|Table of Contents|

Multi-class Blind Steganalysis for JPEG Images Based on Micro-templates

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2008年03期
Page:
295-299
Research Field:
Publishing date:

Info

Title:
Multi-class Blind Steganalysis for JPEG Images Based on Micro-templates
Author(s):
GUO Yan-qing1YOU Xin-gang12KONG Xiang-wei1SHEN Lin-jie1
1.Information Security Research Center,Dalian University of Technology,Dalian 116024,China;2.Beijing Institute of Electronic Technology and Application,Beijing 100091,China
Keywords:
micro-templates JPEG multi-class images blind steganalysis
PACS:
TP309.7
DOI:
-
Abstract:
To judge which steganographic algorithm is used for a JPEG image,some possible steganographic operations in DCT domain is investigated and a new steganographic feature space is constructed based on the methodology of micro-templates.Supported by this feature space,a new multi-class blind steganalyzer for JPEG images is presented.Experimental results indicate that,for stego-images with secret message length greater than 20%,which are produced by typical steganographic software,such as JSteg,F5 and Outguess respectively,the steganalyzer can reliably classify all the stego-images to their embedding techniques with high accuracy above 97%.The methodology of micro-templates can effectively distinguish different steganographic operations in DCT domain,which favors the detection of JPEG steganographic algorithms.

References:

[1] 尤新刚, 周琳娜, 郭云彪. 信息隐藏学科的主要分支 及术语[ A]. 信息隐藏全国学术研讨会( CIHW 2000 / 2982001)论文集[ C]. 西安: 西安电子科技大学出版社, 2001. 43- 50.
[2] Provos N, H oneym an P. Detecting steganog raphic con?? tent on the internet [ EB /OL ]. http: / /www. c it.i um ich. edu / techrepo rts/ repo rts/ citi??tr??01??11. pd,f 2001 - 08- 31.
[3] S imm ons G J. The pr isoners) problem and the sub lim?? inal channel [ A ]. Advances in C ryptography: Pro?? ceed ing s of C rypto) 83 [ C ]. New Yo rk, USA: P le?? num Press, 1984. 51- 67.
[4] Avc ibas I, M em on N, Sanka r B. Stegana ly sis us ing image qua lity m etr ics [ J]. IEEE Transac tions on Im?? age Processing, 2003, 12 ( 2): 221- 229.
[5] Lyu S, Far idH. Detecting h idden messages using h igher?? order statistics and support vectormach ines [A]. 5th In?? ternationalWo rkshop on Information H iding [ C]. H e i?? delberg, Germany: Springer??Verlag, 2002. 340- 354.
[6] Fridr ich J. Feature??based stegana lys is for JPEG images and its imp lication for futu re design of steg anog raph ic schemes [ A ]. IH 2004, LNCS 3200 [ C ]. H e ide l?? berg, Germ any: Springer??Ver lag, 2004. 67- 81.
[7] Fridr ich J, Go ljanM, Du R. Re liab le detection of LSB steganog raphy in co lo r and graysca le im ages [ A]. Proc o f the ACM Wo rkshop on Mu ltimedia and Secur ity [ C]. New York, NY, USA: ACM, 2001. 27- 30.
[8] Fridr ich J, GoljanM, H og ea D. Steg ana lysis o f JPEG im ages: Break ing the F5 a lgo rithm [ A ]. Proceed ing o f 5 th In fo rm ationH idingWo rkshop [ C]. H e idelberg, Ge rm any: Spr ing er??Ve rlag, 2002. 310- 323.
[9] Fr idrich J, Go ljan M, H ogea D. Attack ing the Out?? Guess [ A ]. Proceedings o f the ACM W orkshop on M ultim edia and Security 2002 [ C]. New Yo rk, USA: ACM, 2002. 3- 6.
[10] Bohm e R. B reaking C auchy model??based JPEG steg?? anography w ith first order statistics [ A] . Pro c o f 9th ESORICS LNCS Compu ter Secur ity??ESOR ICS 2004 [ C] . H e idelbe rg, Germ any: Spr inger??V erlag, 2004. 125- 140.
[11] Fridrich J, Pevny T. Towa rdsm ulti??c lass b lind stegan?? alyzer for JPEG im ages [ A ]. Interna tiona lW orkshop on D ig ita lW a term ark ing LNCS 3710 [ C ] . H e ide l?? berg, Germ any: Spr inge r??Ver lag, 2005. 39- 53.
[12] Pevny T, Fr idrich J. Mu lti??c lass b lind steganalysis for JPEG images [ J]. Proceedings o f SPIE, 2006, 6 072: 257- 269.
[13] Cachin C. An in fo rma tion??theore ticm ode l for steganog?? raphy [ EB /OL]. http: / /www. zurich. ibm. com / ~ cca /papers/ stego. pd,f 2004- 03- 04.
[14] ShiY Q, Chen C, ChenW. A M arkov process based ap?? proach to effective attacking JPEG steganography [ A ]. Proceedings of the 8th Information H id ing Wo rkshop [ C]. H eidelberg, Germany: Springer, 2006. 249- 264.
[15] Chang C C, L in C J. LIBSVM: A library fo r support v ec tor m ach ines [ EB /OL] . http: / /www. csie. n tu. edu. tw /~ c jlin / libsvm, 2001- 06- 19.
[16] Derek U. JPEG??JSteg??V4 [ EB /OL]. http: / /www. fu?? net. fi/pub /crypt/ steganography / jpeg??Jsteg??v4. dif.f gz, 1995- 07- 06.
[17] W estfeld A. F5??a steganog raph ic a lgor ithm: H igh ca?? pac ity despite better stegana lysis [ A ]. Info rma tion H id ing 4th Interna tiona lW orkshop, IH) 01 [ C ]. Lon?? don, UK: Spr inge r??Ver lag, 2001. 289- 302.
[18] Provos N. Defending aga inst statistical stegana lys is [ A ]. Proc 10th Usen ix Secur ity Sym pos ium [ C ]. Berke ley, CA, USA: USENIX Association, 2001. 323- 335.

Memo

Memo:
-
Last Update: 2008-06-30