Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3335203.3335714acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article
Public Access

Effect of JPEG Quality on Steganographic Security

Published: 02 July 2019 Publication History
  • Get Citation Alerts
  • Abstract

    Abstract This work investigates both theoretically and experimentally the security of JPEG steganography as a function of the quality factor. For a fixed relative payload, modern embedding schemes, such as J-UNIWARD and UED-JC, exhibit surprising non-monotone trends due to rounding and clipping of quantization steps. Their security generally increases with increasing quality factor but starts decreasing for qualities above 95. In contrast, old-fashion steganography, such as Jsteg, OutGuess, and model-based steganography, exhibit complementary trends. The results of empirical detectors closely match the trends exhibited by the KL divergence computed between models of cover and stego DCT modes. In particular, our analysis shows that the main reason for the complementary trends is the way modern schemes attenuate embedding change rates with increasing spatial frequency. Our model also provides guidance on how to adjust the embedding algorithm J-UNIWARD to substantially improve its security for high quality factors.

    References

    [1]
    M. Boroumand, M. Chen, and J. Fridrich. Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 14(5):1181--1193, May 2019.
    [2]
    M. Chen, M. Boroumand, and J. Fridrich. Reference channels for steganalysis of images with convolutional neural networks. In R. Cogranne and L. Verdoliva, editors, The 7th ACM Workshop on Information Hiding and Multimedia Security, rmLecture Notes in Computer Science, Paris, France, 2019.
    [3]
    L. Guo, J. Ni, and Y.-Q. Shi. An efficient JPEG steganographic scheme using uniform embedding. In Fourth IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, December 2--5, 2012.
    [4]
    L. Guo, J. Ni, and Y. Q. Shi. Uniform embedding for efficient JPEG steganography. IEEE Transactions on Information Forensics and Security, 9(5):814--825, May 2014.
    [5]
    V. Holub and J. Fridrich. Challenging the doctrines of JPEG steganography. In A. Alattar, N. D. Memon, and C. Heitzenrater, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014, volume 9028, pages 02--1--02--7, San Francisco, CA, February 3--5, 2014.
    [6]
    V. Holub and J. Fridrich. Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Transactions on Information Forensics and Security, 10(2):219--228, February 2015.
    [7]
    V. Holub, J. Fridrich, and T. Denemark. Universal distortion design for steganography in an arbitrary domain. EURASIP Journal on Information Security, Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop, 2014:1, 2014.
    [8]
    J. Kodovský, J. Fridrich, and V. Holub. Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security, 7(2):432--444, April 2012.
    [9]
    S. Meignen and H. Meignen. On the modeling of DCT and subband image data for compression. IEEE Transactions on Image Processing, 4(2):186--193, February 1995.
    [10]
    N. Provos. Defending against statistical steganalysis. In 10th USENIX Security Symposium, pages 323--335, Washington, DC, August 13--17, 2001.
    [11]
    P. Sallee. Model-based methods for steganography and steganalysis. International Journal of Image Graphics, 5(1):167--190, 2005.
    [12]
    X. Song, F. Liu, C. Yang, X. Luo, and Y. Zhang. Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In P. Comesana, J. Fridrich, and A. Alattar, editors, The 3rd ACM IH&MMSec. Workshop, Portland, Oregon, June 17--19, 2015.
    [13]
    D. Upham. Steganographic algorithm JSteg. Software available at textrmhttp://zooid.org/ paul/crypto/jsteg.
    [14]
    G. Xu. Deep convolutional neural network to detect J-UNIWARD. In M. Stamm, M. Kirchner, and S. Voloshynovskiy, editors, The 5th ACM Workshop on Information Hiding and Multimedia Security, Philadelphia, PA, July 3--5, 2017.
    [15]
    J. Ye, J. Ni, and Y. Yi. Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security, 12(11):2545--2557, November 2017.
    [16]
    M. Yedroudj, F. Comby, and M. Chaumont. Yedroudj-net: An efficient CNN for spatial steganalysis. In IEEE ICASSP, pages 2092--2096, Alberta, Canada, April 15--20, 2018.
    [17]
    J. Zeng, S. Tan, B. Li, and J. Huang. Large-scale JPEG image steganalysis using hybrid deep-learning framework. IEEE Transactions on Information Forensics and Security, 13(5):1200--1214, 2018.

    Cited By

    View all

    Index Terms

    1. Effect of JPEG Quality on Steganographic Security

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IH&MMSec'19: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security
      July 2019
      249 pages
      ISBN:9781450368216
      DOI:10.1145/3335203
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 July 2019

      Permissions

      Request permissions for this article.

      Check for updates

      Badges

      • Best Paper

      Author Tags

      1. generalized gaussian
      2. jpeg
      3. quality factor
      4. steganalysis
      5. steganography

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      IH&MMSec '19
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 128 of 318 submissions, 40%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)48
      • Downloads (Last 6 weeks)4

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Toward Secure and Robust Steganography for Black-Box Generated ImagesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.336122019(3237-3250)Online publication date: 2024
      • (2024)Efficient JPEG image steganography using pairwise conditional random field modelSignal Processing10.1016/j.sigpro.2024.109493221:COnline publication date: 1-Aug-2024
      • (2022)Disordering DatasetsProceedings of the ACM on Human-Computer Interaction10.1145/35551416:CSCW2(1-33)Online publication date: 11-Nov-2022
      • (2022)There is No App for That: Manifestations of the Digital Divides During COVID-19 School Closures in IndiaProceedings of the ACM on Human-Computer Interaction10.1145/35551406:CSCW2(1-26)Online publication date: 11-Nov-2022
      • (2022)Behold the Once and Future Me: Online Identity After the End of a Romantic RelationshipProceedings of the ACM on Human-Computer Interaction10.1145/35550976:CSCW2(1-35)Online publication date: 11-Nov-2022
      • (2022)Working with Bounded Collaboration: A Qualitative Study on How Collaboration is Co-constructed around Collaborative Robots in IndustryProceedings of the ACM on Human-Computer Interaction10.1145/35550946:CSCW2(1-34)Online publication date: 11-Nov-2022
      • (2022)Involving Crowdworkers with Lived Experience in Content-Development for Push-Based Digital Mental Health Tools: Lessons Learned from Crowdsourcing Mental Health MessagesProceedings of the ACM on Human-Computer Interaction10.1145/35129466:CSCW1(1-30)Online publication date: 7-Apr-2022
      • (2022)Image DePO: Towards Gradual Decentralization of Online Social Networks using Decentralized Privacy OverlaysProceedings of the ACM on Human-Computer Interaction10.1145/35129076:CSCW1(1-28)Online publication date: 7-Apr-2022
      • (2022)Empathosphere: Promoting Constructive Communication in Ad-hoc Virtual Teams through Perspective-taking SpacesProceedings of the ACM on Human-Computer Interaction10.1145/35129026:CSCW1(1-26)Online publication date: 7-Apr-2022
      • (2022)Efficient Steganography in JPEG Images by Minimizing Performance of Optimal DetectorIEEE Transactions on Information Forensics and Security10.1109/TIFS.2021.311171317(1328-1343)Online publication date: 2022
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media