Browse > Article
http://dx.doi.org/10.13089/JKIISC.2004.14.4.39

A Steganalysis using Blockiness in JPEG images  

장정아 (고려대학교 정보보호기술연구센터)
유정재 (고려대학교 정보보호기술연구센)
이상진 (고려대학교 정보보호기술연구센터)
Abstract
In general, the steganographic algorithm for embedding message in JPEG images, such as Jsteg$^{(1)}$ , JP Hide & Seek$^{(2)}$ , F5$^{(3)}$ , outGuess$^{(4)}$ replaces the LSB of DCT coefficients by the message bits. Both Jsteg and n Hide & seek are detected by $\chi$$^2$- test, steganalytic technique$^{(4)}$ , the rate of detection is very low, though. In this Paper, we Propose a new steganalysis method that determine not only the existence of hidden messages in JPEG images exactly, but also the steganographic algorithm used. This method is advanced from the technique Blockiness$^{(5)}$ . It has many advantages that include a computational efficiency, correctness and that can detect without bowing steganographic algorithm. Experiment results show the superiority of our approach over Blockiness$^{(5)}$ .
Keywords
Stegangraphy; Blockiness; DCT(Discrete Cosine Transform);
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Upham, 'Jsteg'. http://www. seeurityfocus.com/tools/1434, 1997
2 A. Westfeld and A. Pfitzmann, 'Attacks on Steganographic Systems', Information Hiding-Third International Workshop, IH'99, Lecture Notes in Computer Science 1768, pp. 61-76, 1999
3 http://www.cs.washington.edu/research/imagedatabase/groundtruth/
4 A. Westfeld and A. Pfitzmann, 'High Capacity Despite Better Steganalysis F5-A Steganographic Algorithm', Information Hiding-4th International Workshop Lecture Notes in Computer Science 2137, pp. 289-302, 200l
5 N. Provos, 'OutGuess - Universal Steganography', http://www.outguess.org / ,August 1998
6 T. Zhang and X. Ping, 'A Fast and Effective Steganalytic Technique against JSteg-like Algorithms ', In Proceedings of ACM Symposium on Applied Computing, ACM Press, pp. 307-331. 2003
7 A. Latham, 'JP Hide & Seek', http:// linux01.gwdg.de/alatham /stego.html. 1997
8 J. Fridrich and M. GoUan and D. Hogea, 'Attacking the Out Guess', Proc. of the ACM Workshop on Multimedia and Security, 2002
9 N. Provos, 'Defending Aganist Statistical Steganalysis', Proceedings of the 10th USENIX Security symposium, pp. 323-335, 2001