Detection of Js']Jsteg hiding using image statistical model

被引:0
|
作者
Wu, MQ [1 ]
Zhu, ZL
Jin, SY
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Peoples R China
[2] SW Inst Electron Telecom Tech, Key Lab, Chengdu 610040, Peoples R China
来源
CHINESE JOURNAL OF ELECTRONICS | 2006年 / 15卷 / 01期
关键词
steganalysis; steganography; !text type='Js']Js[!/text]teg; Laplacian;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Jsteg is an open steganography software on Internet. It uses the LSB of DCT coefficients to hide secret information in image. Chi-square attack can detect sequential Jsteg hiding but it can't detect the random Jsteg hiding. This paper presents a new, fast steganalytic method for detecting Jsteg hiding which is more convenient than the Chi-square attack. This method can detect both the sequential Jsteg hiding and the random Jsteg hiding by using the statistical model of image. The AC coefficients of image are divided into two parts and the distribution of the statistic of the two parts is fitted by Laplacian. The mean of Laplacian is 0 that is proved by Hypothesis testing. The Pearson chi(2) test is done to test goodness-of fit. Basing on this statistic mode, our method can detect Jsteg hiding with high accuracy. The amount of embedding message can be estimated using linear regression. We test our method on hundreds of images with different amount of embedding.
引用
收藏
页码:165 / 168
页数:4
相关论文
共 50 条
  • [31] Weighted statistical model for non-rigid image objects detection
    Hebei Univ of Technology, Tianjin, China
    Int Conf Signal Process Proc, (897-900):
  • [32] Face Presentation Attack Detection Based on a Statistical Model of Image Noise
    Hoai Phuong Nguyen
    Delahaies, Anges
    Retraint, Florent
    Morain-Nicolier, Frederic
    IEEE ACCESS, 2019, 7 : 175429 - 175442
  • [33] An image information hiding using adaptation and radix
    Tang, Mingwei
    Song, Wen
    Chen, Xiaoliang
    Hu, Jie
    OPTIK, 2015, 126 (23): : 4136 - 4141
  • [34] Data hiding method using image interpolation
    Jung, Ki-Hyun
    Yoo, Kee-Young
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 465 - 470
  • [35] Information hiding algorithm using BMP image
    Data Storage Lab., Huazhong University of Science and Technology, Wuhan 430074, China
    Wuhan Ligong Daxue Xuebao, 2006, 6 (96-98):
  • [36] AUDIO HIDING IN AN IMAGE USING STEGANOGRAPHIC METHODS
    Soundarya, J.
    Chander, Sharath P.
    Priyadharsini, R.
    Mirunalini, P.
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), 2018, : 82 - 87
  • [37] Hiding data in halftone image using modified data hiding error diffusion
    Fu, MS
    Au, OC
    VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2000, PTS 1-3, 2000, 4067 : 1671 - 1680
  • [38] Temporal Action Detection using a Statistical Language Model
    Richard, Alexander
    Gall, Juergen
    2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, : 3131 - 3140
  • [39] Image texture analysis using second order statistical model
    Hossain, Shahera
    Serikawa, Seiichi
    PROCEEDINGS OF THE SEVENTEENTH INTERNATIONAL SYMPOSIUM ON ARTIFICIAL LIFE AND ROBOTICS (AROB 17TH '12), 2012, : 918 - 921
  • [40] Segmentation of Medical Image using Region based Statistical Model
    Tak, Rishi
    Kumar, Nakul
    Satyaki
    Verma, Sparsh
    Dixit, Sunanda
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 1247 - 1253