Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Finding Incompatible Blocks for Reliable JPEG Steganalysis (2402.13660v2)

Published 21 Feb 2024 in cs.CR

Abstract: This article presents a refined notion of incompatible JPEG images for a quality factor of 100. It can be used to detect the presence of steganographic schemes embedding in DCT coefficients. We show that, within the JPEG pipeline, the combination of the DCT transform with the quantization function can map several distinct blocks in the pixel domain to the same block in the DCT domain. However, not every DCT block can be obtained: we call those blocks incompatible. In particular, incompatibility can happen when DCT coefficients are manually modified to embed a message. We show that the problem of distinguishing compatible blocks from incompatible ones is an inverse problem with or without solution and we propose two different methods to solve it. The first one is heuristic-based, fast to find a solution if it exists. The second is formulated as an Integer Linear Programming problem and can detect incompatible blocks only for a specific DCT transform in a reasonable amount of time. We show that the probability for a block to become incompatible only relies on the number of modifications. Finally, using the heuristic algorithm we can derive a Likelihood Ratio Test depending on the number of compatible blocks per image to perform steganalysis. We simulate the result of this test and show that it outperforms a deep learning detector e-SRNet for every payload between 0.001 and 0.01 bpp by using only 10% of the blocks from 256x256 images. A Selection-Channel-Aware version of the test is even more powerful and outperforms e-SRNet while using only 1% of the blocks.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (20)
  1. Photo forensics from rounding artifacts. In Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security, pages 103–114, 2020.
  2. Know your library: How the libjpeg version influences compression and decompression results. Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security, 2022.
  3. Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 14(5):1181–1193, 2019.
  4. Fighting the reverse JPEG compatibility attack: Pick your side.
  5. Analysis and mitigation of the false alarms of the reverse jpeg compatibility attack. In Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec ’23, page 59–66, New York, NY, USA, 2023. Association for Computing Machinery.
  6. Reverse jpeg compatibility attack. IEEE Transactions on Information Forensics and Security, 15:1444–1454, 2019.
  7. The ALASKA steganalysis challenge: A first step towards steganalysis. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec’19, pages 125–137. Association for Computing Machinery.
  8. Selection-channel-aware rich model for steganalysis of digital images.
  9. Steganalysis based on jpeg compatibility. In Multimedia Systems and Applications IV, volume 4518, pages 275–280. SPIE, 2001.
  10. Using statistical image model for jpeg steganography: Uniform embedding revisited. IEEE Transactions on Information Forensics and Security, 10(12):2669–2680, 2015.
  11. A formal basis for the heuristic determination of minimum cost paths. 4(2):100–107. Conference Name: IEEE Transactions on Systems Science and Cybernetics.
  12. Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security, 2014(1):1–13, 2014.
  13. IJG. libjpeg. https://libjpeg.sourceforge.net/, 1990.
  14. Synthesis of color filter array pattern in digital images. In Media forensics and security, volume 7254, pages 191–204. SPIE, 2009.
  15. Quantitative structural steganalysis of jsteg. IEEE Transactions on Information Forensics and Security, 5(4):681–693, 2010.
  16. Compatibility and Timing Attacks for JPEG Steganalysis. In Workshop on Information Hiding and Multimedia Security, Chicago, United States, June 2023. ACM.
  17. JPEG: Still image data compression standard.
  18. Causes and effects of unanticipated numerical deviations in neural network inference frameworks. In Thirty-seventh Conference on Neural Information Processing Systems, 2023.
  19. Set-membership identification of resampled signals. In 2013 IEEE International Workshop on Information Forensics and Security (WIFS), pages 150–155. IEEE, 2013.
  20. Attacks on steganographic systems: Breaking the steganographic utilities ezstego, jsteg, steganos, and s-tools-and some lessons learned. In International workshop on information hiding, pages 61–76. Springer, 1999.
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (3)
  1. Etienne Levecque (3 papers)
  2. Jan Butora (6 papers)
  3. Patrick Bas (15 papers)
Citations (1)

Summary

We haven't generated a summary for this paper yet.