Abstract
This paper tackles the problem of JPEG steganography and steganalysis for color images, a problem that has rarely been studied so far and which deserves more attention. After focusing on the 4:4:4 sampling strategy, we propose to modify for each channel the embedding rate of J-UNIWARD and UERD steganographic schemes in order to arbitrary spread the payload between the luminance and the chrominance components while keeping a constant message size for the different strategies. We also compare our spreading payload strategy w.r.t. two strategies: (i) the concatenation of the cost map (CONC) or (ii) equal embedding rates (EER) among channels. We then select good candidates within the feature sets designed either for JPEG or color steganography. Our conclusions are threefold: (i) the GFR or DCTR features sets, concatenated on the three channels offer better performance than ColorSRMQ1 for JPEG Quality Factor (QF) of 75 and 95 but ColorSRMQ1 is more sensitive for QF = 100, (ii) the CONC or EER strategies are suboptimal, and (iii) depending of the quality factors and the embedding schemes, the empirical security is maximized when between 33% (QF = 100, UERD) and 95% (QF = 75, J-UNIWARD) of the payload is allocated to the luminance channel.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdulrahman, H., Chaumont, M., Montesinos, P., Magnier, B.: Color image steganalysis based on steerable gaussian filters bank. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 109–114. ACM (2016)
Bas, P., Pevny, T., Filler, T.: Bossbase (May 2011). http://exile.felk.cvut.cz/boss
Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)
Goljan, M., Fridrich, J.: CFA-aware features for steganalysis of color images. In: IS&T/SPIE Electronic Imaging. pp. 94090V–94090V. International Society for Optics and Photonics (2015)
Goljan, M., Fridrich, J., Cogranne, R., et al.: Rich model for steganalysis of color images. In: National Conference on Parallel Computing Technologies (PARCOMPTECH), pp. 185–190. IEEE (2015)
Guo, L., Ni, J., Su, W., Tang, C., Shi, Y.Q.: Using statistical image model for jpeg steganography: uniform embedding revisited. IEEE Trans. Inf. Forensics Secur. 10(12), 2669–2680 (2015)
Holub, V., Fridrich, J.: Low-complexity features for jpeg steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10(2), 219–228 (2015)
Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1–13 (2014)
Ker, A.D., et al.: Batch steganography and pooled steganalysis. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 265–281. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74124-4_18
Ker, A.D., et al.: Moving steganography and steganalysis from the laboratory into the real world. In: Proceedings of the first ACM workshop on Information hiding and multimedia security, pp. 45–58. ACM (2013)
Ker, A.D., Pevnỳ, T., Kodovskỳ, J., Fridrich, J.: The square root law of steganographic capacity. In: Proceedings of the 10th ACM workshop on Multimedia and security, pp. 107–116. ACM (2008)
Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2012)
Li, B., Wang, M., Li, X., Tan, S., Huang, J.: A strategy of clustering modification directions in spatial image steganography. IEEE Trans. Inf. Forensics Secur. 10(9), 1905–1917 (2015)
Song, X., Liu, F., Yang, C., Luo, X., Zhang, Y.: Steganalysis of adaptive jpeg steganography using 2D gabor filters. In: Proceedings of the 3rd ACM workshop on information hiding and multimedia security, pp. 15–23. ACM (2015)
Westfeld, A.: F5—a steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45496-9_21
Zeng, J., Tan, S., Liu, G., Li, B., Huang, J.: Wisernet: Wider separate-then-reunion network for steganalysis of color images. arXiv preprint arXiv:1803.04805 (2018)
Acknowledgments
The authors would like to thank Rémi Duprès, who designed the pipeline used to perform this set of extensive tests. This work was also partially supported by the French ANR DEFALS program (ANR-16-DEFA-0003).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Taburet, T., Filstroff, L., Bas, P., Sawaya, W. (2019). An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain. In: Yoo, C., Shi, YQ., Kim, H., Piva, A., Kim, G. (eds) Digital Forensics and Watermarking. IWDW 2018. Lecture Notes in Computer Science(), vol 11378. Springer, Cham. https://doi.org/10.1007/978-3-030-11389-6_22
Download citation
DOI: https://doi.org/10.1007/978-3-030-11389-6_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-11388-9
Online ISBN: 978-3-030-11389-6
eBook Packages: Computer ScienceComputer Science (R0)