New Features for Specific JPEG Steganalysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
New Features for Specific JPEG Steganalysis

Authors: Johann Barbier, Eric Filiol, Kichenakoumar Mayoura

Abstract:

We present in this paper a new approach for specific JPEG steganalysis and propose studying statistics of the compressed DCT coefficients. Traditionally, steganographic algorithms try to preserve statistics of the DCT and of the spatial domain, but they cannot preserve both and also control the alteration of the compressed data. We have noticed a deviation of the entropy of the compressed data after a first embedding. This deviation is greater when the image is a cover medium than when the image is a stego image. To observe this deviation, we pointed out new statistic features and combined them with the Multiple Embedding Method. This approach is motivated by the Avalanche Criterion of the JPEG lossless compression step. This criterion makes possible the design of detectors whose detection rates are independent of the payload. Finally, we designed a Fisher discriminant based classifier for well known steganographic algorithms, Outguess, F5 and Hide and Seek. The experiemental results we obtained show the efficiency of our classifier for these algorithms. Moreover, it is also designed to work with low embedding rates (< 10-5) and according to the avalanche criterion of RLE and Huffman compression step, its efficiency is independent of the quantity of hidden information.

Keywords: Compressed frequency domain, Fisher discriminant, specific JPEG steganalysis.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1062008

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2110

References:


[1] I. Avicibas┬©, N. Memon, and B. Sankur. Steganalysis based on image quality metrics. In Proc. SPIE, Security and Watermarking of Multimedia Contents III, volume 4314, pages 523-531, 2001.
[2] C. W. Brown and B. J. Shepherd. Graphics File Formats, reference and guide. Manning, 1995.
[3] Rajarathnam Chandramouli, Mehdi Kharrazi, and Nasir D. Memon. Image steganography and steganalysis: Concepts and practice. In Kalker et al.
[12], pages 35-49.
[4] Hany Farid. Detecting hidden messages using higher-order statistical models. In ICIP (2), pages 905-908, 2002.
[5] H. Feistel. Cryptography and computer privacy. Scientific American, 228(5):15-23, 1973.
[6] J. Fridrich, M. Goljan, and D. Hogea. New methodology for breaking steganographic techniques for jpegs. In Proc. SPIE, Security and Watermarking of Multimedia Contents V, pages 143-155, January 2003.
[7] J. Fridrich and T. Pevny. Multiclass blind steganalysis for jpeg images. In Proc. SPIE, Security and Watermarking of Multimedia Contents VIII, January 2006.
[8] Jessica J. Fridrich. Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In Information Hiding
[9], pages 67-81.
[9] Jessica J. Fridrich, editor. Information Hiding, 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers, volume 3200 of Lecture Notes in Computer Science. Springer, 2004.
[10] Jessica J. Fridrich, Miroslav Goljan, and Dorin Hogea. Steganalysis of jpeg images: Breaking the f5 algorithm. In Petitcolas
[19], pages 310-323.
[11] J. J. Harmsen and W. A. Pearlman. Kernel fisher discriminant for steganalysis of jpeg hiding methods. In ACM Multimedia and Security, August 1-2 2005.
[12] Ton Kalker, Ingemar J. Cox, and Yong Man Ro, editors. Digital Watermarking, Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers, volume 2939 of Lecture Notes in Computer Science. Springer, 2004.
[13] A. Latham. Steganography: JPHIDE AND JPSEEK, 1999. http://linux01.gwdg.de/Ôê╝alatham/stego.html.
[14] Guo-Shiang Lin, Chia H. Yeh, and C. C. Jay Kuo. Data hiding domain classification for blind image steganalysis. In ICME, pages 907-910, 2004.
[15] S. Lyu and H. Farid. Steganalysis using color wavelet statistics and one-class support vector machines. In Proc. SPIE, Security and Watermarking of Multimedia Contents VI, 2004.
[16] S. Lyu and H. Farid. Steganalysis using higher-order image statistics. IEEE Transactions on Information Forensics and Security, (1), 2006.
[17] Siwei Lyu and Hany Farid. Detecting hidden messages using higherorder statistics and support vector machines. In Petitcolas
[19], pages 340-354.
[18] Ira S. Moskowitz, editor. Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings, volume 2137 of Lecture Notes in Computer Science. Springer, 2001.
[19] Fabien A. P. Petitcolas, editor. Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, volume 2578 of Lecture Notes in Computer Science. Springer, 2003.
[20] Niels Provos. Defending against statistical steganalysis. In 10th USENIX Security Symposium, 2001.
[21] Gilbert Saporta. Probabilit'e, analyse des donn'ees et statistiques (in french). Technip, 1990.
[22] Gustavus J. Simmons. The prisoners- problem and the subliminal channel. In CRYPTO, pages 51-67, 1983.
[23] Gregory K. Wallace. The jpeg still picture compression standard. Commun. ACM, 34(4):30-44, 1991.
[24] Andreas Westfeld. F5-a steganographic algorithm. In Moskowitz (18), pages 289-302.