ABSTRACT
This paper examines the statistical techniques used in blind steganalysis of JPEG images. Blind steganalysis attempts to detect the presence of covert data without knowing the particular steganographic algorithm used. This paper begins by discussing steganography and steganalysis in general with a focus on common techniques. JPEG images are then introduced with a detailed discussion of their format and how they are created. Once the details of JPEG images are understood, common JPEG steganographic algorithms are explained. These algorithms are available in programs like JSteg, Outguess, and F5. This paper focuses on the Calibration Technique and associated features developed by Fridrich.
The goal is to develop an application that detects covert data hidden in JPEG images by common steganographic algorithms. The output from this application is an indicator of whether or not the image contains covert data.
- C.-C. Chang, C.-C. Lin, C.-S. Tseng, and W.-L. Tai. Reversible hiding in dct-based compressed images. Information Sciences, 177(13):2768--2786, 2007. Google ScholarDigital Library
- J. Fridrich. Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, 2010. Google ScholarDigital Library
- G. C. Kessler. An overview of steganography for the computer forensics examiner. Forensic Science Communications, 6(3):1--27, 2004.Google Scholar
- M. Kumar. Steganography and Steganalysis of JPEG Images: A Statistical Approach to Information Hiding and Detection. LAP LAMBERT Academic Publishing, 2011.Google Scholar
- F. Liu. Jpeg standard - a tutorial based on analysis of sample picture - part 1. coding of a 8x8 block, August 2011.Google Scholar
- U. M. Maurer. A universal statistical test for random bit generators. Journal of cryptology, 5(2):89--105, 1992. Google ScholarCross Ref
- N. Provos. Defending against statistical steganalysis. In Usenix Security Symposium, volume 10, pages 323--336, 2001. Google ScholarDigital Library
- G. J. Simmons. The prisoners' problem and the subliminal channel. In Advances in Cryptology, pages 51--67. Springer, 1984.Google ScholarCross Ref
- A. Westfeld and A. Pfitzmann. Attacks on steganographic systems. In Information Hiding, pages 61--76. Springer, 2000. Google Scholar
Index Terms
- Passive warden using statistical steganalysis
Recommendations
Steganalysis of YASS
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and securityIn this paper, we describe a method for attacking Yet Another Steganographic Scheme (YASS), which is designed to be a very secure JPEG steganographic algorithm. The success of YASS is attributed to its innovation in embedding, i.e., hiding data in ...
Steganalysis of YASS
A promising steganographic method--Yet Another Steganography Scheme (YASS)--was designed to resist blind steganalysis via embedding data in randomized locations. In addition to a concrete realization which is named the YASS algorithm in this paper, a ...
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis
Statistical steganalysis schemes detect the existence of secret information embedded by steganography. The x^2-detection and Regular-Singular (RS)-attack methods are two well-known statistical steganalysis schemes used against LSB (least significant bit)...
Comments