INFORMATION THEORETIC EFFECTS OF JPEG COMPRESSION ON IMAGE STEGANOGRAPHY

I.S. Moskowitz, F. Ahmed, and P.A. Lafferty

References

  1. [1] D. Upham, JPEG-Jsteg-v4, .
  2. [2] A. Westfeld, F5 – A steganographic algorithm, in I.S. Moskowitz (Ed.), Information hiding, 4th international workshop, LNCS 2137 (Pittsburgh, PA, USA: Springer-Verlag, 2001), 289–302.
  3. [3] R.E. Newman, I.S. Moskowitz, L.W. Chang, & M.M. Brahmadesam, A steganographic embedding undetectable by JPEG compatibility steganalysis, in F.A.P. Petitcolas (Ed.), Information hiding, 5th international workshop, LNCS 2578 (The Netherland: Springer-Verlag, 2002), 259–277. (Springer is in Berlin)
  4. [4] R.E. Newman, I.S. Moskowitz, & M. Kumar, J2: Refinement of a topological image steganographic method, Proc. CNIS, Acta Press, Berkeley, CA, 2007.
  5. [5] T. Pevný & J. Fridrich, Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images, Proc. SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Vol. 6819, San Jose, CA, USA, 2008, 681911.1-681911.13.
  6. [6] T. Pevný & J. Fridrich, Multiclass blind steganalysis for JPEG images, Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, Vol. 6072, San Jose, CA, USA, 2006, 001–0013.
  7. [7] J. Fridrich, T. Pevný, & J. Kodovský, Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities, Proc. of the 9th Workshop on Multimedia and Security, Dallas, TX, USA, 2007, 3–14.
  8. [8] J.J. Eggers, R. Bäuml, & B. Girod, A communications approach to image steganography, Proc. of SPIE Vol. 4675 Security and Watermarking of Multimedia Contents IV, San Jose, CA, USA, 2002, 26–37.
  9. [9] P. Moulin & J.A. O’Sullivan, Information-theoretic analysis of information hiding, IEEE Transactions on Information Theory, 49 (3), 2003, 563–593.
  10. [10] I.S. Moskowitz, P.A. Lafferty, & F. Ahmed, A method forremoving steganographic payloads from images, Proc. IEEE SMC IAW, West Point, NY, 2007.
  11. [11] P.A. Lafferty, Obfuscation and the steganographic active warden model, Ph.D. Thesis, Department of Electrical Engineering and Computer Science, The Catholic University of America, Washington, DC, 2008.
  12. [12] C.E. Shannon, A mathematical theory of communication, Bell Systems Technical Journal, 27, 1948, 379–423, 623–656.
  13. [13] I.S. Moskowitz, P.A. Lafferty, & F. Ahmed, On LSB domain steganography and channel capacity, NRL Memorandum Report NRL/MR/5540–08-9118, 21 March 2008.
  14. [14] G.A. Francia III & T.S. Gomez, Steganography obliterator: An attack on the least significant bits, Proc. InfoSecCD Conference06, Kennesaw, GA, 2006, 85–91.
  15. [15] N.F. Johnson & S. Jajodia, Exploring steganography: Seeing the unseen, IEEE Computer, 31 (2), 1998, 26–34.
  16. [16] A. Whitehead, Towards eliminating steganographic communication, Proc. 3rd Annual Conference on Privacy, Security, and Trust, St. Andrews, New Brunswick, Canada, 2005.
  17. [17] D.L. Currie III & C.E. Irvine, Surmounting the effects of lossy compression on steganography, Proc. 19th National Information Systems Security Conference, Baltimore, MD, 1996.
  18. [18] D.L. Currie III & H. Campbell, Implementation and efficiency of steganographic techniques in bitmapped images and embedded data survivability against lossy compression schemes, Master’s Thesis, Naval Postgraduate School, 1996.
  19. [19] X.B. Liang, On a conjecture of Majani and Rumsey, Proc. ISIT 2004, Chicago, IL, 2004, 62.
  20. [20] C. Kurak & J. McHugh, A cautionary note on image down-grading, Proc. IEEE Eighth Annual Computer Security Applications Conference, IEEE, 1992, San Antonio, Texas, 153–159.
  21. [21] I.S. Moskowitz, L.W. Chang, & R.E. Newman, Capacity is the wrong paradigm, NSPW ’02: Proceedings of the 2002 Workshop on New Security Paradigms, ACM Press, New York, NY, USA, 2002, 114–126.
  22. [22] J. Bradley, xv, http://www.trilon.com/xv/.
  23. [23] R.B. Ash, Information theory (NY, USA: Dover, 1990).
  24. [24] P. Moulin & M.K. Mihçak, A framework for evaluating the data-hiding capacity of image sources, IEEE Transactions on Image Processing, 11 (9), 2002, 1029–1042.
  25. [25] P. Moulin & R. Koetter, Data-hiding codes, Proceedings of the IEEE, 93 (12), 2005, 2083–2126.
  26. [26] M.H.M. Costa, Writing on dirty paper, IEEE Transactions on Information Theory, 29, 1983, 439–441.
  27. [27] T.M. Cover & J.A. Thomas, Elements of information theory (NY, USA: Wiley Interscience, 1991).

Important Links:

Go Back