Feature-Based steganalysis for JPEG images and its implications for future design of steganographic schemes
read more
Citations
Digital Watermarking and Steganography
Rich Models for Steganalysis of Digital Images
Ensemble Classifiers for Steganalysis of Digital Media
Steganalysis by Subtractive Pixel Adjacency Matrix
Steganography in Digital Media: Principles, Algorithms, and Applications
References
On the limits of steganography
F5-A Steganographic Algorithm
Attacks on Steganographic Systems
An Information-Theoretic Model for Steganography
Defending against statistical steganalysis
Related Papers (5)
Frequently Asked Questions (10)
Q2. What have the authors stated for future works in "Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes" ?
Further investigation of this issue will be part of their future research. In the future, the authors also plan to replace the Fisher Linear Discriminant with more sophisticated classifiers, such as Support Vector Machines, to further improve the detection reliability of the proposed steganalytic algorithm. The authors also plan to develop a multiple-class classifier capable of recognizing stego images produced by different embedding algorithms ( steganographic program identification ).
Q3. Why do the authors use histograms of low frequency DCT coefficients?
The authors only use histograms of low frequency DCT coefficients because histograms of coefficients from medium and higher frequencies are usually statistically unimportant due to the small number of non-zero coefficients.
Q4. What is the significance of the co-occurrence matrix of DCT coefficients?
For all tested schemes, one of the most influential features of the proposed detection was the co-occurrence matrix of DCT coefficients (5), which is the probability distribution of coefficient pairs from neighboring blocks.
Q5. What is the biggest advantage of blind detectors?
The biggest advantage of blind detectors is their potential ability to detect any embedding scheme and even to classify embedding techniques by their position in the feature space.
Q6. Why is the MB2 method the only one that takes into account inter-block dependencies?
The MB2 method is currently the only JPEG steganographic method that takes into account inter-block dependencies between DCT coefficients by preserving the blockiness, which is an “integral” measure of these dependencies.
Q7. Why does MB1 avoid the maximum number of bits?
This is likely because MB1 does not avoid any other coefficients than 0 and its embedding mechanism is guaranteed to embed the maximal number of bits given the fact that marginal statistics of all coefficients must be preserved.
Q8. What is the detection reliability of the outGuess algorithm?
The detection reliability is relatively high even for embedding rates as small as 0.05 bpc and the method becomes highly detectable for messages above 0.1 bpc.
Q9. What is the surprising fact about the embedding?
One of the most surprising facts revealed by the experiments is that even features based on functionals that are preserved by the embedding may have substantial influence.
Q10. What is the reason why the stego image looks like it was originally compressed?
In fact, it has been argued by its authors [13] that the stego image looks as if the cover image was originally compressed with a lower JPEG quality factor.