The JPEG still picture compression standard
Communications of the ACM - Special issue on digital multimedia systems
Graphics file formats: reference and guide
Graphics file formats: reference and guide
Proceedings of the 4th International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Revised Papers from the 5th International Workshop on Information Hiding
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers (Lecture Notes in Computer Science)
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
IH'04 Proceedings of the 6th international conference on Information Hiding
Steganalysis using higher-order image statistics
IEEE Transactions on Information Forensics and Security
Practical Insecurity for Effective Steganalysis
Information Hiding
Steganalysis of Multi Bit Plane Image Steganography
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Hi-index | 0.00 |
We present in this paper a new approach for universal JPEG steganalysis and propose studying statistics of the compressed DCT coefficients. This approach is motivated by the Avalanche Criterion of the JPEG lossless compression step. This criterion makes possible the design of detectors whose detection rates are independent of the payload. We design an universal steganalytic scheme using blocks of the JPEG file binary output stream. We compute higher order statistics over their Hamming weights and combined them with a Kullbak-Leibler distance between the probability density function of these weights and a benchmark one. We evaluate the universality of our detector through its capacity to efficiently detect the use of a new algorithm not used during the training step. To that goal, we examinate training sets produced by Outguess, F5 and JPhide-and-Seek. The experimental results we obtained show that our scheme is able to detect the use of new algorithms with high detection rate (≈90%) even with very low embedding rates (−−5).