Steganography and Steganalysis of JPEG Images
نویسندگان
چکیده
My research motivation came from a project supported by Naval Research Laboratory (NRL) where I was working on an algorithm to provide better stealthiness for hiding data inside JPEG images. As a result, with the guidance of my advisor, Dr. Newman, and Ira S. Moskowitz from Center for High Assurance Computer Systems, NRL, we developed J2 steganography algorithm which was based on hiding data in the spatial domain by making changes in the frequency domain. J2 had problems such as lower capacity along with no first order histogram restoration. This led to the development of J3 where the global histogram is preserved along with higher capacity. But, the first order preservation is not enough since it can be detected using higher order statistics. I plan to develop an algorithm where I could maintain the first and second order statistics in stego images with respect to cover image. In order to develop a good steganography algorithm, one should have knowledge about the different steganalysis techniques. Keeping this in mind, I also plan to propose a steganalysis scheme where I would estimate the cover image using the second order statistics. My research goals focus on the following topics: 1. Designing a frequency based embedding approach with spatial based extraction using hash of the data from spatial domain, J2. (Done) 2. Designing a novel approach to high capacity JPEG steganography using histogram compensation technique, J3. (Done) 3. Designing a JPEG steganography algorithm using first and second order statistical restoration techniques with high performance in terms of steganalysis, J4. (Work in progress) 1 4. Designing a steganalysis scheme based on estimation of cover using the second order statistics. (Work in progress) 5. Improvement over features of J2 and J3 and analyzing more experimental results for steganalysis using Support Vector Machines. (Work in Progress) 2 Contribution We developed two techniques to embed data in the JPEG medium. The first one, called J2, embeds data by making changing to the DCT coefficients which in turn makes changes in the spatial domain values. The extraction is done by converting JPEG to spatial domain and hashing the values of the bits from the color pixels. Second algorithm, which was a great improvement over J2, called J3, has a high capacity and it embeds data with great efficiency and better stealthiness. It also has the ability to restore the histogram completely to its original values. The third algorithm, as …
منابع مشابه
Steganalysis of Colored JPEG Images
Images, especially colored JPEG images, are increasingly being used as cover by many steganography techniques. Steganalysis detects the presence of message embedded by steganography techniques. Many authors have given different steganalysis techniques which differ mainly on the feature sets being used. In this paper we are comparing feature sets of six of these steganalysis techniques for multi...
متن کاملنهانکاوی در تصاویر JPEG بر مبنای دستهبندی ویژگیهای آماری و تصمیمگیری دو مرحلهای
Abstract In this paper, we propose a comprehensive steganalysis scheme for JPEG images. In this method, the optimized features which can interpret high distinction between cover and stego images are extracted from images. These features have been selected after a careful study on modifications caused by different steganography algorithms on statistical characteristics of images. Furthermore, us...
متن کاملA Survey on Image Steganography and Steganalysis
Steganography and steganalysis are important topics in information hiding. Steganography refers to the technology of hiding data into digital media without drawing any suspicion, while steganalysis is the art of detecting the presence of steganography. This paper provides a survey on steganography and steganalysis for digital images, mainly covering the fundamental concepts, the progress of ste...
متن کاملHide and Seek in JPEG Images
Recently, the JPEG images are the most common format for storing images. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. So it attracted the attention of researchers as the main steganographic format. There are many new and powerful steganography and steganalysis techniques in JPEG images reported in the literature, in the last few years. In this paper, ...
متن کاملDetermining the Stego Algorithm for JPEG Images
The goal of Forensic Steganalysis is to detect the presence of embedded data and eventually extract the secret message. A necessary step toward extracting the data is determining the steganographic algorithm used to embed the data. In this paper, we construct blind classifiers capable of detecting steganography in JPEG images and assigning stego images to 6 popular JPEG embedding algorithms. Th...
متن کاملBlind Steganalysis : To Analyse the Detection Rate of Stego Images using Different Steganalytic Techniques with Support Vector Machine Classifier
Steganography is the art of hiding the secret message in a cover medium and the media could be a audio or video or image. Steganography aims at hiding data as stealthy as possible in a cover medium, Steganalysis aims to detect the presence of any hidden information in the stego media here it refers to the JPEG images. Current Steganalysis aims to focus more on detecting statistical anomalies in...
متن کامل