Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack

被引:1
|
作者
Butora, Jan [1 ]
Bas, Patrick [1 ]
Cogranne, Remi [2 ]
机构
[1] Univ Lille, CNRS, Cent Lille, UMR 9189 CRIStAL, Lille, France
[2] Univ Technol, LIST3N Lab, Troyes, France
关键词
steganalysis; rounding errors; RJCA; JPEG; false alarm; STEGANALYSIS;
D O I
10.1145/3577163.3595092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Reverse JPEG Compatibility Attack can be used for steganalysis of JPEG images compressed with Quality Factor 100 by detecting increased variance of decompression rounding errors. In this work, we point out the dangers associated with this attack by showing that in an uncontrolled environment, the variance can be elevated simply by using a different JPEG compressor. If not careful, the steganalyst can wrongly misclassify cover images. In order to deal with the diversity associated to the devices or softwares generating JPEGs, we propose in this paper to build a deep learning detector trained on a huge dataset of downloaded images. Experimental evaluation shows that such a detector can provide operational false alarms as small as 10(-4), while still correctly classifying 90% of stego images. Furthermore, it is shown that this performance is directly applicable to other image datasets. As a side product, we indicate that the attack is not applicable to images developed with a specific JPEG compressor based on the trunc quantization function.
引用
收藏
页码:59 / 66
页数:8
相关论文
共 50 条
  • [21] An Economic Analysis of False Alarms and No Fault Found Events in Air Vehicles
    Ilarslan, Mustafa
    Ungar, Louis Y.
    Ilarslan, Kenan
    2016 IEEE AUTOTESTCON PROCEEDINGS, 2016,
  • [22] Simulation analysis of the impact of ignitions, rekindles, and false alarms on forest fire suppression
    Pacheco, Abilio P.
    Claro, Joao
    Oliveira, Tiago
    CANADIAN JOURNAL OF FOREST RESEARCH, 2014, 44 (01) : 45 - 55
  • [23] Signal Quality Analysis of Ambulatory Electrocardiograms to Gate False Myocardial Ischemia Alarms
    Abdelazez, Mohamed
    Quesnel, Patrick X.
    Chan, Adrian D. C.
    Yang, Homer
    IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, 2017, 64 (06) : 1318 - 1325
  • [24] Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping Algorithms
    Oh, Saeyoung
    Kim, Jong
    INFORMATION SECURITY APPLICATIONS, WISA 2018, 2019, 11402 : 146 - 158
  • [25] Distributed Resilient Mitigation Strategy for False Data Injection Attack in Cyber-Physical Microgrids
    Cao, Ge
    Jia, Rong
    Dang, Jian
    FRONTIERS IN ENERGY RESEARCH, 2022, 10
  • [26] Method for identifying and eliminating ventilator false alarms of ventilator based on clinical data analysis
    Wang, Feng
    Gu, Wunan
    Fu, Rao
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART C-JOURNAL OF MECHANICAL ENGINEERING SCIENCE, 2023,
  • [27] Detecting False Alarms from Automatic Static Analysis Tools: How Far are We?
    Kang, Hong Jin
    Aw, Khai Loong
    Lo, David
    2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022), 2022, : 698 - 709
  • [28] System for DDoS attack mitigation by discovering the attack vectors through statistical traffic analysis
    Mirchev M.J.
    Mirtchev S.T.
    International Journal of Information and Computer Security, 2020, 13 (3-4) : 309 - 321
  • [29] Capacity bounds and rate-distortion-analysis in dither vector QIM watermarking with JPEG and JPEG2000 attack
    Xiang, Yanjun
    Salehi, Masoud
    2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, : 766 - 770
  • [30] Forensic Analysis on False Data Injection Attack on IoT Environment
    Nizam, Saiful Amin Sharul
    Ibrahim, Zul-Azri
    Rahim, Fiza Abdul
    Fadzil, Hafizuddin Shahril
    Abdullah, Haris Iskandar Mohd
    Mustaffa, Muhammad Zulhusni
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 265 - 271