TY - GEN
T1 - Effect of different coding patterns on compressed frequency domain based universal JPEG steganalysis
AU - Li, Bin
AU - Huang, Fangjun
AU - Tan, Shunquan
AU - Huang, Jiwu
AU - Shi, Yun Q.
PY - 2008
Y1 - 2008
N2 - Current steganalytic schemes for JPEG steganography are in favor of extracting features in DCT (Discrete Cosine Transform) domain and/or spatial domain. A recently proposed compressed frequency domain based universal steganalytic algorithm [21] showed concern over the statistics of Huffman compressed stream. The authors claimed that it was very effective in detecting stego images embedded by JPEG steganographic tools, including JPHide, F5 and OutGuess. Even though only several bytes were embedded, the scheme was still able to work, thus demonstrating astonishing steganalysis capability. By carefully controlled studies on the factors which may have impact on the new steganalytic method, we find out the truly cause of the powerfulness of this "payload-independent" steganalyzer. Experimental results reveal that different coding patterns used in cover and stego images, rather than the Avalanche Criterion [24] explained by its authors, have led to great detection efficiency. When the same coding pattern is employed in both cover and stego images, the performance of the newly devised steganalyzer has greatly dropped. Implication from this paper is that we should ensure the difference between the cover and stego images is only caused by data embedding itself in steganography and steganalysis.
AB - Current steganalytic schemes for JPEG steganography are in favor of extracting features in DCT (Discrete Cosine Transform) domain and/or spatial domain. A recently proposed compressed frequency domain based universal steganalytic algorithm [21] showed concern over the statistics of Huffman compressed stream. The authors claimed that it was very effective in detecting stego images embedded by JPEG steganographic tools, including JPHide, F5 and OutGuess. Even though only several bytes were embedded, the scheme was still able to work, thus demonstrating astonishing steganalysis capability. By carefully controlled studies on the factors which may have impact on the new steganalytic method, we find out the truly cause of the powerfulness of this "payload-independent" steganalyzer. Experimental results reveal that different coding patterns used in cover and stego images, rather than the Avalanche Criterion [24] explained by its authors, have led to great detection efficiency. When the same coding pattern is employed in both cover and stego images, the performance of the newly devised steganalyzer has greatly dropped. Implication from this paper is that we should ensure the difference between the cover and stego images is only caused by data embedding itself in steganography and steganalysis.
UR - http://www.scopus.com/inward/record.url?scp=58349108291&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=58349108291&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-92238-4_12
DO - 10.1007/978-3-540-92238-4_12
M3 - Conference contribution
AN - SCOPUS:58349108291
SN - 3540922377
SN - 9783540922377
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 143
EP - 157
BT - Digital Watermarking - 6th International Workshop, IWDW 2007, Proceedings
T2 - 6th International Workshop on Digital Watermarking, IWDW 2007
Y2 - 3 December 2007 through 5 December 2007
ER -