Abstract
In this paper, using a new steganalytic method, namely the left-and-right cube analysis (LRCA), we explore the steganography exploiting the JPEG2000 image as the carrier medium, where the steganography works by substituting message bits for the least significant bits (LSBs) of the quantized wavelet coefficients. For the achievement of the LRCA implementation on JPEG2000 images, we establish an appropriate sampling rule to extract the sample vectors from the image data, i.e., the quantized wavelet coefficients, in the wavelet domain. In experiments, we used the LSB steganography and the bit-plane complexity segmentation (BPCS) steganography in order to generate the stego images. In results, the proposed method works well for both steganographic methods, and outperforms some other previous steganalytic methods.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kawaguchi, E., Eason, R.O.: Principle and Appications of BPCS Steganography. In: Proceedings of SPIE, vol. 3528 (1998)
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Provos, N., Honeyman, P.: Detecting Steganographic Content on the Internet. CITI Technical Report 01–11 (2001)
Westfeld, A.: Detecting Low Embedding Rates. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 324–339. Springer, Heidelberg (2003)
Noda, H., Spaulding, J., Shirazi, M.N., Kawaguchi, E.: Application of Bit-Plane Decomposition Steganography to JPEG 2000 Encoded Images. IEEE Signal Processing Letters 9 (2002)
Lee, K., Jung, C., Lee, S.-J., Lim, J.-I.: New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography. In: Barni, M., Herrera-JoancomartÃ, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 312–326. Springer, Heidelberg (2005)
The JPEG-2000 Still Image Compression Standard, Michael Adams, ISO/IEC JTC 1/SC 29/WG 1N 2412 (2001)
Yu, X., Tan, T., Wang, Y.: Reliable Detection of BPCS-Steganography in Natural Images. In: Proceedings of Third International Conference on Image and Graphics, ICIG 2004, pp. 333–336 (2004)
CBIR Image Database, University of Washington, http://www.cs.washington.edu/research/imagedatabase/groundtruth
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Oh, H., Lee, K., Lee, S. (2006). Attack on JPEG2000 Steganography Using LRCA. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_22
Download citation
DOI: https://doi.org/10.1007/11922841_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48825-5
Online ISBN: 978-3-540-48827-9
eBook Packages: Computer ScienceComputer Science (R0)