Steganalysis of JPEG steganography with complementary embedding strategy

被引:7
作者
Huang, F. [1 ]
Luo, W. [1 ]
Huang, J. [1 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510275, Guangdong, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
D O I
10.1049/iet-ifs.2009.0080
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, a new high-performance JPEG steganography with a complementary embedding strategy (JPEG-CES) was presented. It can disable many specific steganalysers such as the Chi-square family and S family detectors, which have been used to attack J-Steg, JPHide, F5 and OutGuess successfully. In this work, a study on the security performance of JPEG-CES is reported. Our theoretical analysis demonstrates that in this algorithm, the number of the different quantised discrete cosine transform (qDCT) coefficients and the symmetry of the qDCT coefficient histogram both will be disturbed when the secret message is embedded. Moreover, the intrinsic sign and magnitude dependencies that existed in intra-block and inter-block qDCT coefficients will be disturbed too. Thus it may be detected by some modern universal steganalysers which can catch these disturbances. In this work, the authors have proposed two new steganalytic approaches. Through exploring the distortions that have been introduced into the qDCT coefficient histogram and the dependencies existed in the intra-block and inter-block sense, respectively, these two alternative steganalysers can detect JPEG-CES effectively. In addition, via merging the features of these two steganalysers, a more reliable classifier can be obtained.
引用
收藏
页码:10 / 18
页数:9
相关论文
共 21 条
[1]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[2]   JPEG image steganalysis utilizing both intrablock and interblock correlations [J].
Chen, Chunhua ;
Shi, Yun Q. .
PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, :3029-3032
[3]  
Fridrich J, 2004, LECT NOTES COMPUT SC, V3200, P67
[4]  
FRIDRICH J, 2002, LNCS, V2578, P310
[5]  
Fridrich J., 2002, PROC ACM WORKSHOP MU, P3
[6]   JPEG steganalysis using empirical transition matrix in block DCT domain [J].
Fu, Dongdong ;
Shi, Yun Q. ;
Zou, Dekun ;
Xuan, Guorong .
2006 IEEE WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2006, :310-+
[7]   High-performance JPEG steganography using complementary embedding strategy [J].
Liu, Chiang-Lung ;
Liao, Shiang-Rong .
PATTERN RECOGNITION, 2008, 41 (09) :2945-2955
[8]  
LYU S, 2002, LECT NOTES COMPUTER, V2578, P340
[9]  
Pevny T., 2007, P SPIE ELECT IMAGING, V6505
[10]  
Provos N., 2003, IEEE Security & Privacy, V1, P32, DOI 10.1109/MSECP.2003.1203220