2002
DOI: 10.1007/3-540-36415-3_20
|View full text |Cite
|
Sign up to set email alerts
|

Steganalysis of JPEG Images: Breaking the F5 Algorithm

Abstract: Abstract. In this paper, we present a steganalytic method that can reliably detect messages (and estimate their size) hidden in JPEG images using the steganographic algorithm F5. The key element of the method is estimation of the cover-image histogram from the stego-image. This is done by decompressing the stego-image, cropping it by four pixels in both directions to remove the quantization in the frequency domain, and recompressing it using the same quality factor as the stego-image. The number of relative ch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
167
0
2

Year Published

2005
2005
2013
2013

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 242 publications
(169 citation statements)
references
References 13 publications
0
167
0
2
Order By: Relevance
“…Unfortunately, F5 did not survive attacks for too long. Fridrich et al [33] proposed steganalysis that does detect F5 contents, disrupting F5's survival.…”
Section: Fig 17mentioning
confidence: 99%
“…Unfortunately, F5 did not survive attacks for too long. Fridrich et al [33] proposed steganalysis that does detect F5 contents, disrupting F5's survival.…”
Section: Fig 17mentioning
confidence: 99%
“…Such correlations will also occur in the stego signal. Often, such correlations can be used to "denoise" the signal or to "calibrate" statistics [14,15], even in audio streams.…”
Section: Discussionmentioning
confidence: 99%
“…So Equation (7) is re-written as 3 However, there is an unsolved issue, i.e. how to decide whether a sampled speech contains hidden messages.…”
Section: Second Statistical Detection and Regression Analysismentioning
confidence: 99%