Skip to main content

Weaknesses of MB2

  • Conference paper
Digital Watermarking (IWDW 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5041))

Included in the following conference series:

Abstract

Model-based steganography is a promising approach for hidden communication in JPEG images with high steganographic capacity and competitive security. In this paper we propose an attack, which is based on coefficient types that can be derived from the blockiness adjustment of MB2. We derive 30 new features to be used in combination with existing blind feature sets leading to a remarkable reduction of the false positive rate (about 10:1) for very low embedding rates (0.02 bpc). We adapt Sallee’s model-based approach for steganalysis where the Cauchy model itself is used to detect Cauchy model-based embedded messages. We apply a gradient aware blockiness measure for improved reliability in the detection of MB1. We evaluate our proposed methods based on a set of about 3000 images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fridrich, J., Goljan, M., Soukal, D.: Higher-order statistical steganalysis of palette images. In: Delp, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents V (Proc. of SPIE), San Jose, CA, vol. 5020, pp. 178–190 (2003)

    Google Scholar 

  2. Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: Delp, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents VI (Proc. of SPIE), San Jose, CA, vol. 5306, pp. 23–34 (2004)

    Google Scholar 

  3. Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Trans. of Signal Processing 51, 1995–2007 (2003)

    Article  MATH  Google Scholar 

  4. Yu, X., Wang, Y., Tan, T.: On estimation of secret message length in Jsteg-like steganography. In: Proceedings of the 17th International Conference on Pattern Recognition (ICPR 2004), pp. 673–676 (2004)

    Google Scholar 

  5. Zhang, T., Ping, X.: A fast and effective steganalytic technique against Jsteg-like algorithms. In: Proceedings of the 2003 ACM Symposium on Applied Computing (SAC 2003), Melbourne, Florida, USA, March 9-12, 2003, pp. 307–311. ACM Press, New York (2003)

    Chapter  Google Scholar 

  6. Lee, K., Westfeld, A., Lee, S.: Category Attack for LSB steganalysis of JPEG images. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 35–48. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Lee, K., Westfeld, A., Lee, S.: Generalised Category Attack—improving histogram-based attack on JPEG LSB embedding. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 378–391. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Sallee, P.: Model-based steganography. In: Kalker, T., Ro, Y.M., Cox, I.J. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Böhme, R., Westfeld, A.: Breaking Cauchy model-based JPEG steganography with first order statistics. In: Samarati, P., Ryan, P., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 125–140. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics 5(1), 167–190 (2005)

    Article  Google Scholar 

  11. Fridrich, J.J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: [18], pp. 67–81

    Google Scholar 

  12. Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  13. Pevný, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Delp, E.J., Wong, P.W. (eds.) SPIE 2007, Security, Steganography, and Watermarking of Multimedia Contents IX, Proceedings of the SPIE, San José, January 2007, vol. 6505, p. 650503 (2007)

    Google Scholar 

  14. Westfeld, A.: Lessons from the BOWS contest. In: MM&Sec 2006: Proceeding of the 8th Workshop on Multimedia and Security, pp. 208–213. ACM Press, New York (2006)

    Google Scholar 

  15. ECRYPT: BOWS, Break our watermarking system (2006), http://lci.det.unifi.it/BOWS

  16. Ker, A.D.: Improved detection of LSB steganography in grayscale images. In: [18], pp. 97–115

    Google Scholar 

  17. Fridrich, J.J., Goljan, M., Hogea, D.: Attacking the Outguess. In: Proc. of ACM Multimedia and Security Workshop 2002, MM&Sec06, Juan-les-Pins, France, pp. 967–982. ACM Press, New York (2002)

    Google Scholar 

  18. Fridrich, J.J. (ed.): IH 2004. LNCS, vol. 3200. Springer, Heidelberg (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ullerich, C., Westfeld, A. (2008). Weaknesses of MB2. In: Shi, Y.Q., Kim, HJ., Katzenbeisser, S. (eds) Digital Watermarking. IWDW 2007. Lecture Notes in Computer Science, vol 5041. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92238-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-92238-4_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-92237-7

  • Online ISBN: 978-3-540-92238-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics