Has F5 Really Been Broken?
Briffa, JA, Schaathun, HG and Wahab, AWA (2009) Has F5 Really Been Broken? In: 3rd International Conference on Crime Detection and Prevention (ICDP 2009), 2009-12-03 - 2009-12-03, London.
icdp2009-proceedings.pdf - Accepted Version
The publicly-available F5 software (F5Software) implementation takes a possibly compressed cover image, decompresses it if necessary, and embeds the hidden message during a second compression process. This procedure introduces a risk that the stego image goes through ‘double compression’. While this is not a problem from the embedding and extraction point of view, any steganalysis process trained on such a scheme will potentially detect artifacts caused either by the embedding process or the second compression process. In this paper we review published steganalysis techniques on F5. By re-implementing an isolated F5 embedding algorithm excluding the decompression and recompression process (F5Py), we show that published steganalysis techniques are unable to defeat F5 when its ideal operational condition is not violated. In other words, published techniques most likely detected the compression artifacts rather than the embedding process when the message size is not exceeding the optimum F5 capacity. This is an important fact that has been ignored before. Furthermore, we look for the optimum embedding rate for F5 in order for it to take advantage of matrix encoding for better embedding efficiency. From here we found that the low embedding rate considered for F5 in the previous works are actually relatively high for it. This is also important since bigger message size might degrade F5 to F4. In addition, we also verify that, as expected, steganalysis performance depends on the message size.
|Item Type:||Conference or Workshop Item (UNSPECIFIED)|
|Divisions :||Faculty of Engineering and Physical Sciences > Computing Science|
|Date :||December 2009|
|Identification Number :||10.1049/ic.2009.0245|
|Additional Information :||This paper is a postprint of a paper submitted to and accepted for publication in Intern. Conf. on Imaging for Crime Detection and Prevention (ICDP) and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at IET Digital Library|
|Depositing User :||Symplectic Elements|
|Date Deposited :||08 Dec 2011 12:10|
|Last Modified :||23 Sep 2013 18:50|
Actions (login required)
Downloads per month over past year