A study on security performance of YASS

Fangjun Huang, Yun Q. Shi, Jiwu Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

YASS (Yet another steganographic scheme) is a newly developed JPEG steganographic method. Through embedding data in the randomized 8×8 blocks which do not coincide with the 8×8 grid used in JPEG compression, it effectively disables the self-calibration process popularly used in today's JPEG steganalyzers. However, with YASS' complicated embedding procedure, the intra- and interblock dependency among the quantized DCT coefficients belonging to the original image is disturbed after the secret message embedding. Furthermore, because of the randomly selection of an 8×8 block within a large block and the necessary utilization of error correction code, the amount of information that YASS can embed is largely reduced. In this paper a study on security performance of YASS is reported. Our experimental results have demonstrated that 1) the steganalyzers which utilizes intra- and/or inter-block correlation of JPEG coefficients can break YASS, 2) with embedding the same amount of information bits, the security of YASS is not stronger than that of MB1 when some today's blind JPEG steganalyzers are used.

Original languageEnglish (US)
Title of host publication2008 IEEE International Conference on Image Processing, ICIP 2008 Proceedings
Pages2084-2087
Number of pages4
DOIs
StatePublished - 2008
Event2008 IEEE International Conference on Image Processing, ICIP 2008 - San Diego, CA, United States
Duration: Oct 12 2008Oct 15 2008

Publication series

NameProceedings - International Conference on Image Processing, ICIP
ISSN (Print)1522-4880

Other

Other2008 IEEE International Conference on Image Processing, ICIP 2008
Country/TerritoryUnited States
CitySan Diego, CA
Period10/12/0810/15/08

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Vision and Pattern Recognition
  • Signal Processing

Keywords

  • Calibration
  • Intra- and interblock correlation
  • Steganalysis
  • Steganography
  • Yet another steganographic scheme (YASS)

Fingerprint

Dive into the research topics of 'A study on security performance of YASS'. Together they form a unique fingerprint.

Cite this