Dr Panos Andriotis Panagiotis.Andriotis@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security
JPEG steganography detection with Benford's Law
Andriotis, Panagiotis; Oikonomou, George; Tryfonas, Theo
Authors
George Oikonomou
Theo Tryfonas
Abstract
In this paper we present a novel approach to the problem of steganography detection in JPEG images by applying a statistical attack. The method is based on the empirical Benford's Law and, more specifically, on its generalized form. We prove and extend the validity of the logarithmic rule in colour images and introduce a blind steganographic method which can flag a file as a suspicious stego-carrier. The proposed method achieves very high accuracy and speed and is based on the distributions of the first digits of the quantized Discrete Cosine Transform coefficients present in JPEGs. In order to validate and evaluate our algorithm, we developed steganographic tools which are able to analyse image files and we subsequently applied them on the popular Uncompressed Colour Image Database. Furthermore, we demonstrate that not only can our method detect steganography but, if certain criteria are met, it can also reveal which steganographic algorithm was used to embed data in a JPEG file. © 2013 Elsevier Ltd. All rights reserved.
Citation
Andriotis, P., Oikonomou, G., & Tryfonas, T. (2013). JPEG steganography detection with Benford's Law. Digital Investigation, 9(3-4), 246-257. https://doi.org/10.1016/j.diin.2013.01.005
Journal Article Type | Article |
---|---|
Acceptance Date | Feb 28, 2013 |
Publication Date | Jan 1, 2013 |
Journal | Digital Investigation |
Print ISSN | 1742-2876 |
Publisher | Elsevier |
Peer Reviewed | Peer Reviewed |
Volume | 9 |
Issue | 3-4 |
Pages | 246-257 |
DOI | https://doi.org/10.1016/j.diin.2013.01.005 |
Keywords | steganalysis, generalized Benford's Law, steganography detection, data hiding, quantized DCT coefficients |
Public URL | https://uwe-repository.worktribe.com/output/936595 |
Publisher URL | http://dx.doi.org/10.1016/j.diin.2013.01.005 |
You might also like
Bu-Dash: A universal and dynamic graphical password scheme
(2022)
Conference Proceeding
Feature vulnerability and robustness assessment against adversarial machine learning attacks
(2021)
Conference Proceeding
To allow, or deny? That is the question
(2020)
Conference Proceeding
Dataset: To Allow, or Deny? That is the Question
(2019)
Dataset
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search