P. Andriotis, G. Oikonomou, T. Tryfonas

Abstract:
In this paper we present a novel approach to the problem of steganography detection in JPEG images by applying a statistical attack. The method is based on the empirical Benford's Law and, more specifically, on its generalised form. We prove and extend the validity of the logarithmic rule in colour images and introduce a blind steganographic method which can flag a file as a suspicious stego-carrier. The proposed method achieves very high accuracy and speed and is based on the distributions of the first digits of the quantised Discrete Cosine Transform coefficients present in JPEGs. In order to validate and evaluate our algorithm, we developed steganographic tools which are able to analyse image files and we subsequently applied them on the popular Uncompressed Colour Image Database. Furthermore, we demonstrate that not only can our method detect steganography but, if certain criteria are met, it can also reveal which steganographic algorithm was used to embed data in a JPEG file.
Reference:
P. Andriotis, G. Oikonomou, T. Tryfonas, "JPEG Steganography Detection with Benford's Law", Digital Investigation, Elsevier, 9(3-4), pp. 246-257, 2013
Bibtex Entry:
@ARTICLE{Andriotis-2013-1-di,
	author = {Panagiotis Andriotis and George Oikonomou and Theo Tryfonas},
	title = {JPEG Steganography Detection with Benford's Law},
	journal = {Digital Investigation},
	publisher = {Elsevier},
	year = {2013},
	month = {February},
	volume = {9},
	number = {3-4},
	pages = {246--257},
	doi = {10.1016/j.diin.2013.01.005},
	gsid = {8640025567589568682},
	url = {http://www.sciencedirect.com/science/article/pii/S1742287613000066},
	abstract = {In this paper we present a novel approach to the problem of steganography detection in JPEG images by applying a statistical attack. The method is based on the empirical Benford's Law and, more specifically, on its generalised form. We prove and extend the validity of the logarithmic rule in colour images and introduce a blind steganographic method which can flag a file as a suspicious stego-carrier. The proposed method achieves very high accuracy and speed and is based on the distributions of the first digits of the quantised Discrete Cosine Transform coefficients present in JPEGs. In order to validate and evaluate our algorithm, we developed steganographic tools which are able to analyse image files and we subsequently applied them on the popular Uncompressed Colour Image Database. Furthermore, we demonstrate that not only can our method detect steganography but, if certain criteria are met, it can also reveal which steganographic algorithm was used to embed data in a JPEG file.}
}

JPEG Steganography Detection with Benford's Law