Skip to content

A JPEG-Based Steganography Tool: The Mod4 Algorithm.

License

Notifications You must be signed in to change notification settings

digitnet/m4jpeg

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

44 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

About M4JPEG:

M4JPEG project aims to build a Matlab-compiled steganography tool working in the field of JPEG images. The provided M4JPEG tool lets the user hide a private file within a JPEG image using an adaptive steganographic method called Mod4[1].

The Existing Folders:

  • block_diagram: Contains the basic block diagrams of embedding and extracting processes.
  • gui_screenshots: Contains the main screenshots.
  • phil_sallee_toolbox: Contains the Sallee's toolbox.
  • src_code: Contains the source code; .m , .fig, and .mexwXX files.

Notes About Use:

  • The StartGUI files (.m, .fig) are the starting ones. StartGUI.m represents the main GUI that calls all other GUIs and required functions.
  • The pre-compiled MEX files (.mexwXX) perform the lossless compression steps including the entropy coding and decoding. The zip file of jpeg_toolbox contains pre-Matlab-compiled MEX files according to several systems.

About The Current Version - M4JPEG Ver 1.4:

  • The current version of M4JPEG doesn’t include an encryption layer, thus the file we want to hide is not encrypted before the embedding process. But, the hiding layer is protected by using a key-based permutation generator.
  • The permutation generator is based on a Matlab built-in pseudo-random generator.
  • The current version of M4JPEG only uses the parameters M4[1,1,1,1].
  • Only the extension AND the size of the embedded file are stored directly in the cb and cr components of the generated Stego JPEG file.
  • The main used key (at least 12 Char) is NOT saved or stored in any form in the generated Stego JPEG file. Thus, during the extraction process, M4JPEG can NOT recognize whether the entered key matches the used one. If the entered key is NOT the same as the used one, the extracted file will contain meaningless data.
  • We use the toolbox of Phil Sallee[2]. Sallee’s toolbox makes easier to access and manipulate the qDCT coefficients of a given JPEG file. The main two functions perform the standard steps of lossless compression, including Huffman Coding and decoding.

References:

  • [1] KokSheik Wong, Xiaojun Qi, Kiyoshi Tanaka. “A DCT-based Mod4 Steganographic Method”: Signal Processing 87, 1251–1263, 2007.
  • [2] Phil Sallee. “Matlab JPEG Toolbox”,Sep 2003. Download link: http://dde.binghamton.edu/download/jpeg_toolbox.zip

View M4JPEG Steganography on File Exchange

About

A JPEG-Based Steganography Tool: The Mod4 Algorithm.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages