weights to the residuals. Let us define a weight factor as for each DCT coefficient at the position , mainly depending on the estimated coefficient neighbor’s local variance .

In our assumption, the location variation serves as the metric to evaluate the texture of the image region. In particular, large represents the high-texture region, in which we accordingly assign a small weight to reduce the impact from inaccurate estimate, and vice versa. In fact, the low-texture region can indeed bring us the more accurate estimate. Therefore, let us empirically define the weight factor aswhere denotes a hyperparameter. In general, can be calculated in the DCT block with size in the subimage, where 9 DCT coefficients centering at position are used for calculation. Thus, if the low-texture regions appear, tends to be small, leading to the acquirement of large weight; if the high-texture regions appear, tends to be large, leading to the acquirement of small weight. It makes sense that the DCT coefficients in the low-texture regions donate much more to the accurate estimation of residuals, where more correlated relation is exposed in an image. Relying on the adaptive weight assignment, the estimation of residual can be more sound.

Next, equipped with the well-designed weight, one can calculate the normalized weighted residuals bywhere the estimated residual for each coefficient can be described as

Compared with the scheme of arithmetic average (see (4) for details), we propose to adopt the scheme of weighted average to acquire the more accurate estimation of residual , directly resulting in the enhancement of location accuracy.

4.2. Estimation of DCT Coefficient

In order to obtain the residual, the estimation of cover DCT plays an important role. In general, the coefficients at each position represent the energy in the frequency domain as size of block. Then, if the pixels in the spatial domain are very similar, the DCT coefficients at the same position in the adjacent blocks should also be similar (or strongly correlated). Since the contents of adjacent blocks are usually correlated, DCT coefficients at the same position are probably highly correlated. Thus, it is reasonable that all the DCT coefficients are regrouped as 64 subimages, where DCT cover elements are accurately estimated. The main steps of estimation are as follows:(1)The inquiry JPEG image with the size of is decompressed to obtain a quantized DCT coefficient matrix .(2)By regrouping all the coefficients at the same position in each DCT block, the generated subimage contains the coefficients from the same subband, where a total of 64 subimages are obtained.(3)In each subimage, one can estimate the cover element by adopting the proposed low-pass filter. In particular, we construct two high efficient filters for estimation, which is extended in the following.

In image steganalysis, the linear correlation between adjacent elements of the matrix often serves as the basic prerequisite for cover estimation. For the design of estimator, one can adopt a simple but effective 4-neighborhood average filter. Specifically, in each subimage, the cover element is estimated by averaging four adjacent coefficients.

Besides, inspired by the WAM filter [34], we propose to apply the idea of filtering in the spatial domain to the wavelet domain. In fact, the wavelet transform has exhibited its excellent performance with good multidirectionality to capture fine-grained details of images, especially dealing with the problem of steganalysis. In particular, it is proposed to employ 8-tap Daubechies wavelet decomposition with one scale from the DCT domain to the wavelet domain. Then, the original DCT coefficients are transformed to , corresponding to low-frequency subband and high-frequency subbands (vertical, horizontal, and diagonal). We retain the low-frequency subband unchanged, while adopting the adaptive high-pass filter to the remaining 3 subbands, which is formulated aswhere denotes the local noise variance and the parameter denotes the estimate of the local variance based on the four different neighborhoods with size of , which is formulated aswhere . Finally, the four subbands in the wavelet domain, referred to as the original low-frequency and the filtered using (13), are inversely transformed to the DCT domain. Then, the cover element can be successfully estimated. It should be noted that in the first scale of wavelet decomposition, the filtering operation eliminates the high-frequency coefficients (mainly caused by embedding) while remaining are the low-frequency coefficients.

4.3. Payload Location for JSteg Steganography

Based on the aforementioned payload location method, let us extend our scheme to the specific steganographic algorithm, such as JSteg. JSteg steganography replaces the LSB of JPEG image in DCT domain, where the DC coefficients and AC coefficients with values of 0 and 1 remain unchanged. In this case, when estimating the residuals for 0 or 1, one can set the value to 0. Straightforward, when dealing with JSteg steganography, referring to (12), the residual can be formulated as

In the practical payload location of JSteg, we consider the impact of DCT coefficients 0 and 1 for improving the accuracy of cover DCT estimation. It is worth noting that the proposed weighted residual mean is calculated by (11) based on the obtained . After DCT estimation, the residual can be smoothly obtained. Next, by assigning the weight, the normalized residual guides us to locate hidden bits (see details in Figure 2).

4.4. Payload Location for F5 Steganography

In this section, in the framework of our proposed payload location, we will deal with the problem of locating hidden bits in F5 steganographic JPEG image. Similarly, F5 steganography is carried out in DCT domain, where the LSB of the negative DCT coefficients is redefined unlike JSteg. Besides, the DC coefficients and AC coefficients with 0 value are non-embeddable. When the ready-to-be-embedded bit is equal to the secret bit, no change happens; if the ready-to-be-embedded bit is different from the secret bit, the absolute value of the original coefficient is subtracted by 1. According to the embedding rules of F5, the specific residuals are specialized aswhere the flipped version of stego elements need to be redefined aswhere denotes that equiprobable binary choice is made as equal to 0. Specifically, the probability of 0 or 1 is approximately equal to 0.5, which is manually controlled by a uniformly distributed pseudo-random sequence. It should be noted that the proposed weighted average residual is calculated by (11) based on the obtained . Next, relying on the proposed framework of payload location, we conduct the remaining steps to complete the task of locating payload. In the following, we will demonstrate and analyze the numerical experimental results in details.

5. Experimental Results

To verify the effectiveness of the proposed location method in this paper, we conduct experiments on the baseline Bossbase 1.01 dataset [47]. It contains 10,000 images in 512   512 8 bit grayscale (PGM format) from eight different digital cameras. We compress all the images into JPEG format with quality factors of and 95. It is worth noting that if there exist a large number of zero coefficients in the quantized DCT coefficients of an image, it may cause the invalid position in the embedding path which fails to be embedded, leading to the error of payload location. Thus, in our experiments, we randomly select 1,000 original images for generating stego images. The stego images are generated by using F5 and JSteg steganography, with embedding rate ranging from 0.1 to 0.9 as interval 0.1. Then, for each steganographic algorithm, 18,000 stego images can be obtained. The specific settings are listed in Table 1.

In this paper, our proposed location method mainly tackles with JPEG stego image embedded by F5 or JSteg. Besides, to enrich the steganographic algorithms, we extend the traditional JSteg from LSB replacement to matching, in which the LSB of the DCT coefficient is randomly instead of LSB replacement in the frequency domain. Then, let us define the traditional JSteg replacement as JSR for abbreviation; JSM represents for the proposed JSteg matching. In Section 4.2, we have presented two types of DCT estimators, referred to as 4-neighborhood average filter and wavelet filter. In the following experiments, we intend to comprehensively evaluate the effectiveness of the proposed method by combining two filters with/without weight assignment scheme. Then, towards three different steganographic algorithms, we compare overall 9 payload location methods (see Table 2 for illustration).

5.1. Parameter Settings

In this section, we discuss the setting of the hyperparameter in (10). We adopt the WAF-JSR location method, where a 4-neighborhood average filter is used to estimate cover elements from JSR. Two quality factors of 75 and 95 are used to generate 6,000 stego images, with embedding rates of , respectively. In this experiment, it is proposed to compare the experimental results and select the optimal parameter by modifying the value of .

The experimental results are shown in Figure 3. Basically, the setting of the parameter cannot remarkably affect the performance of payload location. In particular, one can observe that for a quality factor of 95 and embedding rate of 0.1, the accuracy of payload location decreases sharply with increasing due to lack of hidden bits at the same embedding position. In contrast, for a quality factor of 75 and embedding rate of 0.1 and 0.5, the accuracy of payload location slightly increases with increasing , where it basically remains unchanged at 5. Additionally, at the embedding rate of 0.9, for the quality factor of 75 or 95, the accuracy remains very high since more hidden bits provide enough information for location.

To our knowledge, the high compression ratio directly affects the correlation among the neighboring coefficients in the subimage, where more correlated information is discarded. That is, the image with a quality factor of 75 has less correlated relationship than that of the image with a quality factor of 95. As illustrated in Figure 3, the location performance of images with the quality factor of 95 is superior to that of 75. In our location, the aim of assigning weight to the residuals is to maximize the correlated coefficients on the low-texture region while excluding the influence of the high-texture region. However, the parameter is fixed for payload location unlike adaptive in (10). Thus, basically cannot remarkably impact the detection results. Based on our analysis, we empirically adopt for our choice, which is applied in the following compared experiments.

5.2. Performance of Compared Methods

Next, to verify the validity of our proposed payload location method based on weighted DCT residual, it is proposed to conduct the comprehensive experiments. It should be noted that a set of payload locators is compared (see Table 2), towards three different JPEG image steganographic algorithms (JSR, JSM, and F5), including two quality factors of 75 and 95 and ten different embedding rates ranging from 0.1 to 0.9, where 1,000 stego images are used for payload location. Besides, it is worth noting that AF-JSR, AF-F5, WF-JSR, and WF-F5 were originally designed in [40]. Then by introducing the scheme of weight assignment in this paper, its enhanced version proposed by us refers to as WAF-JSR, WAF-F5, WWF-JSR, and WWF-F5.

First of all, let us compare our proposed payload locators with the scheme of weight assignment to the locators without assigning weight of Wang et al. [40]. As illustrated in Figure 4, it can be observed that when the quality factor remains unchanged, the accuracy of all the payload locators basically increases as the embedding rate increases. Overall, most of the locators with weight assignment perform better than the locators without weight assignment for all the given embedding rates. However, for JSR, if the wavelet filter is adopted for estimation, the locator with weight assignment (WWF-JSR) is basically similar to (even slightly worse than) the locator without weight assignment (WF-JSR). This is because the wavelet filter itself can provide the accurate enough estimation for JSR, where the strategy of weight assignment cannot largely improve the location accuracy any more.

Additionally, as we expected, it can be obviously observed that the locators perform better for dealing with JSR, compared with F5. For the comparison of two filters, when the strategy of the weight assignment is considered, the 4-neighborhood average filter (AF) is better than the wavelet filter (WF) for dealing with JSR. For locating hidden bits of F5, the 4-neighborhood average filter (AF) performs better at the low embedding rate while the wavelet filter (WF) is superior at the high embedding rate.

It should be noted that when the embedding rate is high enough, 0.9 for instance, the performance of all the locators is very similar. Since that more hidden bits are embedded, the advantage of the strategy of weight assignment is not very obvious. In fact, as a smart steganographer, the low embedding rate is always selected to bring the sufficient undetectability in the practical steganography. Thus, it is of importance that the improvement of location accuracy can be achieved when adopting our proposed method at the low embedding rate. For instance, in Figure 4(b), when the embedding rate is 0.1, the accuracy of the locator without assigning weight (AF-JSR) is only 46.18%. However, our proposed location method by considering the strategy of weight assignment (WAF-JSR) is able to achieve an accuracy of 90.22%.

The aim of weight assignment is to strengthen the DCT residuals that are reliably estimated (corresponding to low-texture region) and weaken the residuals that are poorly estimated (corresponding to high-texture region). In such case, one can assign different weights to the residual based on the texture of regions. According to the aforementioned experimental results, we can empirically verify that the proposed payload locator with the strategy of weight assignment has higher accuracy compared to the locator without assigning weight [40], especially in the case that the embedding rate is not high.

Moreover, in this context, we propose an enhanced version of JSteg steganography, referring to JSM (see details in Table 2). Then, let us compare the locators dealing with the problem of locating hidden bits in the stego image generated by JSM. Similarly, the schemes with and without weight assignment are compared. As illustrated in Figure 5, the accuracy of our proposed method is higher than that of the locator without assigning weight. Still, it should be noted that the improvement of location accuracy is more remarkable at the low embedding rate than that at the high embedding rate.

Additionally, we intend to investigate the location performance of the proposed methods when different numbers of stego images are adopted for payload location. As illustrated in Tables 3 and 4, with increasing the number of stego images, the location accuracy is gradually improved. Still, as we expected, the performance with the quality factor of 95 is better than that of 75, since more correlated information is provided. The locator towards F5 is worse than the locator towards JSR or JSM, since better estimation of cover DCT coefficients leads to better location accuracy.

Last but not least, let us investigate if our proposed location method has achieved the upper bound of location. In this scenario, it is assumed that the cover elements have been known for residual calculation. According to (2), we can easily obtain the DCT residual for payload location, in which the location results can serve as the theoretical upper bound of location. Then, the location results based on the estimated cover elements serve as the empirical results. As illustrated in Figure 6, when adopting the 4-neighborhood average filter, as the embedding rate increases, our proposed locator “empirical WAF-JSR” gradually approaches its theoretical upper bound while the “empirical AF-JSR” performs worse due to its inaccurate estimation.

To our knowledge, Sun et al. [43] pioneered the application of deep learning to payload location. Although the algorithm was used for hidden bit location in spatial domain, we modify the original method to apply it to frequency domain steganalysis. As illustrated in Table 5, the performance of Sun et al. [43] is weaker than the algorithm proposed in this paper, especially in the case of a large number of images. Besides, the computation cost of the deep learning based algorithm is much higher due to the procedure of model training.

6. Robustness Performance of Proposed Method

In the prior evaluation, our proposed payload location method has performed its efficacy towards three different steganographic algorithms (JSR, JSM, and F5) with different embedding rates. In fact, the hidden bits are successfully extracted based on the premise that the embedding algorithms have been known. In that case, the design of our proposed residual estimators is more targeted. In these experiments, it is proposed to evaluate the robustness of the locators when the embedding algorithms are unknown. Next, we will carry out the following non-target location experiments. When locating the hidden bits generated by F5, we adopt the residual estimator originally designed for JSR (see (15)); location results are illustrated in Table 6. Meanwhile, when locating the hidden bits generated by JSR, the residual estimator originally designed for F5 (see (16)) is used for payload location; location results are illustrated in Table 7. Here, we have added the symbol for distinguishing from the payload locators in Table 2. It can be observed that when the steganographic algorithms (JSR and F5) are unknown, our proposed payload locator hardly completes the task of locating hidden bits at the low embedding rate. However, at the high embedding rate (not smaller than 0.8), the location results are relevantly satisfying. Additionally, it is worth noting that although our proposed locator WAF-JSM actually uses the residual estimator (see (15)) originally designed for WAF-JSR, the location results are also encouraging at the high embedding rate (see Figure 5 for illustration).

Next, we intend to investigate the performance of our proposed method dealing with the challengeable scenario, where all the stego images are generated by random key. That is to say, for each image, it is not required that the secret bits are hidden in the same position. As illustrated in Table 8, our proposed location method nearly becomes invalid. It should be noted that, at the high embedding rate, the location results are satisfying. Nevertheless, our proposed location method performs very well on the premise that the same key is used for embedding.

Besides, it is proposed to verify the robustness of our locating method dealing with different image sizes. In fact, the algorithm proposed in this paper is nearly independent on image size. As illustrated in Table 9, the experimental results are conducted under the same conditions of and , in which the location results are very close by adopting each pair of location methods.

Finally, let us further verify the effectiveness of our method for adaptive steganography such as J-UNIWARD. We use the method in this paper to carry out payload location experiments for different embedding rates and different numbers of J-UNIWARD stego images. The experimental results are shown in Table 10. At low embedding rate, since adaptive steganography embeds secret bits into regions with high texture, the residual obtained from these regions will also be high. With the increase of embedding rate, the detection accuracy rate is obviously lower than the embedding rate, indicating that the location is completely invalid.

7. Conclusion and Limitation

In this paper, we propose a novel payload location method for two classical steganographic algorithms, referred to as JSteg and F5. In fact, most of the current payload locators only focus on the secrets hidden in the spatial domain and usually neglect the frequency domain. This paper focuses on the study of payload location in the frequency domain and achieves encouraging results. The main novelty of this paper is to assign weights to estimator based on image region texture, in order to improve the accuracy of DCT coefficient estimate. Large-scale experiments are conducted to evaluate the effectiveness of the proposed method. Compared with current arts, the location accuracy is remarkably improved. However, the limitation of current methods for payload location is that multiple stego images with the same stego key are used for detection.

Data Availability

No data were used to support this study.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This study was supported by the Fundamental Research Funds for the Provincial Universities of Zhejiang (grant no. GK219909299001-007), the National College Students Innovation and Entrepreneurship Training Program of China (grant nos. 202010336027 and 202110336033 ), the National Natural Science Foundation of China (grant nos. 61872448, U1804263, and 62172435), and the Zhongyuan Science and Technology Innovation Leading Talent Project of China (grant no. 214200510019).