A Markov Process Based Approach to Effective Attacking JPEG Steganography

In this paper, a novel steganalysis scheme is presented to effectively detect the advanced JPEG steganography. For this purpose, we first choose to work on JPEG 2-D arrays formed from the magnitudes of quantized block DCT coefficients. Difference JPEG 2-D arrays along horizontal, vertical, and diagonal directions are then used to enhance changes caused by JPEG steganography. Markov process is applied to modeling these difference JPEG 2-D arrays so as to utilize the second order statistics for steganalysis. In addition to the utilization of difference JPEG 2-D arrays, a thresholding technique is developed to greatly reduce the dimensionality of transition probability matrices, i.e., the dimensionality of feature vectors, thus making the computational complexity of the proposed scheme manageable. The experimental works are presented to demonstrate that the proposed scheme has outperformed the existing steganalyzers in attacking OutGuess, F5, and MB1.

[1]  Phil Sallee,et al.  Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..

[2]  S. Leigh,et al.  Probability and Random Processes for Electrical Engineering , 1989 .

[3]  Chengyun Yang,et al.  Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[4]  Trac D. Tran,et al.  Context-based entropy coding of block transform coefficients for image compression , 2002, IEEE Trans. Image Process..

[5]  Nasir D. Memon,et al.  Benchmarking steganographic and steganalysis techniques , 2005, IS&T/SPIE Electronic Imaging.

[6]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[7]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[8]  Y. Shi,et al.  STEGANALYSIS BASED ON MOMENTS OF CHARACTERISTIC FUNCTIONS USING WAVELET DECOMPOSITION, PREDICTION-ERROR IMAGE, AND NEURAL NETWORK , 2005 .

[9]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[10]  Husrev T. Sencar,et al.  Image Steganography: Concepts and Practice , 2004 .

[11]  B. S. Manjunath,et al.  Steganalysis of spread spectrum data hiding exploiting cover memory , 2005, IS&T/SPIE Electronic Imaging.

[12]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[13]  E. Delp,et al.  Security, steganography, and watermarking of multimedia contents , 2004 .

[14]  Leon Garcia,et al.  Probability and Random Processes for Electrical Engineering , 1993 .

[15]  Huifang Sun,et al.  Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms, and Standards , 1999 .

[16]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.