Digital Steganography: Hiding Data within Data
IEEE Internet Computing
StegFS: A Steganographic File System for Linux
IH '99 Proceedings of the Third International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
Detecting Steganographic Messages in Digital Images
Detecting Steganographic Messages in Digital Images
A novel steganography method based on modifying quantized spectrum values of MPEG/audio layer III
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
WhiteSteg: a new scheme in information hiding using text steganography
WSEAS Transactions on Computers
A formulation of conditional states on steganalysis approach
WSEAS Transactions on Mathematics
Hi-index | 0.00 |
In this paper, we present an enhancement to the steganalysis algorithm that successfully attacks F5 steganographic algorithm using JPEG digital images. The key idea is related to the selection of an "optimal" value of β (the probability that a non-zero AC coefficient will be modified) for the image under consideration. Rather than averaging the values of β for 64 shifting steps worked on an image, an optimal β is determined that corresponds to the shift having minimal distance E from the double compression removal step. Numerical experiments were carried out to validate the proposed enhanced algorithm and compare it against the original one. Both algorithms were tested and compared using two sets of test images. The first set uses reference test data of 20 grayscale images [1], and the second uses 432 images created by manipulating 12 images for various image parameters: two sizes (300×400 and 150×2000), six JPEG old quality factors (50, 60, 70, 80, 90, 100), and 3 message lengths (0, 1kB, 2 kB). The results suggest that the original algorithm may be used as a classifier, since it shows a good detection performance of both clean and stego test images; whereas, the proposed enhanced algorithm may be used as an estimator for the true message length for those images that have been classified by original algorithm as stego images.