Abstract
JPEG-compatibility steganalysis detects the presence of embedding changes using the fact that the stego image was previously JPEG compressed. Following the previous art, we work with the difference between the stego image and an estimate of the cover image obtained by recompression with a JPEG quantization table estimated from the stego image. To better distinguish recompression artifacts from embedding changes, the difference image is represented using a feature vector in the form of a histogram of the number of mismatched pixels in 8×8 blocks. Three types of classifiers are built to assess the detection accuracy and compare the performance to prior art: a clairvoyant detector trained for a fixed embedding change rate, a constant false-alarm rate detector for an unknown change rate, and a quantitative detector. The proposed approach offers significantly more accurate detection across a wide range of quality factors and embedding operations, especially for very small change rates. The technique requires an accurate estimate of the JPEG compression parameters.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Böhme, R.: Weighted Stego-Image Steganalysis for JPEG Covers. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 178–194. Springer, Heidelberg (2008)
Böhme, R.: Advanced Statistical Steganalysis. Springer, Heidelberg (2010)
Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm
Filler, T., Pevný, T., Bas, P.: BOSS (Break Our Steganography System) (July 2010), http://www.agents.cz/boss/
Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI. Proceedings SPIE, San Jose, CA, January 19–22, vol. 5306, pp. 23–34 (2004)
Fridrich, J., Goljan, M., Du, R.: Steganalysis based on JPEG compatibility. In: Tescher, A.G. (ed.) Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, Denver, CO, August 20–24, vol. 4518, pp. 275–280 (2001)
Ker, A.D., Böhme, R.: Revisiting weighted stego-image steganalysis. In: Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA. Proceedings SPIE, January 27–31, vol. 6819, pp. 5:1–5:17 (2008)
Kodovský, J., Fridrich, J.: Steganalysis in high dimensions: Fusing classifiers built on random subspaces. In: Proceedings SPIE, Electronic Imaging, Media Watermarking, Security and Forensics of Multimedia XIII, San Francisco, CA, January 23–26, vol. 7880, pp. OL 1–OL 13 (2011)
Kodovský, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2), 432–444 (2012)
Lewis, A.B., Kuhn, M.G.: Exact JPEG recompression. In: Memon, N.D., Delp, E.J., Wong, P.W., Dittmann, J. (eds.) Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, San Jose, CA, January 17–21, 2010, vol. 7543, p. 75430V (2010)
Luo, W., Huang, F., Huang, J.: JPEG error analysis and its applications to digital image forensics. IEEE Transactions on Information Forensics and Security 5(3), 480–491 (2010)
Luo, W., Wang, Y., Huang, J.: Security analysis on spatial ±1 steganography for JPEG decompressed images. IEEE Signal Processing Letters 18(1), 39–42 (2011)
Pevný, T.: Detecting messages of unknown length. In: Memon, N.D., Delp, E.J., Wong, P.W., Dittmann, J. (eds.) Electronic Imaging, Media Watermarking, Security and Forensics of Multimedia XIII, San Francisco, CA. Proceedings SPIE, January 23–26, vol. 7880, pp. OT 1–OT 12 (2011)
Pevný, T., Filler, T., Bas, P.: Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010)
Pevný, T., Fridrich, J., Ker, A.D.: From blind to quantitative steganalysis. IEEE Transactions on Information Forensics and Security 7(2), 445–454 (2012)
Schölkopf, B., Smola, A.: Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond (Adaptive Computation and Machine Learning). The MIT Press (2001)
Taro, Y.: Image coding apparatus and method, US Patent 6968090 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kodovský, J., Fridrich, J. (2013). JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts. In: Kirchner, M., Ghosal, D. (eds) Information Hiding. IH 2012. Lecture Notes in Computer Science, vol 7692. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36373-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-36373-3_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36372-6
Online ISBN: 978-3-642-36373-3
eBook Packages: Computer ScienceComputer Science (R0)