Reference Hub3
Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis

Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis

Alexandros Zaharis, Adamantini Martini, Theo Tryfonas, Christos Ilioudis, G. Pangalos
Copyright: © 2011 |Volume: 3 |Issue: 4 |Pages: 13
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781613506486|DOI: 10.4018/jdcf.2011100103
Cite Article Cite Article

MLA

Zaharis, Alexandros, et al. "Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis." IJDCF vol.3, no.4 2011: pp.29-41. http://doi.org/10.4018/jdcf.2011100103

APA

Zaharis, A., Martini, A., Tryfonas, T., Ilioudis, C., & Pangalos, G. (2011). Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis. International Journal of Digital Crime and Forensics (IJDCF), 3(4), 29-41. http://doi.org/10.4018/jdcf.2011100103

Chicago

Zaharis, Alexandros, et al. "Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis," International Journal of Digital Crime and Forensics (IJDCF) 3, no.4: 29-41. http://doi.org/10.4018/jdcf.2011100103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper presents a novel method of JPEG image Steganalysis, driven by the need for a quick and accurate identification of stego-carriers from a collection of files, where there is no knowledge of the steganography algorithm used, nor previous database of suspect carrier files created. The suspicious image is analyzed in order to identify the encoding algorithm while various meta-data is retrieved. An image file is then reconstructed in order to be used as a measure of comparison. A generalization of the basic principles of Benford’s Law distribution is applied on both the suspicious and the reconstructed image file in order to decide whether the target is a stego-carrier. The authors demonstrate the effectiveness of the technique with a steganalytic tool that can blindly detect the use of JPHide/JPseek/JPHSWin, Camouflage and Invisible Secrets. Experimental results show that the steganalysis scheme is able to efficiently detect the use of different steganography algorithms without the use of a time consuming training step, even if the embedding data rate is very low. The accuracy of the detector is independent of the payload. The method described can be generalized in order to be used for the detection of different type images which act as stego-carriers.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.