Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4681))

Included in the following conference series:

Abstract

According to Cachin’s steganography security criterion, if the statistical distributions of cover and stego images are identical, the hidden message is assumed undetectable. However, any steganographic method will surely cause some statistical distortions, which gives steganalyst a hint. This paper presents a steganalysis method for JPEG images based on Cachin criterion. It estimates the cover image from the stego one by using a small-scale geometrical transform, and then detects the statistical distortions between the cover and stego images based on some features, which are sensitive to the steganographic modifications. Then a classifier is trained on these features. Three different modern steganographic schemes are tested. Experimental results show that the proposed steganalysis scheme has better performance compared to the current steganalysis methods.

This work was supported by China 863 high tech plan (2003AA144080) and NSFC (60075002).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fridrich, J., Goljan, M., Du, R.: Steganalysis Based on JPEG Compatibility. In: SPIE Multimedia Systems and Applications IV, Denver, CO, pp. 275–280 (2001)

    Google Scholar 

  2. Fridrich, J.: Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)

    Google Scholar 

  3. Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: 5th Information Hiding Workshop, The Netherlands, pp. 310-323 (2002)

    Google Scholar 

  4. Newman, R.E., et al.: A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis. In: Proc. Information Hiding, pp. 258–277 (2002)

    Google Scholar 

  5. Shi, Y.Q., Chen, C., Chen, W.: A Markov Process Based Approach to Effective Attacking JPEG Steganography. In: Information Hiding Workshop (2006)

    Google Scholar 

  6. Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

De-Shuang Huang Laurent Heutte Marco Loog

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Quan, X., Zhang, H., Dou, H. (2007). Steganalysis for JPEG Images Based on Statistical Features of Stego and Cover Images. In: Huang, DS., Heutte, L., Loog, M. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues. ICIC 2007. Lecture Notes in Computer Science, vol 4681. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74171-8_98

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74171-8_98

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74170-1

  • Online ISBN: 978-3-540-74171-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics