Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack

被引:1
|
作者
Butora, Jan [1 ]
Bas, Patrick [1 ]
Cogranne, Remi [2 ]
机构
[1] Univ Lille, CNRS, Cent Lille, UMR 9189 CRIStAL, Lille, France
[2] Univ Technol, LIST3N Lab, Troyes, France
关键词
steganalysis; rounding errors; RJCA; JPEG; false alarm; STEGANALYSIS;
D O I
10.1145/3577163.3595092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Reverse JPEG Compatibility Attack can be used for steganalysis of JPEG images compressed with Quality Factor 100 by detecting increased variance of decompression rounding errors. In this work, we point out the dangers associated with this attack by showing that in an uncontrolled environment, the variance can be elevated simply by using a different JPEG compressor. If not careful, the steganalyst can wrongly misclassify cover images. In order to deal with the diversity associated to the devices or softwares generating JPEGs, we propose in this paper to build a deep learning detector trained on a huge dataset of downloaded images. Experimental evaluation shows that such a detector can provide operational false alarms as small as 10(-4), while still correctly classifying 90% of stego images. Furthermore, it is shown that this performance is directly applicable to other image datasets. As a side product, we indicate that the attack is not applicable to images developed with a specific JPEG compressor based on the trunc quantization function.
引用
收藏
页码:59 / 66
页数:8
相关论文
共 50 条
  • [1] Reverse JPEG Compatibility Attack
    Butora, Jan
    Fridrich, Jessica
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1444 - 1454
  • [2] Fighting the Reverse JPEG Compatibility Attack: Pick your Side
    Butora, Jan
    Bas, Patrick
    PROCEEDINGS OF THE 2022 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH-MMSEC 2022, 2022, : 113 - 121
  • [3] EXTENDING THE REVERSE JPEG COMPATIBILITY ATTACK TO DOUBLE COMPRESSED IMAGES
    Butora, Jan
    Fridrich, Jessica
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 2710 - 2714
  • [4] Reverse-engineering a detector with false alarms
    Craver, Scott
    Yu, Jun
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505
  • [5] A new approach to decreasing the false network attack alarms
    Nasab, Amin Javadi
    Nezjad, Ebrahim Behrouzian
    Nezjad, Ehsan Behrouzian
    Sazan, Ali Shaneh
    PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON MATHEMATICAL AND COMPUTATIONAL METHODS IN SCIENCE AND ENGINEERING (MACMESE '07)/ DNCOCO '07, 2007, : 366 - 371
  • [6] Advancing the JPEG Compatibility Attack: Theory, Performance, Robustness, and Practice
    Dworetzky, Eli
    Kaziakhmedov, Edgar
    Fridrich, Jessica
    PROCEEDINGS OF THE 2023 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH&MMSEC 2023, 2023, : 67 - 79
  • [7] ANALYSIS AND REDUCTION OF FALSE ALARMS AT LASA
    CHANG, AC
    TRANSACTIONS-AMERICAN GEOPHYSICAL UNION, 1977, 58 (06): : 443 - 444
  • [8] Understanding and mitigation of false alarms as measured in LWIR clutter by the AIRMS sensor
    Farber, MS
    Campion, DC
    SIGNAL AND DATA PROCESSING OF SMALL TARGETS 1996, 1996, 2759 : 62 - 76
  • [9] Automatic JPEG Grid Detection with Controlled False Alarms, and Its Image Forensic Applications
    Nikoukhah, Tina
    von Gioi, Rafael Grompone
    Colom, Miguel
    Morel, Jean-Michel
    IEEE 1ST CONFERENCE ON MULTIMEDIA INFORMATION PROCESSING AND RETRIEVAL (MIPR 2018), 2018, : 378 - 383
  • [10] SELECTION-CHANNEL-AWARE REVERSE JPEG COMPATIBILITY FOR HIGHLY RELIABLE STEGANALYSIS OF JPEG IMAGES
    Cogranne, Remi
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 2772 - 2776