@inproceedings{3fd6df19abc745c282f3ebb971df61cb,
title = "Steganalysis of JPEG2000 lazy-mode steganography using the Hilbert-Huang transform based sequential analysis",
abstract = "In this paper, we present a steganalytic method to attack JPEG2000 lazy-mode steganography proposed by Su et al. The key element of the method is the Hilbert-Huang transform based analysis of the code-block noise variance sequences of stego images and non-stego noisy images. The Hilbert transform based characteristic vectors are constructed via empirical mode decomposition of the sequences and the support vector machine classifier is used in classification. Experimental results have demonstrated effectiveness of the proposed steganalytic method. According to our best knowledge, this method is the first successful attack of JPEG2000 lazy-mode steganography. And furthermore, the proposed method takes first step towards the application of Hilbert-Huang transform in steganalysis and proves its great advantage.",
keywords = "Computer security, Multimedia systems",
author = "Shunquan Tan and Jiwu Huang and Zhihua Yang and Shi, {Yun Q.}",
year = "2006",
doi = "10.1109/ICIP.2006.312382",
language = "English (US)",
isbn = "1424404819",
series = "Proceedings - International Conference on Image Processing, ICIP",
pages = "101--104",
booktitle = "2006 IEEE International Conference on Image Processing, ICIP 2006 - Proceedings",
note = "2006 IEEE International Conference on Image Processing, ICIP 2006 ; Conference date: 08-10-2006 Through 11-10-2006",
}