Abstract
Model-based steganography is a promising approach for hidden communication in JPEG images with high steganographic capacity and competitive security. In this paper we propose an attack, which is based on coefficient types that can be derived from the blockiness adjustment of MB2. We derive 30 new features to be used in combination with existing blind feature sets leading to a remarkable reduction of the false positive rate (about 10:1) for very low embedding rates (0.02 bpc). We adapt Sallee’s model-based approach for steganalysis where the Cauchy model itself is used to detect Cauchy model-based embedded messages. We apply a gradient aware blockiness measure for improved reliability in the detection of MB1. We evaluate our proposed methods based on a set of about 3000 images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Fridrich, J., Goljan, M., Soukal, D.: Higher-order statistical steganalysis of palette images. In: Delp, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents V (Proc. of SPIE), San Jose, CA, vol. 5020, pp. 178–190 (2003)
Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: Delp, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents VI (Proc. of SPIE), San Jose, CA, vol. 5306, pp. 23–34 (2004)
Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Trans. of Signal Processing 51, 1995–2007 (2003)
Yu, X., Wang, Y., Tan, T.: On estimation of secret message length in Jsteg-like steganography. In: Proceedings of the 17th International Conference on Pattern Recognition (ICPR 2004), pp. 673–676 (2004)
Zhang, T., Ping, X.: A fast and effective steganalytic technique against Jsteg-like algorithms. In: Proceedings of the 2003 ACM Symposium on Applied Computing (SAC 2003), Melbourne, Florida, USA, March 9-12, 2003, pp. 307–311. ACM Press, New York (2003)
Lee, K., Westfeld, A., Lee, S.: Category Attack for LSB steganalysis of JPEG images. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 35–48. Springer, Heidelberg (2006)
Lee, K., Westfeld, A., Lee, S.: Generalised Category Attack—improving histogram-based attack on JPEG LSB embedding. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 378–391. Springer, Heidelberg (2008)
Sallee, P.: Model-based steganography. In: Kalker, T., Ro, Y.M., Cox, I.J. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)
Böhme, R., Westfeld, A.: Breaking Cauchy model-based JPEG steganography with first order statistics. In: Samarati, P., Ryan, P., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 125–140. Springer, Heidelberg (2004)
Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics 5(1), 167–190 (2005)
Fridrich, J.J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: [18], pp. 67–81
Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)
Pevný, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Delp, E.J., Wong, P.W. (eds.) SPIE 2007, Security, Steganography, and Watermarking of Multimedia Contents IX, Proceedings of the SPIE, San José, January 2007, vol. 6505, p. 650503 (2007)
Westfeld, A.: Lessons from the BOWS contest. In: MM&Sec 2006: Proceeding of the 8th Workshop on Multimedia and Security, pp. 208–213. ACM Press, New York (2006)
ECRYPT: BOWS, Break our watermarking system (2006), http://lci.det.unifi.it/BOWS
Ker, A.D.: Improved detection of LSB steganography in grayscale images. In: [18], pp. 97–115
Fridrich, J.J., Goljan, M., Hogea, D.: Attacking the Outguess. In: Proc. of ACM Multimedia and Security Workshop 2002, MM&Sec06, Juan-les-Pins, France, pp. 967–982. ACM Press, New York (2002)
Fridrich, J.J. (ed.): IH 2004. LNCS, vol. 3200. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ullerich, C., Westfeld, A. (2008). Weaknesses of MB2. In: Shi, Y.Q., Kim, HJ., Katzenbeisser, S. (eds) Digital Watermarking. IWDW 2007. Lecture Notes in Computer Science, vol 5041. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92238-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-540-92238-4_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-92237-7
Online ISBN: 978-3-540-92238-4
eBook Packages: Computer ScienceComputer Science (R0)