Compatibility and Timing Attacks for JPEG Steganalysis

06/02/2023
by   Etienne Levecque, et al.
0

This paper introduces a novel compatibility attack to detect a steganographic message embedded in the DCT domain of a JPEG image at high-quality factors (close to 100). Because the JPEG compression is not a surjective function, i.e. not every DCT blocks can be mapped from a pixel block, embedding a message in the DCT domain can create incompatible blocks. We propose a method to find such a block, which directly proves that a block has been modified during the embedding. This theoretical method provides many advantages such as being completely independent to Cover Source Mismatch, having good detection power, and perfect reliability since false alarms are impossible as soon as incompatible blocks are found. We show that finding an incompatible block is equivalent to proving the infeasibility of an Integer Linear Programming problem. However, solving such a problem requires considerable computational power and has not been reached for 8x8 blocks. Instead, a timing attack approach is presented to perform steganalysis without potentially any false alarms for large computing power.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/11/2021

An Image Forensic Technique Based on JPEG Ghosts

The unprecedented growth in the easy availability of photo-editing tools...
research
08/31/2020

Share Withholding Attack in Blockchain Mining: Technical Report

Cryptocurrency achieves distributed consensus using proof of work (PoW)....
research
02/18/2021

Embedding a Deterministic BFT Protocol in a Block DAG

This work formalizes the structure and protocols underlying recent distr...
research
12/06/2011

Meaningful Matches in Stereovision

This paper introduces a statistical method to decide whether two blocks ...
research
11/08/2021

Adaptive Steganography Based on bargain Game

The capacity and security of the confidential message on the channel are...
research
09/28/2022

Internet Outage Detection using Passive Analysis (Poster Abstract and Poster)

Outages from natural disasters, political events, software or hardware i...
research
10/08/2013

Smoothness-Constrained Image Recovery from Block-Based Random Projections

In this paper we address the problem of visual quality of images reconst...

Please sign up or login with your details

Forgot password? Click here to reset