Abstract
Jsteg is an open steganography software on Internet. It uses the LSB of DCT coefficients to hide secret information. This paper presents a new, fast steganalytic method for detecting Jsteg hiding which is more convenient than the Chi-square attack. The AC coefficients of image are divided into two parts and the distribution of the statistic of the two parts is fitted by Laplacian. The mean of Laplacian is 0 that is proved by Hypothesis testing. The Pearson χ 2 test is done to test goodness-of fit. Basing on this statistic mode, our algorithm can detect Jsteg hiding with high accuracy. The amount of embedding message can be estimate using linear regression.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Christone, I.P., Zeng, W.: Image-Adaptive Watermarking Using Visual Models. IEEE Journal Select. Areas Commun. 16, 525–539 (1998)
Westfield, A., Pfitzmann, A.: Attack on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Johnson, N.F., Jajodia, S.: Steganalysis of Images Created Using Current Steganography Software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 32–47. Springer, Heidelberg (1998)
Fridrich, J., Du, R., Long, M.: Steganalysis of LSB Encoding in Color Images. In: Proc. of ICME 2000, USA, July 31-August 2. NYC, p. 355 (2000)
Fridrich, J., Goljan, M., Du, R.: Reliable Dectection of LSB Steganography in Color and Grayscale Images. In: Proc. of ACM Workshop on Multimedia and Security, Ottawa, October 5, pp. 27–30 (2001)
Fridrich, J., Goljan, M., Soukal, D.: High-order Statistical Steganalysis of Palette Images. In: Proc. Security and Watermarking of Multimedia Contents. SPIE, vol. 5020, pp. 178–190 (2003)
Fridrich, J., Goljan, M., Du, R.: Steganalysis Based on JPEG Compatibility. In: Proc. Multimedia Systems and Applications IV. SPIE, vol. 4518, pp. 275–280 (2002)
Niimi, M., Eason, R.O., Noda, H., Kwaguchi, E.: Intensity histogram steganalysis in BPCS steganography. In: Proc. Security and Watermarking of Multimedia Contents. SPIE, vol. 4314, pp. 555–564 (2001)
Harmsen, J.J., Pearlman, W.A.: Kernal Fisher Disriminant for steganlysis of JPEG Hiding. In: Proc. Security, Steganography and Watermarking of Multimedia Contents VI. SPIE, vol. 5306 (2004)
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG Images: Breaking the F5. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)
Trivedi, S., Chandramouli, R.: Active Steganalysis of Sequential Steganography. In: Proc. Security and Watermarking of Multimedia Contents V. SPIE, vol. 5020, pp. 123–130 (2003)
Fridrich, J., Goljan, M., Hogea, D.: Attacking the OutGuess. In: Proc. of ACM Workshop on Multimedia and Security, France, December 6 (2002)
Fraid, H.: Detecting Steganographic Message in Digital Images. Technical Report, TR2001-412, Dartmouth College (2001)
Fraid, H.: Detecting Hidden Message using higher-order statistics and Support vector machines. In: Proc. of IEEE Int. on Image Processing, Rochester, NY (2002)
Avcibas, I.: Steganalysis Using Image Quality Metrics. IEEE Transactions on Image Processing 12(2), 231–239 (2003)
JPEG-Jsteg-V4, http://www.funet.fi/pub/crypt/steganography/jpeg-jsteg-v4.diff.gz
Reininger, R.C., Gibson, J.D.: Distribution of the Two-Dimensional DCT Coefficients for Images. IEEE Transaction on Communicatins Com-31(6) (June 1983)
Müller, F.: Distribution Shape of Two-Dimensional DCT Coefficients of Nature Images. Electron. Letter 29, 1935–1936 (1993)
Lam, E.Y., Goodman, J.W.: A Mathematical Analysis of the DCT Coefficient Distributions for Images. IEEE Transactions on Image Processing 9(10) (2000)
Barni, M., Bartolini, F., Piva, A., Rigacci, F.: Statistical Modelling of Full Framee DCT Coefficients
Yi, W.: Applied Statistics. Publishing Company of National University of Defence Technology, Chang Sha (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wu, M., Zhu, Z., Jin, S. (2005). A New Steganalytic Algorithm for Detecting Jsteg. In: Lu, X., Zhao, W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11534310_112
Download citation
DOI: https://doi.org/10.1007/11534310_112
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28102-3
Online ISBN: 978-3-540-31868-2
eBook Packages: Computer ScienceComputer Science (R0)