Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack

被引:1
|
作者
Butora, Jan [1 ]
Bas, Patrick [1 ]
Cogranne, Remi [2 ]
机构
[1] Univ Lille, CNRS, Cent Lille, UMR 9189 CRIStAL, Lille, France
[2] Univ Technol, LIST3N Lab, Troyes, France
关键词
steganalysis; rounding errors; RJCA; JPEG; false alarm; STEGANALYSIS;
D O I
10.1145/3577163.3595092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Reverse JPEG Compatibility Attack can be used for steganalysis of JPEG images compressed with Quality Factor 100 by detecting increased variance of decompression rounding errors. In this work, we point out the dangers associated with this attack by showing that in an uncontrolled environment, the variance can be elevated simply by using a different JPEG compressor. If not careful, the steganalyst can wrongly misclassify cover images. In order to deal with the diversity associated to the devices or softwares generating JPEGs, we propose in this paper to build a deep learning detector trained on a huge dataset of downloaded images. Experimental evaluation shows that such a detector can provide operational false alarms as small as 10(-4), while still correctly classifying 90% of stego images. Furthermore, it is shown that this performance is directly applicable to other image datasets. As a side product, we indicate that the attack is not applicable to images developed with a specific JPEG compressor based on the trunc quantization function.
引用
收藏
页码:59 / 66
页数:8
相关论文
共 50 条
  • [31] Attack Detection and Mitigation Scheme of Load Frequency Control Systems Against False Data Injection Attacks
    Zhao, Xin
    Ma, Zhongjing
    Shi, Xingyu
    Zou, Suli
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (08) : 9952 - 9962
  • [32] Analysis of False CSI Attack by a Malicious User in OFDMA Networks
    Wang, Xiaowei
    Tao, Meixia
    Xu, Youyun
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2012), 2012,
  • [33] Vision-Based Construction Safety Monitoring Utilizing Temporal Analysis to Reduce False Alarms
    Zaidi, Syed Farhan Alam
    Yang, Jaehun
    Abbas, Muhammad Sibtain
    Hussain, Rahat
    Lee, Doyeop
    Park, Chansik
    BUILDINGS, 2024, 14 (06)
  • [34] Multidimensional Kernel Principal Component Analysis of False Alarms of Rapidly Intensifying Atlantic Tropical Cyclones
    Mercer, Andrew
    Grimes, Alexandria
    Wood, Kimberly
    CYBER PHYSICAL SYSTEMS AND DEEP LEARNING, 2018, 140 : 359 - 366
  • [35] Receiver operating characteristic (ROC) analysis of false alarms in capnography(CO2 monitoring)
    Cabral, PT
    Feldman, J
    Bronke, J
    Enderle, J
    2005 IEEE 31ST ANNUAL NORTHEAST BIOENGINEERING CONFERENCE, 2005, : 250 - 251
  • [36] Reduction of Ventricular Tachycardia False Alarms Using Multivariate Statistical Process Control and Frequency Analysis
    Safari, Amirhossein
    Mohebbi, Maryam
    2018 25TH IRANIAN CONFERENCE ON BIOMEDICAL ENGINEERING AND 2018 3RD INTERNATIONAL IRANIAN CONFERENCE ON BIOMEDICAL ENGINEERING (ICBME), 2018, : 251 - 256
  • [37] On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies
    Wong, Ann Yi
    Chekole, Eyasu Getahun
    Ochoa, Martin
    Zhou, Jianying
    COMPUTERS & SECURITY, 2023, 128
  • [38] Integrated Situational Awareness for Cyber Attack Detection, Analysis, and Mitigation
    Cheng, Yi
    Sagduyu, Yalin
    Deng, Julia
    Li, Jason
    Liu, Peng
    SENSORS AND SYSTEMS FOR SPACE APPLICATIONS V, 2012, 8385
  • [39] Bucketing and information flow analysis for provable timing attack mitigation
    Terauchi, Tachio
    Antonopoulos, Timos
    JOURNAL OF COMPUTER SECURITY, 2020, 28 (06) : 607 - 634
  • [40] Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation
    Iavich, Maksim
    Kuchukhidze, Tamari
    CRYPTOGRAPHY, 2024, 8 (02)