TY - GEN
T1 - A Markov process based approach to effective attacking JPEG steganography
AU - Shi, Yun Q.
AU - Chen, Chunhua
AU - Chen, Wen
PY - 2007
Y1 - 2007
N2 - In this paper, a novel steganalysis scheme is presented to effectively detect the advanced JPEG steganography. For this purpose, we first choose to work on JPEG 2-D arrays formed from the magnitudes of quantized block DCT coefficients. Difference JPEG 2-D arrays along horizontal, vertical, and diagonal directions are then used to enhance changes caused by JPEG steganography. Markov process is applied to modeling these difference JPEG 2-D arrays so as to utilize the second order statistics for steganalysis. In addition to the utilization of difference JPEG 2-D arrays, a thresholding technique is developed to greatly reduce the dimensionality of transition probability matrices, i.e., the dimensionality of feature vectors, thus making the computational complexity of the proposed scheme manageable. The experimental works are presented to demonstrate that the proposed scheme has outperformed the existing steganalyzers in attacking OutGuess, F5, and MB1.
AB - In this paper, a novel steganalysis scheme is presented to effectively detect the advanced JPEG steganography. For this purpose, we first choose to work on JPEG 2-D arrays formed from the magnitudes of quantized block DCT coefficients. Difference JPEG 2-D arrays along horizontal, vertical, and diagonal directions are then used to enhance changes caused by JPEG steganography. Markov process is applied to modeling these difference JPEG 2-D arrays so as to utilize the second order statistics for steganalysis. In addition to the utilization of difference JPEG 2-D arrays, a thresholding technique is developed to greatly reduce the dimensionality of transition probability matrices, i.e., the dimensionality of feature vectors, thus making the computational complexity of the proposed scheme manageable. The experimental works are presented to demonstrate that the proposed scheme has outperformed the existing steganalyzers in attacking OutGuess, F5, and MB1.
UR - http://www.scopus.com/inward/record.url?scp=38049166461&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=38049166461&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-74124-4_17
DO - 10.1007/978-3-540-74124-4_17
M3 - Conference contribution
AN - SCOPUS:38049166461
SN - 9783540741237
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 249
EP - 264
BT - Information Hiding - 8th International Workshop, IH 2006, Revised Selected Papers
PB - Springer Verlag
T2 - 8th International Workshop on Information Hiding, IH 2006
Y2 - 10 June 2006 through 12 June 2006
ER -