Steganalysis of JPEG Images: An Improved Approach for Breaking the F5 Algorithm

被引:0
|
作者
Aboalsamh, Hatim A. [1 ]
Mathkour, Hassan I. [1 ]
Mursi, Mona F. M. [1 ]
Assassa, Ghazy M. R. [1 ]
机构
[1] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Sci, Riyadh 11451, Saudi Arabia
关键词
Steganalysis; Steganography; F5; algorithm; Discrete Cosine; Transforms DCT; Matrix encoding; JPEG images;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
People often transmit digital images over the internet and JPEG is one of the most common used formats. Steganography is the art and science of hiding communication; the information hiding process thus uses an image as a cover medium to embed a hidden message. Steganalysis is the inverse process of trying to identify the existence of hidden message in a cover image. In this paper, we present an enhancement to the steganalysis algorithm that successfully attacks F5 steganographic algorithm. The key idea is related to the selection of an "optimal" value of beta (the probability that a non-zero AC coefficient will be modified) for the image under consideration. Rather than averaging the values of P for 64 shifting steps worked on an image, an optimal P is determined that corresponds to the shift having minimal distance E from the double compression removal step. Numerical experiments were carried out to validate the proposed enhanced algorithm and compare it against the original one. Both algorithms were tested and compared using two sets of test images. The first set uses reference test data of 20 grayscale images [1], and the second uses 432 images created by manipulating 12 images for various image parameters: two sizes (300x400 and 150x2000), six JPEG old quality factors (50, 60, 70, 80, 90, 100), and 3 message lengths (0, 1kB, 2 kB). The results suggest that the original algorithm may be used as a classifier, since it shows a good detection performance of both clean and stego test images; whereas, the proposed enhanced algorithm may be used as an estimator for the true message length for those images that have been classified by original algorithm as stego images.
引用
收藏
页码:1011 / +
页数:2
相关论文
共 50 条
  • [1] Steganalysis of JPEG images: Breaking the F5 algorithm
    Fridrich, J
    Goljan, M
    Hogea, D
    [J]. INFORMATION HIDING, 2003, 2578 : 310 - 323
  • [2] An improved steganalysis approach for breaking the F5 algorithm
    Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia
    [J]. WSEAS Trans. Comput., 2008, 9 (1447-1456):
  • [3] An improved approach to steganalysis of JPEG images
    Liu, Qingzhong
    Sung, Andrew H.
    Qiao, Mengyu
    Chen, Zhongxue
    Ribeiro, Bernardete
    [J]. INFORMATION SCIENCES, 2010, 180 (09) : 1643 - 1655
  • [4] A steganalysis of information hiding for F5
    Tang, Mingwei
    Fan, Mingyu
    Song, Wen
    Du, Yajun
    [J]. Journal of Computational Information Systems, 2010, 6 (01): : 55 - 62
  • [5] A Study on Improved JPEG Steganography Algorithm to Prevent Steganalysis
    Kim, Jun Tae
    Kim, Sangwon
    Kim, Keechoen
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 960 - 963
  • [6] Blind steganalysis algorithm based new calibration for JPEG images
    Zhang, Minqing
    Zhang, Yan
    Li, Delong
    Luo, Peng
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2015, 42 (05): : 133 - 138
  • [7] On F5 Steganography in Images
    Luo, Xiangyang
    Liu, Fenlin
    Yang, Chunfang
    Lian, Shiguo
    Wang, Daoshun
    [J]. COMPUTER JOURNAL, 2012, 55 (04): : 447 - 456
  • [8] Termination of the F5 algorithm
    Galkin, V. V.
    [J]. PROGRAMMING AND COMPUTER SOFTWARE, 2014, 40 (02) : 47 - 57
  • [9] A Tropical F5 Algorithm
    Vaccon, Tristan
    Yokoyama, Kazuhiro
    [J]. PROCEEDINGS OF THE 2017 ACM INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND ALGEBRAIC COMPUTATION (ISSAC'17), 2017, : 429 - 436
  • [10] Termination of the F5 algorithm
    V. V. Galkin
    [J]. Programming and Computer Software, 2014, 40 : 47 - 57