University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Has F5 Really Been Broken?

Briffa, JA, Schaathun, H and Wahab, AWA (2009) Has F5 Really Been Broken? In: 3rd International Conference on Crime Detection and Prevention (ICDP 2009), 2009-12-03 - 2009-12-03, London.

icdp2009-proceedings.pdf - Accepted version Manuscript

Download (188kB)


The publicly-available F5 software (F5Software) implementation takes a possibly compressed cover image, decompresses it if necessary, and embeds the hidden message during a second compression process. This procedure introduces a risk that the stego image goes through ‘double compression’. While this is not a problem from the embedding and extraction point of view, any steganalysis process trained on such a scheme will potentially detect artifacts caused either by the embedding process or the second compression process. In this paper we review published steganalysis techniques on F5. By re-implementing an isolated F5 embedding algorithm excluding the decompression and recompression process (F5Py), we show that published steganalysis techniques are unable to defeat F5 when its ideal operational condition is not violated. In other words, published techniques most likely detected the compression artifacts rather than the embedding process when the message size is not exceeding the optimum F5 capacity. This is an important fact that has been ignored before. Furthermore, we look for the optimum embedding rate for F5 in order for it to take advantage of matrix encoding for better embedding efficiency. From here we found that the low embedding rate considered for F5 in the previous works are actually relatively high for it. This is also important since bigger message size might degrade F5 to F4. In addition, we also verify that, as expected, steganalysis performance depends on the message size.

Item Type: Conference or Workshop Item (Conference Paper)
Divisions : Faculty of Engineering and Physical Sciences > Computing Science
Authors :
Briffa, JA
Schaathun, H
Wahab, AWA
Date : December 2009
DOI : 10.1049/ic.2009.0245
Copyright Disclaimer : This paper is a postprint of a paper submitted to and accepted for publication in Intern. Conf. on Imaging for Crime Detection and Prevention (ICDP) and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at IET Digital Library
Contributors :
Depositing User : Symplectic Elements
Date Deposited : 08 Dec 2011 12:10
Last Modified : 11 Jul 2017 16:45

Actions (login required)

View Item View Item


Downloads per month over past year

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800