F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis

F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis

2001 | Andreas Westfeld
F5 is a steganographic algorithm that maintains high capacity despite being resistant to visual and statistical attacks. Unlike other steganographic systems that are vulnerable to such attacks, F5 uses matrix encoding to improve embedding efficiency, reducing the number of necessary changes. It also employs permutative straddling to spread changes uniformly across the steganogram. Steganographic algorithms hide messages within carrier media, making it difficult for attackers to detect the hidden information. Visual attacks rely on the carrier medium's characteristics that steganographic algorithms overwrite. Adaptive techniques, which align the embedding rate with the carrier content, can prevent visual attacks but reduce the proportion of steganographic information. Lossy compressed media like JPEG and MP3 are inherently adaptive and resistant to visual and auditory attacks. Jsteg embeds messages in lossy compressed JPEG files and has a high capacity (e.g., 12% of the steganogram's size) and is immune to visual attacks. However, it is vulnerable to statistical attacks. MP3Stego and IVS-Stego are resistant to auditory and visual attacks, respectively, but have a very low embedding rate, making them vulnerable to statistical attacks. These tools offer only a small capacity for steganographic messages (less than 1% of the steganogram's size). The JPEG file interchange format stores image data in lossy compressed form as quantized frequency coefficients. The JPEG compressor divides the image into 8x8 pixel blocks, applies the discrete cosine transformation (DCT), and quantizes the frequency coefficients. The histogram of the quantized coefficients shows that the frequency of occurrence decreases with increasing absolute value, and the rate of decrease slows as the absolute value increases. These properties are not preserved after Jsteg embedding.F5 is a steganographic algorithm that maintains high capacity despite being resistant to visual and statistical attacks. Unlike other steganographic systems that are vulnerable to such attacks, F5 uses matrix encoding to improve embedding efficiency, reducing the number of necessary changes. It also employs permutative straddling to spread changes uniformly across the steganogram. Steganographic algorithms hide messages within carrier media, making it difficult for attackers to detect the hidden information. Visual attacks rely on the carrier medium's characteristics that steganographic algorithms overwrite. Adaptive techniques, which align the embedding rate with the carrier content, can prevent visual attacks but reduce the proportion of steganographic information. Lossy compressed media like JPEG and MP3 are inherently adaptive and resistant to visual and auditory attacks. Jsteg embeds messages in lossy compressed JPEG files and has a high capacity (e.g., 12% of the steganogram's size) and is immune to visual attacks. However, it is vulnerable to statistical attacks. MP3Stego and IVS-Stego are resistant to auditory and visual attacks, respectively, but have a very low embedding rate, making them vulnerable to statistical attacks. These tools offer only a small capacity for steganographic messages (less than 1% of the steganogram's size). The JPEG file interchange format stores image data in lossy compressed form as quantized frequency coefficients. The JPEG compressor divides the image into 8x8 pixel blocks, applies the discrete cosine transformation (DCT), and quantizes the frequency coefficients. The histogram of the quantized coefficients shows that the frequency of occurrence decreases with increasing absolute value, and the rate of decrease slows as the absolute value increases. These properties are not preserved after Jsteg embedding.
Reach us at info@study.space
[slides] F5-A Steganographic Algorithm | StudySpace