Steganalysis of YASS

Bin Li, Yun-Qing Shi, Jiwu Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

23 Scopus citations

Abstract

In this paper, we describe a method for attacking Yet Another Steganographic Scheme (YASS), which is designed to be a very secure JPEG steganographic algorithm. The success of YASS is attributed to its innovation in embedding, i.e., hiding data in embedding host blocks whose locations are randomized. However, we find that the locations of the embedding host blocks are not randomized enough. Some locations in an image are possible to hold an entire embedding host block and some locations are definitely not. Additionally, YASS employs a Quantization Index Modulation (QIM) embedding strategy in order to enhance the robustness of the embedded data, which on the other hand introduces extra zero coefficients into the embedding host blocks during data hiding. Consequently, statistical features extracted from locations which are possible to hold embedding host blocks are different from those from locations which are impossible to hold embedding host blocks. The trace of YASS embedding is therefore exposed.

Original languageEnglish (US)
Title of host publicationMM and Sec'08
Subtitle of host publicationProceedings of the 10th ACM Workshop on Multimedia and Security
Pages139-148
Number of pages10
DOIs
StatePublished - Dec 1 2008
EventMM and Sec'08: 10th ACM Workshop on Multimedia and Security - Oxford, United Kingdom
Duration: Sep 22 2008Sep 23 2008

Publication series

NameMM and Sec'08: Proceedings of the 10th ACM Workshop on Multimedia and Security

Other

OtherMM and Sec'08: 10th ACM Workshop on Multimedia and Security
Country/TerritoryUnited Kingdom
CityOxford
Period9/22/089/23/08

All Science Journal Classification (ASJC) codes

  • Computer Graphics and Computer-Aided Design
  • Computer Networks and Communications
  • Computer Science Applications

Keywords

  • JPEG
  • Steganalysis
  • Steganography
  • YASS

Fingerprint

Dive into the research topics of 'Steganalysis of YASS'. Together they form a unique fingerprint.

Cite this