Scientific and Technical Journal


ISSN Print 2221-3937
ISSN Online 2221-3805

The subject of this work done is digital steganography field, namely hidden messages detection in statical digital picturesproblem. In this paper probability of hidden messages detection using statistical features distribution of discrete cosine transform coefficients for two steganographic algorithms was checked.This data allow detecting JSTEG hidden messages and improving algorithm with image statistic features considering. For this purpose two novel parameters: imbalance of container`s paired discrete cosine transform coefficients and imbalance of container`s discrete cosine transform coefficients least significant bits were determined. As steganographic containers, JPEG images were considered. These parameters were measured for one thousand of empty containers samples and for equal quantity of containers with messages, hidden by JSTEG algorithm and by early proposed steganographic algorithm with container image statistics accounting. Based on the received results, imbalance of container`s paired discrete cosine transform coefficients was chosen as a measured parameter for embedded message detection. Also measured parameter threshold was chosen on condition, that probability of type I and type II errors is equal. With this parameter threshold value probability of type I and type II errors, probability of hidden messages detection and statistical significance of chosen parameter α was calculated.Based on the received results, only JSTEG hidden messages can be definitely detected by chosen parameter measurement. In considered publications, histogram detection of hidden messages was principally described, so this work can offer alternate different numerical parameter for JPEG steganalisys.

  1. Konahovich, G. F. and Puzyrenko, A. Ju.(2006). Computer steganography. Theory and practice [Komp'juternaja steganografija. Teorija i praktika], Kyiv: «МК-Press», 288p.
  2. Chang, Chin-Chen, Chen, Tung-Shou and Chung, Lou-Zo (2002). A steganographic method based upon JPEG and quantization table, Information Sciences, Vol.141 pp. 123–138.
  3. Sheisi, H., Mesgarian, J. and Rahmani, M.(2012), Steganography: DCT Coefficient Replacement Method and Compare With JSteg Algorithm, International Journal of Computer and Electrical Engineering, Vol. 4 № 4, pp. 458–462.
  4. Jaheel, Hamdan Lateef and Beiji, Zou (2015), A novel approach of combining steganography algorithms, International journal on smart sensing and intelligent systems, VOL. 8, №. 1              pp. 90−106.
  5. Siwei Lyu. Natural Image Statistics for Digital Image Forensics. (2003), a Thesis Submitted to the Faculty in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science, Hanover, USA, 102 pp.
  6. Weiwei, Quan, Yanqing, Guo and Xiangwei, Kong (2006), JPEG Quantization-Distribution Steganalytic Method Attacking Jsteg, IJCSNS International Journal of Computer Science and Network Security, Vol.6 No.7B, pp. 192−195.
  7. Fu, Dongdong, Shi, Yun Q., Zou, Dekun and Xuan, Guorong (2006), JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain, IEEE: 8th Workshop on Multimedia Signal Processing, pp. 673−676.
  8. Yu, Xiaoyi, Wang, Yunhong and Tan, Tieniu (2004), On Estimation of Secret Message Length in JSteg-like Steganography, Proceedings of the 17th International Conference on Pattern Recognition, pp. 673−676.
  1. Zhang, Tao and Ping, Xijian (2003), A Fast and Effective Steganalytic Technique against JSteg-like Algorithms, SAC '03 Proceedings of the 2003 ACM symposium on Applied computing,                pp. 307−311.

10. Hyvärinen, A., Hurri J. and Hoyer, P. O. (2009). Natural Image Statistics. Springer, 467 p.

  1. Chechelnytskyi, V., Kalashnikov, M., Iakovenko, O. and Kushnirenko, N. (2016), Container`s statistic features considering for steganographic algorithm [Urakhuvannya statystychnykh vlastyvostey konteyneru dlya stehanohrafichnoho alhorytmu], Electrotechnic and computer systems, № 23(99), pp. 83−87., (1991). Independent JPEG Group. [online] Available at: [Accessed 10 Apr. 2017].

  1., (2010). Knowledge portal [Portal znaniy]. [online] Available at: [Accessed 10 Apr. 2017].
Last download:
28 Aug 2018

[ © KarelWintersky ] [ All articles ] [ All authors ]
[ © Odessa National Polytechnic University, 2014-2018. Any use of information from the site is possible only under the condition that the source link! ]