skip to main content
10.1145/2656434.2659756acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Passive warden using statistical steganalysis

Published:13 October 2014Publication History

ABSTRACT

This paper examines the statistical techniques used in blind steganalysis of JPEG images. Blind steganalysis attempts to detect the presence of covert data without knowing the particular steganographic algorithm used. This paper begins by discussing steganography and steganalysis in general with a focus on common techniques. JPEG images are then introduced with a detailed discussion of their format and how they are created. Once the details of JPEG images are understood, common JPEG steganographic algorithms are explained. These algorithms are available in programs like JSteg, Outguess, and F5. This paper focuses on the Calibration Technique and associated features developed by Fridrich.

The goal is to develop an application that detects covert data hidden in JPEG images by common steganographic algorithms. The output from this application is an indicator of whether or not the image contains covert data.

References

  1. C.-C. Chang, C.-C. Lin, C.-S. Tseng, and W.-L. Tai. Reversible hiding in dct-based compressed images. Information Sciences, 177(13):2768--2786, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Fridrich. Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. G. C. Kessler. An overview of steganography for the computer forensics examiner. Forensic Science Communications, 6(3):1--27, 2004.Google ScholarGoogle Scholar
  4. M. Kumar. Steganography and Steganalysis of JPEG Images: A Statistical Approach to Information Hiding and Detection. LAP LAMBERT Academic Publishing, 2011.Google ScholarGoogle Scholar
  5. F. Liu. Jpeg standard - a tutorial based on analysis of sample picture - part 1. coding of a 8x8 block, August 2011.Google ScholarGoogle Scholar
  6. U. M. Maurer. A universal statistical test for random bit generators. Journal of cryptology, 5(2):89--105, 1992. Google ScholarGoogle ScholarCross RefCross Ref
  7. N. Provos. Defending against statistical steganalysis. In Usenix Security Symposium, volume 10, pages 323--336, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. J. Simmons. The prisoners' problem and the subliminal channel. In Advances in Cryptology, pages 51--67. Springer, 1984.Google ScholarGoogle ScholarCross RefCross Ref
  9. A. Westfeld and A. Pfitzmann. Attacks on steganographic systems. In Information Hiding, pages 61--76. Springer, 2000. Google ScholarGoogle Scholar

Index Terms

  1. Passive warden using statistical steganalysis

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        RIIT '14: Proceedings of the 3rd annual conference on Research in information technology
        October 2014
        98 pages
        ISBN:9781450327114
        DOI:10.1145/2656434

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 October 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        RIIT '14 Paper Acceptance Rate14of39submissions,36%Overall Acceptance Rate51of116submissions,44%
      • Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader