Steganalysis of JSteg algorithm using hypothesis testing theory

This paper investigates the statistical detection of JSteg steganography. The approach is based on a statistical model of discrete cosine transformation (DCT) coefficients challenging the usual assumption that among a subband all the coefficients are independent and identically distributed (i. i. d.). The hidden information-detection problem is cast in the framework of hypothesis testing theory. In an ideal context where all model parameters are perfectly known, the likelihood ratio test (LRT) is presented, and its performances are theoretically established. The statistical performance of LRT serves as an upper bound for the detection power. For a practical use where the distribution parameters are unknown, by exploring a DCT channel selection, a detector based on estimation of those parameters is designed. The loss of power of the proposed detector compared with the optimal LRT is small, which shows the relevance of the proposed approach.

[1]  B. S. Manjunath,et al.  Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.

[2]  Marc Lebrun,et al.  An Analysis and Implementation of the BM3D Image Denoising Method , 2012, Image Process. Line.

[3]  F. Muller Distribution shape of two-dimensional DCT coefficients of natural images , 1993 .

[4]  Florent Retraint,et al.  Statistical detection of Jsteg steganography using hypothesis testing theory , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[5]  Jean-Michel Morel,et al.  A non-local algorithm for image denoising , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[6]  Florent Retraint,et al.  Hidden information detection based on quantized Laplacian distribution , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[7]  Sorina Dumitrescu,et al.  Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.

[8]  Florent Retraint,et al.  Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm , 2014, IEEE Transactions on Image Processing.

[9]  Tomás Pevný,et al.  Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.

[10]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[11]  Sanjit K. Mitra,et al.  Image probability distribution based on generalized gamma function , 2005, IEEE Signal Processing Letters.

[12]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[13]  Florent Retraint,et al.  Statistical decision by using quantized observations , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[14]  Florent Retraint,et al.  Statistical Decision Methods in Hidden Information Detection , 2011, Information Hiding.

[15]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[16]  Jiwu Huang,et al.  Adaptive steganalysis against WOW embedding algorithm , 2014, IH&MMSec '14.

[17]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[18]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[19]  Florent Retraint,et al.  Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters , 2014, IH&MMSec '14.

[20]  Florent Retraint,et al.  Hidden information detection using decision theory and quantized samples: Methodology, difficulties and results , 2014, Digit. Signal Process..

[21]  Phil Sallee,et al.  Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..

[22]  Joan L. Mitchell,et al.  JPEG: Still Image Data Compression Standard , 1992 .

[23]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[24]  Rainer Böhme,et al.  Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics , 2004, ESORICS.

[25]  Junichi Nakamura,et al.  Image Sensors and Signal Processing for Digital Still Cameras , 2005 .

[26]  E. Lehmann Testing Statistical Hypotheses , 1960 .

[27]  Rainer Böhme,et al.  Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.

[28]  Florent Retraint,et al.  A local adaptive model of natural images for almost optimal detection of hidden data , 2014, Signal Process..

[29]  Jessica J. Fridrich,et al.  On estimation of secret message length in LSB steganography in spatial domain , 2004, IS&T/SPIE Electronic Imaging.

[30]  Joseph W. Goodman,et al.  A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..

[31]  T. H. Thai,et al.  Statistical model of natural images , 2012, 2012 19th IEEE International Conference on Image Processing.

[32]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[33]  Florent Retraint,et al.  An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection , 2013, IEEE Transactions on Information Forensics and Security.

[34]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[35]  Tao Zhang,et al.  A fast and effective steganalytic technique against JSteg-like algorithms , 2003, SAC '03.

[36]  Rainer Bhme Advanced Statistical Steganalysis , 2010 .

[37]  Florent Retraint,et al.  A Cover Image Model For Reliable Steganalysis , 2011, Information Hiding.

[38]  Marc Lebrun,et al.  An Implementation and Detailed Analysis of the K-SVD Image Denoising Algorithm , 2012, Image Process. Line.

[39]  Rainer Böhme,et al.  Weighted Stego-Image Steganalysis for JPEG Covers , 2008, Information Hiding.

[40]  Jessica J. Fridrich,et al.  Quantitative Structural Steganalysis of Jsteg , 2010, IEEE Transactions on Information Forensics and Security.

[41]  Rainer Böhme,et al.  Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.

[42]  Jessica J. Fridrich,et al.  Steganalysis of LSB Replacement Using Parity-Aware Features , 2012, Information Hiding.

[43]  Florent Retraint,et al.  Steganalysis of Jsteg algorithm based on a novel statistical model of quantized DCT coefficients , 2013, 2013 IEEE International Conference on Image Processing.

[44]  Sangjin Lee,et al.  Category Attack for LSB Steganalysis of JPEG Images , 2006, IWDW.