A Markov process based approach to effective attacking JPEG steganography

Yun Q. Shi, Chunhua Chen, Wen Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

297 Scopus citations


In this paper, a novel steganalysis scheme is presented to effectively detect the advanced JPEG steganography. For this purpose, we first choose to work on JPEG 2-D arrays formed from the magnitudes of quantized block DCT coefficients. Difference JPEG 2-D arrays along horizontal, vertical, and diagonal directions are then used to enhance changes caused by JPEG steganography. Markov process is applied to modeling these difference JPEG 2-D arrays so as to utilize the second order statistics for steganalysis. In addition to the utilization of difference JPEG 2-D arrays, a thresholding technique is developed to greatly reduce the dimensionality of transition probability matrices, i.e., the dimensionality of feature vectors, thus making the computational complexity of the proposed scheme manageable. The experimental works are presented to demonstrate that the proposed scheme has outperformed the existing steganalyzers in attacking OutGuess, F5, and MB1.

Original languageEnglish (US)
Title of host publicationInformation Hiding - 8th International Workshop, IH 2006, Revised Selected Papers
PublisherSpringer Verlag
Number of pages16
ISBN (Print)9783540741237
StatePublished - 2007
Event8th International Workshop on Information Hiding, IH 2006 - Alexandria, VA, United States
Duration: Jun 10 2006Jun 12 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4437 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other8th International Workshop on Information Hiding, IH 2006
Country/TerritoryUnited States
CityAlexandria, VA

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'A Markov process based approach to effective attacking JPEG steganography'. Together they form a unique fingerprint.

Cite this