2008
DOI: 10.1109/tifs.2008.2002936
|View full text |Cite
|
Sign up to set email alerts
|

Multiclass Detector of Current Steganographic Methods for JPEG Format

Abstract: Abstract-The aim of this paper is to construct a practical forensic steganalysis tool for JPEG images that can properly analyze both single-and double-compressed stego images and classify them to selected current steganographic methods. Although some of the individual modules of the steganalyzer were previously published by the authors, they were never tested as a complete system. The fusion of the modules brings its own challenges and problems whose analysis and solution is one of the goals of this paper.By d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
55
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 77 publications
(55 citation statements)
references
References 31 publications
(72 reference statements)
0
55
0
Order By: Relevance
“…But for law enforcement it is probably necessary to demonstrate the content of a message by extracting it, in which case the first step is to determine the embedding algorithm. This problem, largely neglected, has been studied in [81] for JPEG images. The detection of different algorithms based on statistical properties will not be perfect, as methods with similar distortion functions and embedding changes are likely to be confused, but this has not been studied for recent adaptive embedding methods.…”
Section: Forensic Steganalysismentioning
confidence: 99%
“…But for law enforcement it is probably necessary to demonstrate the content of a message by extracting it, in which case the first step is to determine the embedding algorithm. This problem, largely neglected, has been studied in [81] for JPEG images. The detection of different algorithms based on statistical properties will not be perfect, as methods with similar distortion functions and embedding changes are likely to be confused, but this has not been studied for recent adaptive embedding methods.…”
Section: Forensic Steganalysismentioning
confidence: 99%
“…It should be noted that other approaches have been proposed for the detection of data hidden within DCT coefficients of JPEG images, to cite a few, the structural detection [23], the category attack [24], the WS detector [15] and the universal or blind detectors [25,26]. However, establishing the statistical properties of those detectors remains a difficult work which has not been studied yet.…”
Section: Contributions Of the Papermentioning
confidence: 99%
“…Then, the variance value d2 ij among the three adjacent pixels Pi 1, j, Pi, j 1 and Pi 1, j 1. can be computed by Eq. (8), and the base bi, j of P00 i; j can be derived by Eq. (9).…”
Section: The Data Extraction and Original Pixel Recovery Phasementioning
confidence: 99%
“…Meanwhile, the development of steganalytic tools are also started growing. Steganalysis is a process of finding the existence of a secret data in a cover media [8]. Whenever a suspicious image is received, the main task of a steganalytic tool is to find the algorithm used for hiding secret data in the image.…”
Section: Introductionmentioning
confidence: 99%