New Features for Specific JPEG Steganalysis

We present in this paper a new approach for specific JPEG steganalysis and propose studying statistics of the compressed DCT coefficients. Traditionally, steganographic algorithms try to preserve statistics of the DCT and of the spatial domain, but they cannot preserve both and also control the alteration of the compressed data. We have noticed a deviation of the entropy of the compressed data after a first embedding. This deviation is greater when the image is a cover medium than when the image is a stego image. To observe this deviation, we pointed out new statistic features and combined them with the Multiple Embedding Method. This approach is motivated by the Avalanche Criterion of the JPEG lossless compression step. This criterion makes possible the design of detectors whose detection rates are independent of the payload. Finally, we designed a Fisher discriminant based classifier for well known steganographic algorithms, Outguess, F5 and Hide and Seek. The experiemental results we obtained show the efficiency of our classifier for these algorithms. Moreover, it is also designed to work with low embedding rates (< 10-5) and according to the avalanche criterion of RLE and Huffman compression step, its efficiency is independent of the quantity of hidden information.





References:
[1] I. Avicibas┬©, N. Memon, and B. Sankur. Steganalysis based on image
quality metrics. In Proc. SPIE, Security and Watermarking of Multimedia
Contents III, volume 4314, pages 523-531, 2001.
[2] C. W. Brown and B. J. Shepherd. Graphics File Formats, reference and
guide. Manning, 1995.
[3] Rajarathnam Chandramouli, Mehdi Kharrazi, and Nasir D. Memon.
Image steganography and steganalysis: Concepts and practice. In Kalker
et al. [12], pages 35-49.
[4] Hany Farid. Detecting hidden messages using higher-order statistical
models. In ICIP (2), pages 905-908, 2002.
[5] H. Feistel. Cryptography and computer privacy. Scientific American,
228(5):15-23, 1973.
[6] J. Fridrich, M. Goljan, and D. Hogea. New methodology for breaking
steganographic techniques for jpegs. In Proc. SPIE, Security and
Watermarking of Multimedia Contents V, pages 143-155, January 2003.
[7] J. Fridrich and T. Pevny. Multiclass blind steganalysis for jpeg images.
In Proc. SPIE, Security and Watermarking of Multimedia Contents VIII,
January 2006.
[8] Jessica J. Fridrich. Feature-based steganalysis for jpeg images and its
implications for future design of steganographic schemes. In Information
Hiding [9], pages 67-81.
[9] Jessica J. Fridrich, editor. Information Hiding, 6th International Workshop,
IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected
Papers, volume 3200 of Lecture Notes in Computer Science. Springer,
2004.
[10] Jessica J. Fridrich, Miroslav Goljan, and Dorin Hogea. Steganalysis
of jpeg images: Breaking the f5 algorithm. In Petitcolas [19], pages
310-323.
[11] J. J. Harmsen and W. A. Pearlman. Kernel fisher discriminant for
steganalysis of jpeg hiding methods. In ACM Multimedia and Security,
August 1-2 2005.
[12] Ton Kalker, Ingemar J. Cox, and Yong Man Ro, editors. Digital
Watermarking, Second International Workshop, IWDW 2003, Seoul,
Korea, October 20-22, 2003, Revised Papers, volume 2939 of Lecture
Notes in Computer Science. Springer, 2004.
[13] A. Latham. Steganography: JPHIDE AND JPSEEK, 1999.
http://linux01.gwdg.de/Ôê╝alatham/stego.html.
[14] Guo-Shiang Lin, Chia H. Yeh, and C. C. Jay Kuo. Data hiding domain
classification for blind image steganalysis. In ICME, pages 907-910,
2004.
[15] S. Lyu and H. Farid. Steganalysis using color wavelet statistics
and one-class support vector machines. In Proc. SPIE, Security and
Watermarking of Multimedia Contents VI, 2004.
[16] S. Lyu and H. Farid. Steganalysis using higher-order image statistics.
IEEE Transactions on Information Forensics and Security, (1), 2006.
[17] Siwei Lyu and Hany Farid. Detecting hidden messages using higherorder
statistics and support vector machines. In Petitcolas [19], pages
340-354.
[18] Ira S. Moskowitz, editor. Information Hiding, 4th International Workshop,
IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings,
volume 2137 of Lecture Notes in Computer Science. Springer, 2001.
[19] Fabien A. P. Petitcolas, editor. Information Hiding, 5th International
Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9,
2002, Revised Papers, volume 2578 of Lecture Notes in Computer
Science. Springer, 2003.
[20] Niels Provos. Defending against statistical steganalysis. In 10th USENIX
Security Symposium, 2001.
[21] Gilbert Saporta. Probabilit'e, analyse des donn'ees et statistiques (in
french). Technip, 1990.
[22] Gustavus J. Simmons. The prisoners- problem and the subliminal
channel. In CRYPTO, pages 51-67, 1983.
[23] Gregory K. Wallace. The jpeg still picture compression standard.
Commun. ACM, 34(4):30-44, 1991.
[24] Andreas Westfeld. F5-a steganographic algorithm. In Moskowitz (18),
pages 289-302.