Skip to main content

Category Attack for LSB Steganalysis of JPEG Images

  • Conference paper
Digital Watermarking (IWDW 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4283))

Included in the following conference series:

Abstract

In this paper, we propose a new method for the detection of LSB embedding in JPEG images. We are motivated by a need to further research the idea of the chi-square attack. The new method simply use the first-order statistics of DCT coefficients, but is more powerful to detect the random embedding in JPEG images. For evaluation, we used versions of Jsteg and Jphide with randomized embedding path to generate stego images in our experiments. In results, the proposed method outperforms the method of Zhang and Ping and is applicable to Jphide. The detection power of both proposed methods is compared to the blind classifier by Fridrich that uses 23 DCT features.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding - techniques for steganography and digital watermarking. Artech House Books (1999)

    Google Scholar 

  2. Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  3. Provos, N., Honeyman, P.: Detecting Steganographic Content on the Internet, CITI Technical Report 03–11 (2001)

    Google Scholar 

  4. Fridrich, J., Goljan, M., Hogea, D.: Attacking the OutGuess. In: Proc. of the ACM Workshop on Multimedia and Security 2002, Juan-les-Pins, France, December 6 (2002)

    Google Scholar 

  5. Fridrich, J., Goljan, M., Soukal, D.: Higher-Order Statistical Steganalysis of Palette Images. In: Proc. of EI SPIE, Santa Clara, CA, January 2003, pp. 178–190 (2003)

    Google Scholar 

  6. Lyu, S., Farid, H.: Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340–354. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Zhang, T., Ping, X.: A Fast and Effective Steganalytic Technique against Jsteg-like Algorithms. In: ACM Symposium on Applied Computing, Florida, USA, March 9–12 (2003)

    Google Scholar 

  8. Fridrich, J.: Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Ker, A.D.: Improved Detection of LSB Steganography in Grayscale Images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 97–115. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Steganographic Tool Lists, http://www.stegoarchive.com

  11. Upham, D.: Jpeg-Jsteg, http://www.funet.fi/pub/crypt/stegangraphy/jpeg-Jsteg-v4.diff.gz

  12. Latham, A., Jphide, JPSeek, http://linux01.gwdg.de/~alatham/stego.html

  13. Provos, N.: OutGuess – Universal Steganography, http://www.outguess.org

  14. CBIR Image Database, University of Washington, http://www.cs.washington.edu/research/imagedatabase/groundtruth

  15. R: A Language and Environment for Statistical Computing, R Development Core Team, R Foundation for Statistical Computing, Vienna, Austria (2006), http://www.r-project.org

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, K., Westfeld, A., Lee, S. (2006). Category Attack for LSB Steganalysis of JPEG Images. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_4

Download citation

  • DOI: https://doi.org/10.1007/11922841_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48825-5

  • Online ISBN: 978-3-540-48827-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics