Skip to main content

Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes

  • Conference paper
Information Hiding (IH 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3200))

Included in the following conference series:

Abstract

In this paper, we introduce a new feature-based steganalytic method for JPEG images and use it as a benchmark for comparing JPEG steganographic algorithms and evaluating their embedding mechanisms. The detection method is a linear classifier trained on feature vectors corresponding to cover and stego images. In contrast to previous blind approaches, the features are calculated as an L 1 norm of the difference between a specific macroscopic functional calculated from the stego image and the same functional obtained from a decompressed, cropped, and recompressed stego image. The functionals are built from marginal and joint statistics of DCT coefficients. Because the features are calculated directly from DCT coefficients, conclusions can be drawn about the impact of embedding modifications on detectability. Three different steganographic paradigms are tested and compared. Experimental results reveal new facts about current steganographic methods for JPEGs and new de-sign principles for more secure JPEG steganography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.J., Petitcolas, F.A.P.: On the Limits of Steganography. IEEE Journal of Selected Areas in Communications. Special Issue on Copyright and Privacy Protection 16(4), 474–481 (1998)

    Google Scholar 

  2. Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  3. Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–75. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  4. Westfeld, A.: Detecting Low Embedding Rates. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 324–339. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Provos, N., Honeyman, P.: Detecting Steganographic Content on the Internet. CITI Technical Report 01-11 (2001)

    Google Scholar 

  6. Fridrich, J., Goljan, M., Hogea, D., Soukal, D.: Quantitative Steganalysis: Estimating Secret Message Length. ACM Multimedia Systems Journal. Special issue on Multimedia Security 9(3), 288–302 (2003)

    Google Scholar 

  7. Farid, H., Siwei, L.: Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340–354. Springer, Heidelberg (2002)

    Google Scholar 

  8. Eggers, J., Bäuml, R., Girod, B.: A Communications Approach to Steganography. In: Proc. EI SPIE Electronic Imaging SPIE, vol. 4675, pp. 26–49 (2002)

    Google Scholar 

  9. Tzschoppe, R., Bäuml, R., Huber, J.B., Kaup, A.: Steganographic System based on Higher-Order Statistics. In: Proc. EI SPIE Electronic Imaging, Santa Clara, pp. 156–166 (2003)

    Google Scholar 

  10. Tzschoppe, R.: Personal communication (February 2003)

    Google Scholar 

  11. Provos, N.: Defending Against Statistical Steganalysis. In: 10th USENIX Security Symposium, Washington, DC (2001)

    Google Scholar 

  12. Sallee, P.: Model Based Steganography. International Workshop on Digital Watermarking. Seoul, pp. 174–188 (October 2003)

    Google Scholar 

  13. Westfeld, A.: High Capacity Despite Better Steganalysis (F5–A Steganographic Algorithm). In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  14. Sallee, P.: Model-based methods for steganography and steganalysis. Submitted to International Journal of Image and Graphics. Special issue on Image Data Hiding (2004)

    Google Scholar 

  15. Avcibas, I., Memon, N., Sankur, B.: Steganalysis using Image Quality Metrics. In: SPIE Security and Watermarking of Multimedia Contents II, Electronic Imaging, San Jose, CA (January 2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fridrich, J. (2004). Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes. In: Fridrich, J. (eds) Information Hiding. IH 2004. Lecture Notes in Computer Science, vol 3200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30114-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30114-1_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24207-9

  • Online ISBN: 978-3-540-30114-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics