Abstract:A stego-only extracting attack method is proposed based on a spatial domain feature. The discontinuity of JPEG image coding blocks in spatial domain is used to construct a time series. The problem of extracting attack is changed to the problem of estimating the change-points in time series. Then, a technique for order preference by similarity to ideal solution (TOPSIS) model is built to estimate the change-points. The model can be applied to not only sequential JSteg but also an improved sequential JSteg algorithm which resists to Chi-square test attack. The experimental result indicates that average error for estimating the message embedding start point and end point is about 260 coefficients.
[1] Wang Shuozhong,Zhang Xinpeng,Zhang Weiming.Recent Advances in Image-Based Steganalysis Research.Chinese Journal of Computers,2009,32(1): 1247-1263 (in Chinese) (王朔中,张新鹏,张卫明.以数字图像为载体的隐写分析研究进展.计算机学报,2009,32(1): 1247-1263) [2] Fridrich J,Goljan M,Soukal D.Searching for the Stego-Key // Proc of Security,Steganography and Watermarking of Multimedia Contents.San Jose,USA,2004: 70-82 [3] Chen Jiayong,Zhu Yuefei,Zhang Weiming,et al.Chosen-Key Extracting Attack to Random LSB Steganography.Journal on Commutations,2010,30(5): 73-80 (in Chinese) (陈嘉勇,祝跃飞,张卫明,等.对随机LSB隐写术的选择密钥提取攻击.通信学报,2010,30(5): 73-80) [4] Trivedi S,Chandramouli R.Secret Key Estimation in Sequential Steganography.IEEE Trans on Signal Processing,2005,53(2): 746-757 [5] Trivedi S,Chandramouli R.Active Steganalysis of Sequential Steganography // Proc of the International Society for Optical Engineering Conference.San Jose,USA,2003,5020(13): 123-130 [6] Zhang Liping,Zhang Hanling.An Active Steganalysis Algorithm.Journal of Harbin Institute of Technology,2006,38(Z): 768-772 (in Chinese) (张利平,张汗灵.一种主动隐写分析算法.哈尔滨工业大学学报,2006,38(Z): 768-772) [7] Wang Ping,Luo Xiangyang,Liu Fenlin.An Improved Secret Key Estimation Method for Sequential Steganography // Proc of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing.Pasadena,USA,2006: 396-402 [8] Luo Xiangyang,Wang Daoshun,Wang Ping,et al.Secret Key Estimation for Image Sequential Steganograph in Transform Domain // Proc of the IEEE Global Telecommunications Conference.Washington DC,USA,2007: 538-542 [9] Westfeld A,Pfitzmann A.Attacks on Steganographic Systems // Proc of the 3rd International Workshop on Information Hiding.London,UK,1999: 61-76 [10] Ma Ning,Zhang Weiming,Guan Wei,et al.Extracting Attack to Sequential Jsteg Stegosystems // Proc of the 10th Joint International Computer Conference.Kunming,China,2004: 277-281 [11] Uphan D.JPEG-JSteg-V4[EB/OL].[2009-03-11].http://www.funet.fi/pub/crypt/steganography/jpeg-JSteg-v4.diff.gz.2009 [12] You Tianhui,Fan Zhiping.TOPSIS Method for Multiple Attribute Decision Making with Intervals.Journal of Northeastern University: Natural Science,2002,23(9): 840-843 (in Chinese) (尤天慧,樊治平.区间数多指标决策的一种TOPSIS方法.东北大学学报(自然科学版),2002,23(9): 840-843) [13] Mao Shisong,Wang Jinglong,Pu Xiaolong.Senior Mathematical Statistics.Beijing: Higher Education Press,1998: 86-91 (in Chinese) (茆诗松,王静龙,濮晓龙.高等数理统计.北京:高等教育出版社,1998: 86-91) [14] Provos N.Defending against Statistical Steganalysis // Proc of the 10th Conference on USENIX Security Symposium.Washington DC,USA,2001: 323-335