Steganalysis attacks on stego-images using stego-signatures and statistical image properties

Research output: Contribution to conferencePaperpeer-review

11 Scopus citations

Abstract

This paper discusses a strategy for detecting hidden messages in stego-images in Internet traffic. The strategy adopts attacks that are based on both the signatures of the most popular steganographic techniques and some of the statistical parameters of the images being analyzed. A gradual approach for the attacks is applied since the speed with which detection is to be achieved is an important factor. An extensive set of images with different file format including JPEG, GIF and BMP, different cover and stego object sizes was processed and the results achieved indicate a high degree of success.

Original languageBritish English
PagesB104-B107
StatePublished - 2004
EventIEEE TENCON 2004 - 2004 IEEE Region 10 Conference: Analog and Digital Techniques in Electrical Engineering - Chiang Mai, Thailand
Duration: 21 Nov 200424 Nov 2004

Conference

ConferenceIEEE TENCON 2004 - 2004 IEEE Region 10 Conference: Analog and Digital Techniques in Electrical Engineering
Country/TerritoryThailand
CityChiang Mai
Period21/11/0424/11/04

Fingerprint

Dive into the research topics of 'Steganalysis attacks on stego-images using stego-signatures and statistical image properties'. Together they form a unique fingerprint.

Cite this