Conditional Probability Based Steganalysis for JPEG Steganography

被引:9
|
作者
Wahab, Ainuddin Wahid [1 ]
Briffa, Johann A. [1 ]
Schaathun, Hans Georg [1 ]
Ho, Anthony T. S. [1 ]
机构
[1] Univ Surrey, Dept Comp, Surrey, England
关键词
D O I
10.1109/ICSPS.2009.71
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Inspired by works on the Markov process based steganalysis proposed in [13], we propose a new steganalysis technique based on the conditional probability statistics. Specifically we focus on its performance against the F5 software. In our experiment, we prove that the proposed technique works as well or better than the Markov process based technique in terms of classification accuracy on F5. Our main advantage is a much better computational efficiency. With different number of messages embedded, it can also be seen that the performance of steganalyis depends on the message size embedded. This paper includes the introduction to conditional probability features, how the experiment works, and the discussion of the results.
引用
收藏
页码:205 / 209
页数:5
相关论文
共 50 条
  • [1] STEGANALYSIS OF ADAPTIVE JPEG STEGANOGRAPHY BASED ON RESDET
    Huang, Xiaosa
    Wang, Shilin
    Sun, Tanfeng
    Liu, Gongshen
    Lin, Xiang
    [J]. 2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 549 - 553
  • [2] JPEG Steganography and Steganalysis - A Review
    Banerjee, Siddhartha
    Ghosh, Bibek Ranjan
    Roy, Pratik
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 175 - 187
  • [3] Quantitative steganalysis of JPEG additive steganography based on boundary effect
    Lu, Jicang
    Yang, Chunfang
    Liu, Fenlin
    Luo, Xiangyang
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2018, 27 (02)
  • [4] Quantized Gaussian JPEG Steganography and Pool Steganalysis
    Aloraini, Mohammed
    Sharifzadeh, Mehdi
    Schonfeld, Dan
    [J]. IEEE ACCESS, 2022, 10 : 38031 - 38044
  • [5] Steganalysis of JPEG steganography with complementary embedding strategy
    Huang, F.
    Luo, W.
    Huang, J.
    [J]. IET INFORMATION SECURITY, 2011, 5 (01) : 10 - 18
  • [6] Steganalysis of JPEG Image-Based Steganography with Support Vector Machine
    Watanabe, Satoshi
    Murakami, Kazuki
    Furukawa, Tomoya
    Zhao, Qiangfu
    [J]. 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 631 - 636
  • [7] JPEG based conditional entropy coding for correlated steganography
    Zheng, Lei
    Cox, Ingemar J.
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 1251 - 1254
  • [8] A Study on Improved JPEG Steganography Algorithm to Prevent Steganalysis
    Kim, Jun Tae
    Kim, Sangwon
    Kim, Keechoen
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 960 - 963
  • [9] AN EFFECTIVE STEGANALYSIS FOR ROBUST STEGANOGRAPHY WITH REPETITIVE JPEG COMPRESSION
    Feng, Jinliu
    Wang, Yaofei
    Chen, Kejiang
    Zhang, Weiming
    Yu, Nenghai
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 3084 - 3088
  • [10] Steganalysis Features for Content-Adaptive JPEG Steganography
    Denemark, Tomas
    Boroumand, Mehdi
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1747 - 1757