2020
DOI: 10.1186/s13640-020-00526-2
|View full text |Cite
|
Sign up to set email alerts
|

Stego key recovery method for F5 steganography with matrix encoding

Abstract: When embedding secret message into image by steganography with matrix encoding, there are still no effective methods to recover the stego key because it is difficult to statistically distinguish the stego coefficient sequences selected by true and false keys. Therefore, this paper proposes a method for recovering the stego key of a typical JPEG (Joint Photographic Experts Group) image steganography—F5 which composes of the check matrix and shuffling key. Firstly, the check matrix is recovered based on the embe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 39 publications
0
5
0
Order By: Relevance
“…F5 reduces the propagation of steganographic information through the carrier. The method described in [32] aims to get the check matrix and shuffling key of F5 steganography by guessing the embedding ratios and telling the difference between real and fake keys by looking at the bit sequence distributions. Notably, it may encounter challenges in accurately recovering keys at particularly high or low embedding ratios.…”
Section: Related Work On Image Steganographymentioning
confidence: 99%
“…F5 reduces the propagation of steganographic information through the carrier. The method described in [32] aims to get the check matrix and shuffling key of F5 steganography by guessing the embedding ratios and telling the difference between real and fake keys by looking at the bit sequence distributions. Notably, it may encounter challenges in accurately recovering keys at particularly high or low embedding ratios.…”
Section: Related Work On Image Steganographymentioning
confidence: 99%
“…Finally, the hypothesis testing theory was adopted to confirm the correctness of the embedding positions. Inspired by the work of Liu et al [44], series of steganalysis methods are proposed to recover the stego key towards LSBR, LSBM [38], F5 [41], and OutGuess [45]. Recently, towards adaptive steganography, [46] proposed a solution.…”
Section: Related Workmentioning
confidence: 99%
“…To our knowledge, most of steganographic algorithms focus on the first and second layer while ignoring the latter two layers of studies [33][34][35][36][37][38][39][40][41]. In practice, the ultimate goal of steganalysis is to reconstruct the hidden bits, namely, forensic steganalysis [42].…”
Section: Introductionmentioning
confidence: 99%
“…All factors are considered, such as secret message length or JPEG quality factors. Also, authors in [70] claim that there are no effective methods to recover the steganography key because it is difficult to statistically distinguish the coefficient sequences selected by true and false keys. Therefore, the author's paper proposes a method for recovering the steganography key of a JPEG image steganography.…”
Section: Breaking the Transform Domain Techniquesmentioning
confidence: 99%