IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Steganalysis of GIM-based data hiding using kernel density estimation
Proceedings of the 9th workshop on Multimedia & security
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
IH'04 Proceedings of the 6th international conference on Information Hiding
Factor graphs and the sum-product algorithm
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Proceedings of the 11th ACM workshop on Multimedia and security
Improved detection and evaluation for JPEG steganalysis
MM '09 Proceedings of the 17th ACM international conference on Multimedia
IEEE Transactions on Information Forensics and Security
An improved approach to steganalysis of JPEG images
Information Sciences: an International Journal
Steganalysis by subtractive pixel adjacency matrix
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
An experimental study on the security performance of YASS
IEEE Transactions on Information Forensics and Security
JPEG error analysis and its applications to digital image forensics
IEEE Transactions on Information Forensics and Security
Obtaining higher rates for steganographic schemes while maintaining the same detectability
IH'10 Proceedings of the 12th international conference on Information hiding
Hi-index | 0.00 |
In this paper, we describe a method for attacking Yet Another Steganographic Scheme (YASS), which is designed to be a very secure JPEG steganographic algorithm. The success of YASS is attributed to its innovation in embedding, i.e., hiding data in embedding host blocks whose locations are randomized. However, we find that the locations of the embedding host blocks are not randomized enough. Some locations in an image are possible to hold an entire embedding host block and some locations are definitely not. Additionally, YASS employs a Quantization Index Modulation (QIM) embedding strategy in order to enhance the robustness of the embedded data, which on the other hand introduces extra zero coefficients into the embedding host blocks during data hiding. Consequently, statistical features extracted from locations which are possible to hold embedding host blocks are different from those from locations which are impossible to hold embedding host blocks. The trace of YASS embedding is therefore exposed.