Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
نویسندگان
چکیده
The recent approach of a model-based framework for steganography fruitfully contributes to the discussion on the security of steganography. In addition, the first proposal for an embedding algorithm constructed under the model-based paradigm reached remarkable performance in terms of capacity and security. In this paper, we review the emerging of model-based steganography in the context of decent steganalysis as well as from theoretical considerations, before we present a method to attack the above-mentioned scheme on the basis of first order statistics. Experimental results show a good detection ratio for a large test set of typical JPEG images. The attack is successful because of weaknesses in the model and does not put into question the generalised theoretical framework of model-based steganography. So we discuss possible implications for improved embedding functions.
منابع مشابه
نهانکاوی در تصاویر JPEG بر مبنای دستهبندی ویژگیهای آماری و تصمیمگیری دو مرحلهای
Abstract In this paper, we propose a comprehensive steganalysis scheme for JPEG images. In this method, the optimized features which can interpret high distinction between cover and stego images are extracted from images. These features have been selected after a careful study on modifications caused by different steganography algorithms on statistical characteristics of images. Furthermore, us...
متن کاملSteganography and Steganalysis of JPEG Images
My research motivation came from a project supported by Naval Research Laboratory (NRL) where I was working on an algorithm to provide better stealthiness for hiding data inside JPEG images. As a result, with the guidance of my advisor, Dr. Newman, and Ira S. Moskowitz from Center for High Assurance Computer Systems, NRL, we developed J2 steganography algorithm which was based on hiding data in...
متن کاملData Hiding in Digital Images : A Steganographic Paradigm
In this thesis a study on the Steganographic paradigm of data hiding has been presented. The problem of data hiding has been attacked from two directions. The first approach tries to overcome the Targeted Steganalytic Attacks. The work focuses mainly on the first order statistics based targeted attacks. Two algorithms have been presented which can preserve the first order statistics of an image...
متن کاملMulti-class blind steganalysis for JPEG images
In this paper, we construct blind steganalyzers for JPEG images capable of assigning stego images to known steganographic programs. Each JPEG image is characterized using 23 calibrated features calculated from the luminance component of the JPEG file. Most of these features are calculated directly from the quantized DCT coefficients as their first order and higher-order statistics. The features...
متن کاملWeaknesses of MB2
Model-based steganography is a promising approach for hidden communication in JPEG images with high steganographic capacity and competitive security. In this paper we propose an attack, which is based on coefficient types that can be derived from the blockiness adjustment of MB2. We derive 30 new features to be used in combination with existing blind feature sets leading to a remarkable reducti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004