Abstract
In this paper, we propose a new method for the detection of LSB embedding in JPEG images. We are motivated by a need to further research the idea of the chi-square attack. The new method simply use the first-order statistics of DCT coefficients, but is more powerful to detect the random embedding in JPEG images. For evaluation, we used versions of Jsteg and Jphide with randomized embedding path to generate stego images in our experiments. In results, the proposed method outperforms the method of Zhang and Ping and is applicable to Jphide. The detection power of both proposed methods is compared to the blind classifier by Fridrich that uses 23 DCT features.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding - techniques for steganography and digital watermarking. Artech House Books (1999)
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Provos, N., Honeyman, P.: Detecting Steganographic Content on the Internet, CITI Technical Report 03–11 (2001)
Fridrich, J., Goljan, M., Hogea, D.: Attacking the OutGuess. In: Proc. of the ACM Workshop on Multimedia and Security 2002, Juan-les-Pins, France, December 6 (2002)
Fridrich, J., Goljan, M., Soukal, D.: Higher-Order Statistical Steganalysis of Palette Images. In: Proc. of EI SPIE, Santa Clara, CA, January 2003, pp. 178–190 (2003)
Lyu, S., Farid, H.: Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340–354. Springer, Heidelberg (2003)
Zhang, T., Ping, X.: A Fast and Effective Steganalytic Technique against Jsteg-like Algorithms. In: ACM Symposium on Applied Computing, Florida, USA, March 9–12 (2003)
Fridrich, J.: Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)
Ker, A.D.: Improved Detection of LSB Steganography in Grayscale Images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 97–115. Springer, Heidelberg (2004)
Steganographic Tool Lists, http://www.stegoarchive.com
Upham, D.: Jpeg-Jsteg, http://www.funet.fi/pub/crypt/stegangraphy/jpeg-Jsteg-v4.diff.gz
Latham, A., Jphide, JPSeek, http://linux01.gwdg.de/~alatham/stego.html
Provos, N.: OutGuess – Universal Steganography, http://www.outguess.org
CBIR Image Database, University of Washington, http://www.cs.washington.edu/research/imagedatabase/groundtruth
R: A Language and Environment for Statistical Computing, R Development Core Team, R Foundation for Statistical Computing, Vienna, Austria (2006), http://www.r-project.org
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, K., Westfeld, A., Lee, S. (2006). Category Attack for LSB Steganalysis of JPEG Images. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_4
Download citation
DOI: https://doi.org/10.1007/11922841_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48825-5
Online ISBN: 978-3-540-48827-9
eBook Packages: Computer ScienceComputer Science (R0)