On the limits of steganography
IEEE Journal on Selected Areas in Communications
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
An iterative method of palette-based image steganography
Pattern Recognition Letters
A DCT-based Mod4 steganographic method
Signal Processing
Image steganalysis with binary similarity measures
EURASIP Journal on Applied Signal Processing
Proceedings of the 9th workshop on Multimedia & security
Image complexity and feature mining for steganalysis of least significant bit matching steganography
Information Sciences: an International Journal
Review: A review on blind detection for image steganography
Signal Processing
Proceedings of the 10th ACM workshop on Multimedia and security
A Data Mapping Method for Steganography and Its Application to Images
Information Hiding
An improved steganalysis approach for breaking the F5 algorithm
WSEAS Transactions on Computers
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
Steganalysis of JPEG Images with Joint Transform Features
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
Steganalysis of JPEG images: an improved approach for breaking the F5 algorithm
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
Extracting hidden image using histogram, DFT and SVM
Proceedings of the 2nd Bangalore Annual Compute Conference
StegErmelc: A Novel DCT-Based Steganographic Method Using Three Strategies
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Proceedings of the 11th ACM workshop on Multimedia and security
A New Hybrid DCT and Contourlet Transform Based JPEG Image Steganalysis Technique
SCIA '09 Proceedings of the 16th Scandinavian Conference on Image Analysis
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
Improved detection and evaluation for JPEG steganalysis
MM '09 Proceedings of the 17th ACM international conference on Multimedia
e-Forensics steganography system for secret information retrieval
Advanced Engineering Informatics
IEEE Transactions on Information Forensics and Security
A New Steganography Based on Χ2 Technic
CIARP '09 Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
An improved approach to steganalysis of JPEG images
Information Sciences: an International Journal
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Steganalysis for JPEG images based on statistical features of stego and cover images
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Generalised category attack: improving histogram-based attack on JPEG LSB embedding
IH'07 Proceedings of the 9th international conference on Information hiding
Classification of steganalysis techniques: A study
Digital Signal Processing
Reliable JPEG steganalysis based on multi-directional correlations
Image Communication
Concurrent covert communication channels
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
New JPEG steganographic scheme with high security performance
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Blind quantitative steganalysis based on feature fusion and gradient boosting
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Vision of the unseen: Current trends and challenges in digital image and video forensics
ACM Computing Surveys (CSUR)
TAMC'11 Proceedings of the 8th annual conference on Theory and applications of models of computation
Towards a protocol for autonomic covert communication
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Steganalysis of DCT-embedding based adaptive steganography and YASS
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Countering counter-forensics: the case of JPEG compression
IH'11 Proceedings of the 13th international conference on Information hiding
IH'11 Proceedings of the 13th international conference on Information hiding
A JPEG-based statistically invisible steganography
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
A network-flow-based method for embedding rectification
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Face recognition based on real AdaBoost and Kalman forecast
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part III
A new steganalytic algorithm for detecting jsteg
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Minimizing the statistical impact of LSB steganography
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
Multiple messages embedding using DCT-Based mod4 steganographic method
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Universal JPEG steganalysis in the compressed frequency domain
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Towards lower bounds on embedding distortion in information hiding
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Block dependency feature based classification scheme for uncalibrated image steganalysis
ICDEM'10 Proceedings of the Second international conference on Data Engineering and Management
A new blind method for detecting novel steganography
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Anti-Forensics of double JPEG compression detection
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Feeling the unseen: physical interaction with depth-embedded images
CHI '13 Extended Abstracts on Human Factors in Computing Systems
Region of interest signalling for encrypted JPEG images
Proceedings of the first ACM workshop on Information hiding and multimedia security
Proceedings of the first ACM workshop on Information hiding and multimedia security
Theoretical Computer Science
Blacknoise: lightweight low-fi steganography in defense of free speech
Proceedings of the 4th Annual Symposium on Computing for Development
Hi-index | 0.00 |
In this paper, we present a steganalytic method that can reliably detect messages (and estimate their size) hidden in JPEG images using the steganographic algorithm F5. The key element of the method is estimation of the cover-image histogram from the stego-image. This is done by decompressing the stego-image, cropping it by four pixels in both directions to remove the quantization in the frequency domain, and recompressing it using the same quality factor as the stego-image. The number of relative changes introduced by F5 is determined using the least square fit by comparing the estimated histograms of selected DCT coefficients with those of the stego-image. Experimental results indicate that relative modifications as small as 10% of the usable DCT coefficients can be reliably detected. The method is tested on a diverse set of test images that include both raw and processed images in the JPEG and BMP formats.