Share Email Print
cover

Proceedings Paper

New methodology for breaking steganographic techniques for JPEGs
Author(s): Jessica Fridrich; Miroslav Goljan; Dorin Hogea
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

In this paper, we present general methodology for developing attacks on steganographic systems for the JPEG image format. The detection first starts by decompressing the JPEG stego image, geometrically distorting it (e.g., by cropping), and recompressing. Because the geometrical distortion breaks the quantized structure of DCT coefficients during recompression, the distorted/recompressed image will have many macroscopic statistics approximately equal to those of the cover image. We choose such macroscopic statistic S that also predictably changes with the embedded message length. By doing so, we estimate the unknown message length by comparing the values of S for the stego image and the cropped/recompressed stego image. The details of this detection methodology are explained on the F5 algorithm and OutGuess. The accuracy of the message length estimate is demonstrated on test images for both algorithms. Finally, we identify two limitations of the proposed approach and show how they can be overcome to obtain accurate detection in every case. The paper is closed with outlining a condition that must be satisfied by all secure high-capacity steganographic algorithms for JPEGs.

Paper Details

Date Published: 20 June 2003
PDF: 13 pages
Proc. SPIE 5020, Security and Watermarking of Multimedia Contents V, (20 June 2003); doi: 10.1117/12.473142
Show Author Affiliations
Jessica Fridrich, SUNY/Binghamton (United States)
Miroslav Goljan, SUNY/Binghamton (United States)
Dorin Hogea, SUNY/Binghamton (United States)


Published in SPIE Proceedings Vol. 5020:
Security and Watermarking of Multimedia Contents V
Edward J. Delp; Ping Wah Wong, Editor(s)

© SPIE. Terms of Use
Back to Top