Improving Anticompression Robustness of JPEG Adaptive Steganography Based on Robustness Measurement and DCT Block Selection

With the development of the Internet, social network platforms (SNPs) have become the most common channel for image sharing. As a result, transmitting stego images in the public channels gives steganographers the best opportunity to transmit secret messages with behavioral security preserved. However, the SNPs typically compress uploaded images and damage the weak signal of steganography. In this study, a robust JPEG steganographic scheme based on robustness measurement and cover block selection (CBSRS) is proposed. We first design a deep learning-based model to fit the blockwise change rate of coefficients after JPEG recompression. .en, a cover block selection strategy is proposed to improve the robustness by optimizing the joint distortion function of transmission costs and classic costs. Moreover, by embedding indicator of cover block selection in chrominance channels of JPEG images, a shareable cover construction scheme is designed to solve the problem of auxiliary information transmission. .e experimental results show that our proposed framework improves robustness while maintaining statistical security. Comparing with state-of-the-art methods, the framework achieves better performance under given recompression channels.


Introduction
Steganography is an advanced art of covert communication encoding secret messages into natural-looking covers while transmitting data without arousing attention of the others [1]. With the widespread use of JPEG format images, modern frameworks of JPEG image steganography are deeply researched and generally designed by minimizing modification distortion with matrix coding, e.g., Syndrome-Trellis codes (STCs) [2] and steganographic polar codes (SPCs) [3]. Meanwhile, distortion functions of JPEG images, such as J-UNIWARD [4], UED [5], and UERD [6], achieve highly statistical undetectability when against both high-dimensional feature extractors [7,8] and deep learning-based steganalyzer [9][10][11]. However, most of these steganography schemes are proposed under the hypothesis parties of communication. However, SNPs generally recompress uploaded multimedia files to review their content and optimize storage spaces into a uniform format. e JPEG recompression operation, especially with the fixed quantization table, is the most common procedure of the lossy channel of JPEG image transmission. e studying of anticompression steganographic schemes is the key to solving this problem.
To improve the anticompression robustness, robust steganographic schemes are designed with many considerations. Figure 1 shows the typical framework of robust steganography. e stego elements in the selected embedding domain, which will be encoded by specific steganographic code, are expected to remain almost invariant after transmitted in the recompression channel. e error correction codes (ECCs) provide integrity of extracted message from stego images. Besides, the preprocessing and postprocessing are also introduced for better performance. By the optimization above, the robustness of adaptive steganography is significantly improved.
As pointed out in [15], the robustness of the steganographic algorithm and stego images varies from one lossy channel to another, which denotes that the properties of recompression channel affect the performance of robustness. erefore, the robust adaptive steganographic frameworks can be divided into two categories: "General Robustness" and "Dedicated Robustness" according to the type recompression channel they aim at.
Steganographic frameworks in the "General Robustness" category are designed to improve comprehensive robustness by resisting general lossy properties of JPEG recompression and to preserve the integrity of secret message without considering the specific properties of JPEG recompression channel. In these frameworks, secret messages are embedded in different domains such as quantized pixel values [16][17][18][19] and the sign of DCT coefficients [20]. Typically, the amplitude of steganographic modification is larger than one, which introduces larger noise of steganography. As a result, the robustness performance is highly improved at the expense of the decrease of statistical security.
While, "Dedicated Robustness" is a class of robust adaptive steganography that provides reliable robustness performance for specific JPEG recompression channels. ese schemes generally regard a JPEG recompression channel as a black box and optimize the procedure of steganography with the specific properties of channels [15,21], by which the modification amplitude of coefficients is weakened, and the robustness of steganography improved, while the security performance is ensured to a certain extent. However, under the actual circumstances, the image data before and after recompression are available since the recompression channel of SNP is public. As a result, designing a robust steganographic framework in the "Dedicated Robustness" mode is appropriate.
Besides, as the quantization steps adopted in the recompression procedure are fixed in most SNP channels, the quantization tables of the cover JPEG image can be adjusted to the same as those of the recompression channel before steganographic embedding to reduce the error rate of stego image transmission, which shows that the problem of anticompression robust steganography under the same quantization table is more worthy of study.
In this study, a robust adaptive steganographic framework is proposed against any given recompression channel with the same quantization table. First, a deep regression model for DCT block robustness measurement is designed for transmission costs prediction. en, the cost of steganographic embedding is combined with the blockwise transmission cost, with which the cover DCT block selection scheme is proposed. Furthermore, a shareable cover construction scheme is proposed for the receiver to reconstruct stego blocks and extract embedded messages. erefore, the proposed framework can be used under any given recompression channel.
e main contributions of this study are as follows: (1) A novel designed deep learning-based model for robustness measurement of the DCT block is proposed and can be extended to any recompression channel with the same quantization steps. To the best of our knowledge, it is the first model for quantitative analysis of the JPEG image robustness. (2) e DCT cover block selection strategy is designed for improving both security and robustness performance. Comparing with state-of-the-art robust steganographic schemes, our framework achieves high robustness performance while preserving statistical security. (3) e shareable cover construction scheme provides high accuracy of auxiliary information recovery, which supports a complete end-to-end robust steganography framework effectively e main part of this study starts in Section 2, where we restate and expand the preliminaries of JPEG compression and the theory of classic adaptive steganography. In Section 3, the scheme of robustness measurement of the JPEG image is introduced first. Te framework of robust adaptive steganography based on cover block selection is described in Section 4. Section 5 gives the experimental results and analysis in detail. Finally, a brief conclusion of this study is listed in Section 6 as well as our future work.

Preliminaries and Related Works
2.1. Notions. In this study, matrices and vectors are written in boldface and sets are written in swash letters. Without loss of generality, let X � (x 1 , x 2 , . . . , x n ) ∈ L { } n represent a n pixels cover image and Y � (y 1 , y 2 , . . . , y n ) ∈ L { } n represent the stego image after steganographic embedding on X. L is the pixel dynamic range of image. As for JPEG images, L � −1024, −1023, . . . , 1023 { }, and x i is the DCT coefficients in i location. Besides, Q � (q ij ) stands for the quantization table of the JPEG images. e modification pattern of cover element x i is formulated by I i . e k-ary entropy function can be denoted by H k (π).

JPEG Recompression Procedure.
e JPEG recompression is a lossy procedure for digital images because of the quantization and rounding operation, which can be divided into two parts: JPEG compression and JPEG decompression. Generally, for a spatial image U � (u i ) ∈ 0, 1, . . . , 255 { } n , with a given quantization table Q, JPEG compress procedure performs mathematical operations on divided disjoint blocks of 8 × 8 pixels separately, which can be denoted as where D denotes the DCT coefficient in JPEG format, and the division above operates elementwise. e functions DCT(·) and round[·] represent the DCT operation and the rounding operation, respectively. Similarly, the JPEG decompression procedure operates on images blockwise, which is as follows: where IDCT(·) denotes the inverse DCT operation. Because of the nonlinearity of the rounding operation, for a given JPEG image, it is hardly able to restore the original one accurately after JPEG encoding and decoding procedure eventhough the quantization tables are the same. As a result, secret messages extracted from the JPEG stego images are possibly damaged after the basic JPEG recompression process as a result of the change of DCT coefficients [22,23], not to mention the practical transcode channel in the real world.

Sharing-Based Public Channel for Steganography.
In [24], Simmons proposed the prisoner-warden model, which defines a typical scenario of steganography, where steganographic schemes are expected to design for minimizing the perturbation of modification.
is class of steganographic schemes mainly focuses on statistical security but ignore the insecurity of communication behavior.
To cover the deficiency of the classic steganographic model, Zhao et al. [12] proposed a sharing-based steganography model. As shown in Figure 2, the stego file is uploaded to the public platform by Alice which can be downloaded by all parties including Bob. In this scenario, the relationship of communication is established between Alice and Bob through the public channels, which is weakened, since the method of communication is one-to-many instead of point-to-point. As a result, both statistical and behavioral security performance is considered in the steganography communication.
However, the public channels will generally recompress the uploaded files to uniform the format and save the storage space, while the steganographic signal will be disturbed. As for the media of image, since the public channels, such as SNPs, typically utilize the fixed quantization table to transcode the uploaded files, the cover images can be recompressed with the same quantization table to minimize the disturbance of transcoding. erefore, the sharing-based model of steganography is degraded to the problem of reliable steganography communication under the recompression channel with the same quantization table.

Optimal Steganographic Embedding.
In the payloadlimited sender (PLS) problem, steganographic schemes try to embed message m with calculated costs ρ into cover image X to generate stego image Y by solving the following optimization problem: Subjected to H(π) � − n i�1 s i ∈I i π i s i log 2 π i s i � |m|, (4) where s i denote the modification patterns for pixel in i location and ρ i (s i ) denote the cost with modification pattern s i for i th cover element. D represents the sum of the costs with certain modification pattern s � (s 1 , s 2 , . . . , s n ) for cover image, that is, where π i (s i ) denotes the probability of modifying the i th cover element. While solving the optimization problem shown in equation (3) with Lagrangian multiplier [25], the optimal probability of modification for each element is obtained: where λ > 0 is a scalar parameter determined by equation (4). e optimal probability above is the best mapping from the modification probability to the cost and has been proven to have a Gibbs distribution [26].  e approximate bit error probability of extracted message deduced in [27] implies that the larger values of h and w take the higher error probability of extracted message. In other words, the increase of submatrix height h and the decrease of relative payload α reduce the correct rate of message extraction in steganography since the width of submatrix can be calculated as w � ⌊1/α⌋ in STCs.

e Sources of Extraction Errors in Recompression
Furthermore, when a JPEG format stego image is transmitted in the recompression channel, bit errors will be generated in the extracted message for the changes of DCT coefficients. In modern JPEG steganography, the rate of modification is typically lower than the rate of embedding, i.e., relative payload, as a result of the matrix coding. Table 1 provides the statistical results of the number of modified coefficients per block using STCs with J-UNIWARD, where 4096000 samples of the DCT block partitioned from JPEG images of the ALASKA-JSMALL dataset (ALASKA-JSMALL dataset is obtained from RAW format images of the ALASKA database [28]. After center-cropped and rescaled to the size of 512 × 512, the format of which is converted to JPEG with different quality factors.) are adopted. e average and standard deviation of modification number, denoted as μ and σ, respectively, represent that no more than 2 coefficients per block are modified by the adaptive steganographic scheme on average when the quality factor is lower than 85.

Change Properties of DCT Block after Recompression.
As discussed in Section 2.2, images are partitioned into blocks of 8 × 8 pixels in the lossy procedure of JPEG compression. As a result, the DCT block is selected as the basic unit of research on the change properties of JPEG image coefficients after recompression.
To investigate the change properties of the JPEG recompressed DCT block, simulated ±1 modifications are directly operated on randomly selected coefficients in each DCT block. e simulation is performed on 409600 samples of 3-channel DCT block generated from the ALASKA-JSMALL dataset with quality factor of 75, 80, and 85. e recompression channel is established with MozJPEG (MozJPEG is a patch for libJPEG-turbo that improves JPEG compression efficiency achieving higher visual quality and smaller file sizes at the same time. MozJPEG can be explored on https://github.com/mozilla/mozjpeg) which is widely used by SNPs in the real world. e number of modified coefficients is in the range of 1-9 according to results in Section 2.5 and the theorem of large numbers. To obtain more complete statistical results, operations on each block are repeatedly conducted for 30 times. As shown in Figure 3, the average percentage of changed coefficients per block after recompression, denoted as p c , and is monotonically increasing with the number of modified coefficients per block n m .
Furthermore, the average and standard derivation of p c overall n m from Figure 3 are calculated and given in Table 2, which implies that p c remains almost constant as n m increases since the standard derivation of p c is less than 0.05%. As a result, the average percentage of changed coefficients after JPEG recompression can approximately represent the change properties of the DCT block.

e Model of Robustness Measurement.
Since the JPEG compression procedure is nonlinear, the mathematical model of the recompression process in the analytical form  can be highly sophisticated. In other words, the heuristic designed features can hardly represent the change properties of the DCT block before and after the JPEG recompression. Nevertheless, deep learning-based methods have achieved start-of-the-art performance in many fields, especially those related to image and video processing. For image compression, lots of works have been proposed [29][30][31] with the structure of autoencoders that performed better than classic schemes, which indicates that it is operable to design a deep learning-based model to extract features of JPEG recompression channel.
Since the transcoding procedure between DCT and spatial coefficients is nonlinear, the robustness measurement model is designed to fit the coefficient change rate with generality and nonlinearity. erefore, the coefficients of both DCT and spatial domain are inputted with two separate branches, and nonlinear activation functions are introduced in the model. Figure 4 shows the structure of the proposed model. e first branch, named D-branch, is designed for extracting the change features of DCT coefficients d i in zigzag order, while the S-branch aims at catching information of the block in spatial domain, which is denoted as s i . e features extracted by two branches are concatenated and activated by the TanH function for limiting the range of output before fed into the last pipeline. Batch normalization are utilized, and the activation function ReLU and leaky ReLU are introduced to improve the nonlinearity of the model. Dropout layers are also used after activation layers to overcome overfitting.
As the figure shows, η i is one of the outputs that represents the average percentage of the changed coefficient in the DCT block after JPEG recompression, while ξ i denotes the percentage of the change in block without any modification. It is worth mentioning that no activation function is adopted at the end of the output layers because the proposed model is designed for solving the regression problem.
In the training stage, 409600 samples in total are generated from the ALASKA-JSMALL dataset. Images are partitioned into blocks and of which the coefficients are randomly modified with different rates of modification for 30 times. Considering both the rate of modification and the accuracy of the generated samples, the numbers of modified coefficients in the experiment are all integers and range from 1 to 9.
In terms of the hyperparameters, the dropout rates are set to 0.25 in both feature extraction branches while 0.4 in other dropout layers. e negative slope of each leaky ReLU layer is set to 0.2. Adam optimizer is used with learning rate 0.000 1, and mini-batch gradient descent strategy is adopted with size 64. e loss function, which is defined as l � α · l η + β · l ξ , is used for network optimization, where l η and l ξ are the loss of outputs η i and ξ i , respectively. Considering the properties of the DCT block both with and without recompression, α and β are all set to 0.5. MSE (mean square error) function is also used for fitting both η i and ξ i . e proposed model is trained for 100 epochs. All the training procedures are conducted on NVIDIA Tesla P100 GPU with 12 GB graphics memory. Figure 5 shows the loss of training and validating stage, where the model converges rapidly at around 5 th epoch. e loss of the model decreases with training and stabilizes at a small value. erefore, the proposed model can efficiently estimate the robustness of the DCT block and provide high accuracy performance in quantitative analysis of robustness.

Proposed Framework
e proposed robust JPEG adaptive steganographic framework is shown in Figure 6. In the framework, we first use the robustness measurement model to estimate the   coefficient change rate of each DCT block after recompression. en, DCT blocks with the available cover elements are selected by selection strategy. e messages are embedded by classic steganographic schemes, and the auxiliary information of selection is encoded with the coefficients in the chrominance channel. After receiving stego images from SNPs, the receiver can extract messages from reconstructed cover elements. We name our proposed framework cover block selection-based adaptive robust steganography (abbreviated to CBSRS). Each strategy will be explained in detail in the following subsections.

e Properties of Cover Selection.
Defining the selection rate θ(0 < θ < 1) as the ratio of selected block number to overall block number, the optimality of cover block selection is associated with the selection rate since the coding efficiency of STCs changes with the number of selected elements.
For the security performance of steganography after selection, the average classic distortion of steganographic embedding increases as the block selection is conducted. e smaller the selection rate, the greater the classic steganographic distortion. As a result, selecting the cover block according to the newly designed joint distortion function introduces navigate impact on security performance, and the optimal average classic distortion is unreachable for the element with top smallest costs cannot be selected.
Concerning the robustness performance, adaptive steganography with only transmission costs defined as is discussed, where η k and ξ k are the predictions of the measurement model that, respectively, represent the robustness of the k th block with and without modification after JPEG recompression, and s k ∈ I � 0, 1 { } is the modification pattern of DCT block, where s i � 1 denotes that the block is modified regardless of the number or the location of the modification, while s i � 0 denotes that the block is not modified. In this scenario, given |m| bits message sequence m and cover of b blocks x � (x 1 , x 2 , · · · x b ), the blockwise transmission costs are calculated as ρ r � (ρ r 1 , ρ r 2 , . . . , ρ r b ). e expectation of transmission costs is where I � 0, 1 { }. Referring to the optimal embedding theory in Section 2.4, the expectation of distortion has a minimal value only when the probability of modification on each block ρ r follows Gibbs distribution. Assuming the number of embedded message bits is the same in each DCT block, the optimal probability of embedding satisfies When the cover block selection is conducted with given selection rate θ, b ′ � round[θb] blocks are selected as x ′ with costs ρ r ′ � (ρ r ′ 1 , ρ r ′ 2 , . . . , ρ r ′ b′ ). To embed the same message m into selected cover blocks x ′ , the optimal expectation of distortion is calculated by where the optimal probability of modification satisfies

Security and Communication Networks
As the selection rate θ ranges from 0 to 1, number of cover blocks b ′ < b. To satisfy both constrains in equations (10) and (13), for each cover block in both x and x ′ , since the optimal probability is a monotonic function of λ, we have which denotes that the entropy of each selected block increases after selection. According to the piecewise monotonicity of the binary entropy function, the probability of p r ′ i (0) and p r ′ i (1) changes closer to 0.5 after selection. As ρ r i (0) ≡ 0, the expectation of embedding distortion E p′ [D ′ ] is smaller than E p [D], which means that the cover block selection reduces the average distortion with optimal embedding.

Cover Block Selection Strategy.
As discussed in Section 2.5, the error of message extraction in recompression channels is introduced from decoding procedure of STCs. As a result, the anticompression properties of the DCT block determine the correct rate of extracted messages regardless of whether the DCT block is modified or not. is inspires us that steganographic encoding can be adopted in the DCT block with higher robustness performance. In other words, selecting cover block before embedding improves robustness of steganography.
Since STCs are adopted, the candidate cover block can be also selected based on the cost of steganography. However, robustness and security performance are a pair of contradictions. To improve robustness through cover block selection while minimizing the security performance, in our framework, the measurement of robustness, regarded as transmission costs, is defined in equation (7) and used as the distortion of image lossy transmission that combined with the classic costs of steganography ρ c .
According to the discussion above, the orders of magnitude between two types of distortion function is different.
us, the combination of transmission costs and the classic costs is defined in the form of multiplication. e joint distortion for cover block selection of each block d s is computed by where d c denotes the blockwise average of classic embedding distortion. In particular, let ρ c k represent all the classic distortion in the k th DCT block. Before utilizing, ρ c k is updated by which demonstrates that steganographic embedding is encouraged if transmission cost under modification is smaller. Besides, d r represents the expectation of transmission costs of each block, which is and p r k denotes the probability of modification of each block with the classic cost. Given the distortion of each coefficient in the j position of the k th DCT block ρ c j , the optimal ±1 modification probability p c j satisfies Gibbs distribution and is calculated by and p k is calculated by Based on the conclusion above, lower transmission cost and higher embedding cost are introduced by the cover block selection when the joint distortion function in equation (15) is used as the criteria. When the value of the selection rate θ is determined, θb blocks with the smallest joint distortion are selected as the cover element.
Meanwhile, for a given JPEG cover image, different robustness and security performance are acquired with different selection rate θ. To obtain the optimal trade-off between robustness and security in cover block selection, we introduce gain function for the decision of parameter θ.
Denote B k � j | 1 ≤ j ≤ 8 as the index set of the k th DCT block as zig-zag order. e expectation of classic costs D c and transmission costs D r without cover block selection are calculated by which are defined as the standard expectation of distortion, where p c i is the optimal modification probability in equation (6) under the classic costs and p r k denotes the modification probability of the k th block represented in equation (19). After block selection, b ′ blocks are selected as cover and the expectation of two costs are changed to Based on the discussion above, the optimal expectation of classic costs increases while the average distortion defined by transmission costs decreases. As a result, the gain function is defined as 8 Security and Communication Networks e optimal parameter θ 0 can be obtained by optimizing the gain function where b 0 � round(θ 0 b) is the number of selected blocks.
In practice, to solving the optimization problem in equations (23) and (24), the optimal modification distribution of steganography p c ′ j must be calculated first. However, the distribution p c ′ j can be obtained only when the element of cover is specified, which means the problem cannot be directly optimized. In the proposed framework, G(θ) is numerically calculated, where θ ∈ 0.2, 0.3, . . . , 0.8 { }, and the suboptimal parameter can be obtained. e concrete method is described by Algorithm 1.
As for the value of update parameter β, few experiments are conducted on the BOSSBase dataset [32] for steganographic statistical security and robustness performance, which is shown in Figure 7. P E denotes the average detection error of the DCTR (discrete cosine transform residual) [8] extractor and R E represents the average error rate of message extraction. With the decrease of the value of β, the robustness performance improves while the statistical security declines markedly. To improve the robustness within the acceptable range of security performance, β � 0.7 is determined in our work.

Construction of Shareable Cover.
For the sender of adaptive steganography, cover block selection improves the robustness performance. However, the auxiliary information about the selected block is nonshared with the receiver. To complete the steganographic channel, the shareable cover between the sender and receiver needs to be constructed. Classic JPEG steganography mainly focuses on the luminance channel while keeping the chrominance unmodified. Actually, DCT coefficients in the chrominance channel also have the capacity to carry messages. erefore, the auxiliary information can be encoded into the chrominance channel.
In this study, JPEG images without chrominance channel subsampling are discussed. e sign of DCT coefficient is utilized as the embedding domain and the STCs are adopted to minimize the impact of auxiliary information encoding. As the experiment conducted in [19] shows, the coefficients in the higher frequency domain perform more stable after recompression while providing less security after modification. Besides, the DCT coefficients may shrinks towards 0 during JPEG recompression [33]. Since the relative payload of auxiliary information is low, the 5 AC coefficients at the lowest frequency are used for embedding.
Redefining B k � i, j|1 ≤ i, j ≤ 8 as the index of rows and columns of coefficients in separate DCT blocks, in the proposed strategy, the cover element x k i,j can be formulated by where c k i,j denotes the DCT coefficient of (i, j) position in k th block. e modification distance is defined as e unit cost of each coefficient ρ k i,j is calculated by the distortion function of J-UNIWARD, and the embedding cost ζ k i,j is calculated by where the multiplication is operated elementwise. ese denote that cover element flipping will change the coefficient to the magnitude of q 0 with opposite sign and the zero valued coefficients will remain unchanged.
Besides, to ensure the integrity of auxiliary information, RS codes are adopted with bit-interleaved coding instead of random shuffle, which further improves the integrity of auxiliary information. e performance of cover reconstruction accuracy is discussed in Section 5.4.

Experimental Setups.
e experiments for performance analysis are all conducted on images in JPEG format centercropped and resized to the size of 512 × 512, which are converted from the RAW format BOSSBase [32] dataset. Adaptive steganographic schemes are utilized in the proposed framework. e ternary multilayered version of STCs is used with the parameter h fixed of 3 for the best performance of robustness. Baseline algorithms JCRISBE [21] and GMAS [19] are selected as well as classic steganographic schemes J-UNIWARD [4] to compare with the proposed CBSRS framework, since JCRISBE and GMAS are the representative algorithms of the dedicated robustness and general robustness, respectively. Besides, the samples with quality factor of 75, 80, and 85 are evaluated for the SNPs will not transcode images with low quality. All the JPEG recompression procedures in the experiments are implemented with MozJPEG, and all samples are in color.
To evaluate the security performance, the ensemble classifier [34] is trained to discriminate the cover and stego samples. High-dimensional features are extracted from the samples and randomly divided into two groups. Half of the features are input into the classifier for training, while the others are used for testing. e performance of steganalysis is evaluated by the detection error of the classifier, which is defined as Security and Communication Networks where P FA and P MD are the probability of false alarm and missed detection rate, respectively. Practically, the evaluation is conducted 10 times, and the average output of multiple tests, denoted as P E , is adopted as the final result. In the experiments, the DCTR and PHARM (PHase Aware pRojection Model) [7] feature extractor are utilized. Furthermore, the error rate of the extracted secret message is calculated by where m represents the original embedded secret message and |m| is the length of bit of m, and n E represents the number of bit error of extracted secret message. Note that the payload mentioned in the experiments denotes the original embedding rate calculated by the length of not encoded secret message.

Robustness Performance of the Proposed Framework.
To demonstrate the effectiveness of cover block selection strategy, the robustness is evaluated by the bit error of message extraction defined by equation (29). All the sample images from BOSSBase 1.01 are utilized, which are converted to JPEG format with the size of 512 × 512.
Input: JPEG cover image X, elementwise classic cost ρ c , blockwise transmission cost ρ r Output: cover selection indicator K (1) For each DCT block B k in X do (2) for j � 1 to 64 do // elementwise To further illustrate the effectiveness of the proposed CBSRS framework, the state-of-the-art robust steganographic schemes JCRISBE and GMAS are compared. e function imread and imwrite from MATLAB are utilized in the transport channel matching procedure of JCRISBE. Note that RS codes or BCH codes are adopted in JCRISBE and GMAS, but no ECCs are used in CBSRS framework. Table 3 provides the result of extraction error rate of different steganographic schemes. Compared with the classic scheme, the robustness performance of these robust steganographic schemes is improved to varying degrees. While, GMAS outperforms other algorithms in the class of dedicated robustness as watermarking modulation mode is adopted.
As for dedicated robustness, the extraction error rate of JCRISBE is higher than which of the CBSRS framework especially when at the lower relative payload, which denotes that the robustness performance will decrease when the channel is not completely matched in JCRISBE. However, CBSRS is designed by mastering the recompression properties of aimed lossy channel. For robustness, the proposed CBSRS framework performs better than the baseline algorithm of the class of dedicated robustness.

Security Performance Comparison.
In this experiment, security performance is evaluated by using the detection error defined in equations (10) and (28) and converted images in color JPEG format from BOSSBase are utilized. To compare the statistical security with the steganographic algorithms, only steganalytic features of luminance channel are extracted. Figures 9-11 show the security performance of the proposed CBSRS and compared schemes. e statistical result of J-UNIWARD is also presented as the baseline of steganalytic security.
Since the amplitude of modification is large, the steganographic security of the GMAS scheme is quite unsatisfactory when comparing with other dedicated robustness schemes. However, both JCRISBE and CBSRS basically maintain the statistical security while providing robustness of steganography. However, the proposed CBSRS framework surpasses the state-of-the-art robust steganographic scheme for statistical security since the ECCs are adopted in JCRISBE.
e experimental results demonstrate that the model of proposed robustness measurement is effective, and the strategy of cover block selection is capable of optimizing the trade-off between the robustness and the security of steganography.
Besides, the position distribution of modification of each steganographic scheme is investigated. As shown in Figure 12, the modification position of the proposed CBSRS scheme is more concentrated than which of other schemes. erefore, the affected area of steganographic noise in the image is smaller which contributes to the high statistical security.

Accuracy of Cover Reconstruction.
e experimental results of both the reconstruct successful rate and the bit error rate of auxiliary information are given in Table 4. e successful reconstruct rate is considerable especially at the higher quality factor of channel. is is because the lower quantization step provides higher accuracy of sign-based stego element. Besides, the average information error rate maintains low and increases with relative payload, which denotes that steganographic embedding in the luminance channel of JPEG affects the robustness of element in the chrominance channel. As a result, the coefficient sign-based cover reconstruction strategy is effective in recompression channel.   3 bpnzAC with quality factor of 85 and STCs, respectively. In this subsection, the accuracy of the cover reconstruction is evaluated. For the cover images size 512 × 512, 4096 bit indicators are required to reconstruct the location of the cover element. To decrease the size of auxiliary information and increase the accuracy of the cover reconstruction, the indicators of each block are quantized in each 2 × 2 units for the robustness distribution in natural images continuous with the image content. Meanwhile, (31,15) RS codes are adopted with bit-interleaved coding to further reduce the extraction error rate. us, 2,170 bit auxiliary information is encoded with the chrominance channel of each cover image in the experiment.

Conclusion and Future Works
In this study, we propose a robust steganographic framework with the strategy of cover block selection, which are capable of resisting JPEG recompression while maintaining high steganographic security. Besides, a deep learning-based model for robustness measurement of DCT block is designed, and a joint distortion function of cover block selection is defined. e comparison results show that our proposed framework highly decreases the bit error rate under the lossy channel with the same quantization table while maintaining statistical security by mastering the properties of the lossy channel, and the CBSRS framework outperforms the state-of-the-art steganographic schemes in a specific lossy channel. Furthermore, a synchronous transmission strategy of block selection auxiliary information is investigated to construct shareable cover with sender and receiver, which builds up the first framework of auxiliary information-based robust steganography for JPEG images.
In the future, the model of robustness measurement will be updated, and the proposed robust steganographic framework will be expanded to the lossy channel with different quantization tables. In addition, we will design a suitable error correction scheme to further improve the robustness of adaptive steganography.

Data Availability
e data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest
e authors declare that there are no conflicts of interest.