【24h】

New methodology for breaking steganographic techniques for JPEGs

机译:打破JPEG的隐秘技术的新方法

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we present general methodology for developing attacks on steganographic systems for the JPEG image format. The detection first starts by decompressing the JPEG stego image, geometrically distorting it (e.g., by cropping), and recompressing. Because the geometrical distortion breaks the quantized structure of DCT coefficients during recompression, the distorted/recompressed image will have many macroscopic statistics approximately equal to those of the cover image. We choose such macroscopic statistic S that also predictably changes with the embedded message length. By doing so, we estimate the unknown message length by comparing the values of S for the stego image and the cropped/recompressed stego image. The details of this detection methodology are explained on the F5 algorithm and OutGuess. The accuracy of the message length estimate is demonstrated on test images for both algorithms. Finally, we identify two limitations of the proposed approach and show how they can be overcome to obtain accurate detection in every case. The paper is closed with outlining a condition that must be satisfied by all secure high-capacity steganographic algorithms for JPEGs.
机译:在本文中,我们介绍了开发针对JPEG图像格式的隐写系统攻击的通用方法。首先通过解压缩JPEG隐身图像,使其几何变形(例如,通过裁剪)并重新压缩来开始检测。因为几何失真在重新压缩期间破坏了DCT系数的量化结构,所以失真/重新压缩的图像将具有许多宏观统计量,这些宏观统计量近似等于封面图像的宏观统计量。我们选择这样的宏观统计量S,该统计量S也可预测地随嵌入消息的长度而变化。通过这样做,我们通过比较隐身图像和裁剪/重新压缩的隐身图像的S值来估计未知消息的长度。此检测方法的详细信息在F5算法和OutGuess中进行了说明。两种算法在测试图像上都证明了消息长度估计的准确性。最后,我们确定了所提出方法的两个局限性,并说明了在每种情况下如何克服它们以获得准确的检测。本文以概述所有JPEG的安全大容量隐写算法必须满足的条件为结尾。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号