scholarly journals JPEG Image Steganalysis Using Weight Allocation from Block Evaluation

2022 ◽  
Vol E105.D (1) ◽  
pp. 180-183
Author(s):  
Weiwei LUO ◽  
Wenpeng ZHOU ◽  
Jinglong FANG ◽  
Lingyan FAN
2018 ◽  
Vol 2018 (16) ◽  
pp. 1402-1406 ◽  
Author(s):  
Xiancheng Wu ◽  
Zilong Shao ◽  
Pei Ou ◽  
Shunquan Tan

Author(s):  
Anxin Wu ◽  
Guorui Feng ◽  
Xinpeng Zhang ◽  
Yanli Ren

2019 ◽  
Vol 16 (5) ◽  
pp. 4069-4081 ◽  
Author(s):  
Tao Zhang ◽  
◽  
Hao Zhang ◽  
Ran Wang ◽  
Yunda Wu ◽  
...  

2011 ◽  
Vol 3 (4) ◽  
pp. 29-41 ◽  
Author(s):  
Alexandros Zaharis ◽  
Adamantini Martini ◽  
Theo Tryfonas ◽  
Christos Ilioudis ◽  
G. Pangalos

This paper presents a novel method of JPEG image Steganalysis, driven by the need for a quick and accurate identification of stego-carriers from a collection of files, where there is no knowledge of the steganography algorithm used, nor previous database of suspect carrier files created. The suspicious image is analyzed in order to identify the encoding algorithm while various meta-data is retrieved. An image file is then reconstructed in order to be used as a measure of comparison. A generalization of the basic principles of Benford’s Law distribution is applied on both the suspicious and the reconstructed image file in order to decide whether the target is a stego-carrier. The authors demonstrate the effectiveness of the technique with a steganalytic tool that can blindly detect the use of JPHide/JPseek/JPHSWin, Camouflage and Invisible Secrets. Experimental results show that the steganalysis scheme is able to efficiently detect the use of different steganography algorithms without the use of a time consuming training step, even if the embedding data rate is very low. The accuracy of the detector is independent of the payload. The method described can be generalized in order to be used for the detection of different type images which act as stego-carriers.


Sign in / Sign up

Export Citation Format

Share Document