Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters

This paper investigates the statistical detection of data hidden within DCT coefficients of JPEG images using a Laplacian distribution model. The main contributions is twofold. First, this paper proposes to model the DCT coefficients using a Laplacian distribution but challenges the usual assumption that among a sub-band all the coefficients follow are independent and identically distributed (i.i.d). In this paper it is assumed that the distribution parameters change from DCT coefficient to DCT coefficient. Second this paper applies this model to design a statistical test, based on hypothesis testing theory, which aims at detecting data hidden within DCT coefficient with the JSteg algorithm. The proposed optimal detector carefully takes into account the distribution parameters as nuisance parameters. Numerical results on simulated data as well as on numerical images database show the relevance of the proposed model and the good performance of the ensuing test.

[1]  Florent Retraint,et al.  Steganalysis of Jsteg algorithm based on a novel statistical model of quantized DCT coefficients , 2013, 2013 IEEE International Conference on Image Processing.

[2]  Sergio Verdú,et al.  Bits through queues , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[3]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[4]  Sangjin Lee,et al.  Category Attack for LSB Steganalysis of JPEG Images , 2006, IWDW.

[5]  F. Muller Distribution shape of two-dimensional DCT coefficients of natural images , 1993 .

[6]  Florent Retraint,et al.  A Cover Image Model For Reliable Steganalysis , 2011, Information Hiding.

[7]  Florent Retraint,et al.  An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection , 2013, IEEE Transactions on Information Forensics and Security.

[8]  Florent Retraint,et al.  A local adaptive model of natural images for almost optimal detection of hidden data , 2014, Signal Process..

[9]  Jessica J. Fridrich,et al.  On estimation of secret message length in LSB steganography in spatial domain , 2004, IS&T/SPIE Electronic Imaging.

[10]  Joseph W. Goodman,et al.  A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..

[11]  Florent Retraint,et al.  Statistical detection of data hidden in least significant bits of clipped images , 2014, Signal Process..

[12]  Florent Retraint,et al.  Hidden information detection using decision theory and quantized samples: Methodology, difficulties and results , 2014, Digit. Signal Process..

[13]  Rainer Böhme,et al.  Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics , 2004, ESORICS.

[14]  Junichi Nakamura,et al.  Image Sensors and Signal Processing for Digital Still Cameras , 2005 .

[15]  Rainer Böhme,et al.  Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.

[16]  B. S. Manjunath,et al.  Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.

[17]  Phil Sallee,et al.  Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..

[18]  Joan L. Mitchell,et al.  JPEG: Still Image Data Compression Standard , 1992 .

[19]  Rainer Böhme,et al.  Weighted Stego-Image Steganalysis for JPEG Covers , 2008, Information Hiding.

[20]  Jessica J. Fridrich,et al.  Quantitative Structural Steganalysis of Jsteg , 2010, IEEE Transactions on Information Forensics and Security.

[21]  Sanjit K. Mitra,et al.  Image probability distribution based on generalized gamma function , 2005, IEEE Signal Processing Letters.

[22]  Florent Retraint,et al.  Hidden information detection based on quantized Laplacian distribution , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[23]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[24]  Florent Retraint,et al.  Statistical Decision Methods in Hidden Information Detection , 2011, Information Hiding.

[25]  Rainer Böhme,et al.  Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.

[26]  Deepa Kundur,et al.  Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain , 2006, IEEE Transactions on Information Forensics and Security.

[27]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[28]  Florent Retraint,et al.  Statistical decision by using quantized observations , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[29]  Rainer Bhme Advanced Statistical Steganalysis , 2010 .

[30]  T. H. Thai,et al.  Statistical model of natural images , 2012, 2012 19th IEEE International Conference on Image Processing.

[31]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[32]  Florent Retraint,et al.  Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm , 2014, IEEE Transactions on Image Processing.

[33]  Tomás Pevný,et al.  Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.

[34]  E. Lehmann Testing Statistical Hypotheses , 1960 .

[35]  Jianhua Li,et al.  A study of on/off timing channel based on packet delay distribution , 2009, Comput. Secur..