{"title":"Content-independent steganography and steganalysis of JPEG images","authors":"Mohammad Rezaei, M. Salahshoor","doi":"10.1109/JCSSE.2018.8457337","DOIUrl":null,"url":null,"abstract":"This paper studies the possibilities of hiding data within a JPEG file without making any changes to the image content, and in a way that any JPEG decoder normally opens the file. These possibilities are found by careful studying the JPEG file format. A steganalysis system needs to check these simple embedding techniques before complicated analyses of DCT coefficients. We also present a number of system attacks on JPEG files, which can lead to detection of hidden data. The attacks are based on the fingerprints left in the stego file by JPEG encoders, or the steganography algorithm itself.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JCSSE.2018.8457337","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper studies the possibilities of hiding data within a JPEG file without making any changes to the image content, and in a way that any JPEG decoder normally opens the file. These possibilities are found by careful studying the JPEG file format. A steganalysis system needs to check these simple embedding techniques before complicated analyses of DCT coefficients. We also present a number of system attacks on JPEG files, which can lead to detection of hidden data. The attacks are based on the fingerprints left in the stego file by JPEG encoders, or the steganography algorithm itself.