Attack on JPEG2000 steganography using LRCA

Hwajong Oh, Kwangsoo Lee, Sangjin Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, using a new steganalytic method, namely the left-and-right cube analysis (LRCA), we explore the steganography exploiting the JPEG2000 image as the carrier medium, where the steganography works by substituting message bits for the least significant bits (LSBs) of the quantized wavelet coefficients. For the achievement of the LRCA implementation on JPEG2000 images, we establish an appropriate sampling rule to extract the sample vectors from the image data, i, e., the quantized wavelet coefficients, in the wavelet domain. In experiments, we used the LSB steganography and the bit-plane complexity segmentation (BPCS) steganography in order to generate the stego images. In results, the proposed method works well for both steganographic methods, and outperforms some other previous steganalytic methods,

Original languageEnglish
Title of host publicationDigital Watermarking - 5th International Workshop, IWDW 2006, Proceedings
PublisherSpringer Verlag
Pages268-281
Number of pages14
ISBN (Print)3540488251, 9783540488255
DOIs
Publication statusPublished - 2006
Event5th International Workshop on Digital Watermarking, IWDW 2006 - Jeju Island, Korea, Republic of
Duration: 2006 Nov 82006 Nov 10

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4283 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other5th International Workshop on Digital Watermarking, IWDW 2006
CountryKorea, Republic of
CityJeju Island
Period06/11/806/11/10

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Attack on JPEG2000 steganography using LRCA'. Together they form a unique fingerprint.

  • Cite this

    Oh, H., Lee, K., & Lee, S. (2006). Attack on JPEG2000 steganography using LRCA. In Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings (pp. 268-281). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4283 LNCS). Springer Verlag. https://doi.org/10.1007/11922841_22