Abstract
The recent approach of a model-based framework for steganography fruitfully contributes to the discussion on the security of steganography. In addition, the first proposal for an embedding algorithm constructed under the model-based paradigm reached remarkable performance in terms of capacity and security. In this paper, we review the emerging of model-based steganography in the context of decent steganalysis as well as from theoretical considerations, before we present a method to attack the above-mentioned scheme on the basis of first order statistics. Experimental results show a good detection ratio for a large test set of typical JPEG images. The attack is successful because of weaknesses in the model and does not put into question the generalised theoretical framework of model-based steganography. So we discuss possible implications for improved embedding functions.
Chapter PDF
References
Anderson, R., Petitcolas, F.A.P.: On the Limits of Steganography. IEEE Journal of Selected Areas in Communications 16, 474–481 (1998)
Böhme, R., Westfeld, A.: Exploiting Preserved Statistics for Steganalysis. Paper presented at the Sixth Workshop on Information Hiding, Toronto, Canada (May 2004)
Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)
Crandall, R.: Some Notes on Steganography. Posting to a mailing list on steganography (1998), http://os.inf.tu-dresden.de/~westfeld/crandall.pdf
Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB Steganography Via Sample Pair Analysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 355–372. Springer, Heidelberg (2003)
Franz, E.: Steganography Preserving Statistical Properties. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 278–294. Springer, Heidelberg (2003)
Fridrich, J.: Feature-based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes. Paper presented at the Sixth Workshop on Information Hiding, Toronto, Canada (May 2004)
Fridrich, J., Goljan, M., Du, R.: Steganalysis Based on JPEG Compatibility. In: Tescher, A.G., Vasudev, B., Bove Jr., V.M. (eds.) Proceedings of SPIE, Multimedia Systems and Applications IV, Denver, CO, pp. 275–280 (2001)
Fridrich, J., Goljan, M., Du, R.: Reliable Detection of LSB Based Image Steganography. In: Proceedings of the ACM Workshop on Multimedia and Security, 27–30 (2001)
Fridrich, J., Goljan, M., Hogea, D.: Attacking the OutGuess. In: Proceedings of the ACM Workshop on Multimedia and Security (2002)
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)
Fridrich, J., Goljan, M., Soukal, D.: Higher-order Statistical Steganalysis of Palette Images. In: Delp, E.J., Wong, P.W. (eds.) Proceedings of SPIE, Security and Watermarking of Multimedia Contents V, pp. 178–190 (2003)
Fridrich, J., Goljan, M., Soukal, D.: Perturbed Quantization Steganography Using Wet Paper Codes. Paper to be presented at the ACM Workshop on Multimedia and Security, Magdeburg, Germany (September 20–21, 2004)
Ihaka, R., Gentlemen, R.: R – A Language for Data Analysis and Graphics. Journal of Computational Graphics and Statistics 5, 299–314 (1996)
Ker, A.: Improved Detection of LSB Steganography in Grayscale Images. Paper presented at the Sixth Workshop on Information Hiding, Toronto, Canada (May 2004)
Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires XI, 5–38 & 161–191 (1883), http://www.cl.cam.ac.uk/~fapp2/
Lyu, S., Farid, H.: Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340–354. Springer, Heidelberg (2003)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding – A Survey. Proceedings of the IEEE 87, 1062–1078 (1999)
Provos, N.: OutGuess – Universal Steganography (2001), http://www.outguess.org/
The, R.: Project for Statistical Computing, http://www.r-project.org/
Sallee, P.: Model-Based Steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)
Upham, D.: Jsteg (1993), http://ftp.funet.fi/pub/crypt/cypherpunks/applications/jsteg/
Wayner, P.: Mimic Functions. Cryptologia 16, 193–214 (1992)
Westfeld, A.: F5 – A Steganographic Algorithm. High Capacity Despite Better Steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Westfeld, A.: Detecting Low Embedding Rates. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 324–339. Springer, Heidelberg (2003)
Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Witten, I.H., Neal, R.M., Cleary, J.G.: Arithmetic Coding for Data Compression. Communications of the ACM 20, 520–540 (1987)
Zhang, X., Wang, S., Zhang, K.: Steganography with Least Histogram Abnormality. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 395–406. Springer, Heidelberg (2003)
Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modelling the Security of Steganographic Systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 334–354. Springer, Heidelberg (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Böhme, R., Westfeld, A. (2004). Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics. In: Samarati, P., Ryan, P., Gollmann, D., Molva, R. (eds) Computer Security – ESORICS 2004. ESORICS 2004. Lecture Notes in Computer Science, vol 3193. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30108-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-30108-0_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22987-2
Online ISBN: 978-3-540-30108-0
eBook Packages: Springer Book Archive