Skip to main content

JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts

  • Conference paper
Information Hiding (IH 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7692))

Included in the following conference series:

Abstract

JPEG-compatibility steganalysis detects the presence of embedding changes using the fact that the stego image was previously JPEG compressed. Following the previous art, we work with the difference between the stego image and an estimate of the cover image obtained by recompression with a JPEG quantization table estimated from the stego image. To better distinguish recompression artifacts from embedding changes, the difference image is represented using a feature vector in the form of a histogram of the number of mismatched pixels in 8×8 blocks. Three types of classifiers are built to assess the detection accuracy and compare the performance to prior art: a clairvoyant detector trained for a fixed embedding change rate, a constant false-alarm rate detector for an unknown change rate, and a quantitative detector. The proposed approach offers significantly more accurate detection across a wide range of quality factors and embedding operations, especially for very small change rates. The technique requires an accurate estimate of the JPEG compression parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Böhme, R.: Weighted Stego-Image Steganalysis for JPEG Covers. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 178–194. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  2. Böhme, R.: Advanced Statistical Steganalysis. Springer, Heidelberg (2010)

    Book  MATH  Google Scholar 

  3. Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm

  4. Filler, T., Pevný, T., Bas, P.: BOSS (Break Our Steganography System) (July 2010), http://www.agents.cz/boss/

  5. Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI. Proceedings SPIE, San Jose, CA, January 19–22, vol. 5306, pp. 23–34 (2004)

    Google Scholar 

  6. Fridrich, J., Goljan, M., Du, R.: Steganalysis based on JPEG compatibility. In: Tescher, A.G. (ed.) Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, Denver, CO, August 20–24, vol. 4518, pp. 275–280 (2001)

    Google Scholar 

  7. Ker, A.D., Böhme, R.: Revisiting weighted stego-image steganalysis. In: Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA. Proceedings SPIE, January 27–31, vol. 6819, pp. 5:1–5:17 (2008)

    Google Scholar 

  8. Kodovský, J., Fridrich, J.: Steganalysis in high dimensions: Fusing classifiers built on random subspaces. In: Proceedings SPIE, Electronic Imaging, Media Watermarking, Security and Forensics of Multimedia XIII, San Francisco, CA, January 23–26, vol. 7880, pp. OL 1–OL 13 (2011)

    Google Scholar 

  9. Kodovský, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2), 432–444 (2012)

    Article  Google Scholar 

  10. Lewis, A.B., Kuhn, M.G.: Exact JPEG recompression. In: Memon, N.D., Delp, E.J., Wong, P.W., Dittmann, J. (eds.) Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, San Jose, CA, January 17–21, 2010, vol. 7543, p. 75430V (2010)

    Google Scholar 

  11. Luo, W., Huang, F., Huang, J.: JPEG error analysis and its applications to digital image forensics. IEEE Transactions on Information Forensics and Security 5(3), 480–491 (2010)

    Article  Google Scholar 

  12. Luo, W., Wang, Y., Huang, J.: Security analysis on spatial ±1 steganography for JPEG decompressed images. IEEE Signal Processing Letters 18(1), 39–42 (2011)

    Article  Google Scholar 

  13. Pevný, T.: Detecting messages of unknown length. In: Memon, N.D., Delp, E.J., Wong, P.W., Dittmann, J. (eds.) Electronic Imaging, Media Watermarking, Security and Forensics of Multimedia XIII, San Francisco, CA. Proceedings SPIE, January 23–26, vol. 7880, pp. OT 1–OT 12 (2011)

    Google Scholar 

  14. Pevný, T., Filler, T., Bas, P.: Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  15. Pevný, T., Fridrich, J., Ker, A.D.: From blind to quantitative steganalysis. IEEE Transactions on Information Forensics and Security 7(2), 445–454 (2012)

    Article  Google Scholar 

  16. Schölkopf, B., Smola, A.: Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond (Adaptive Computation and Machine Learning). The MIT Press (2001)

    Google Scholar 

  17. Taro, Y.: Image coding apparatus and method, US Patent 6968090 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kodovský, J., Fridrich, J. (2013). JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts. In: Kirchner, M., Ghosal, D. (eds) Information Hiding. IH 2012. Lecture Notes in Computer Science, vol 7692. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36373-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36373-3_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36372-6

  • Online ISBN: 978-3-642-36373-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics