{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:01:54Z","timestamp":1747224114129,"version":"3.40.5"},"reference-count":16,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10,1]]},"abstract":"<p>This paper presents a novel method of JPEG image Steganalysis, driven by the need for a quick and accurate identification of stego-carriers from a collection of files, where there is no knowledge of the steganography algorithm used, nor previous database of suspect carrier files created. The suspicious image is analyzed in order to identify the encoding algorithm while various meta-data is retrieved. An image file is then reconstructed in order to be used as a measure of comparison. A generalization of the basic principles of Benford\u2019s Law distribution is applied on both the suspicious and the reconstructed image file in order to decide whether the target is a stego-carrier. The authors demonstrate the effectiveness of the technique with a steganalytic tool that can blindly detect the use of JPHide\/JPseek\/JPHSWin, Camouflage and Invisible Secrets. Experimental results show that the steganalysis scheme is able to efficiently detect the use of different steganography algorithms without the use of a time consuming training step, even if the embedding data rate is very low. The accuracy of the detector is independent of the payload. The method described can be generalized in order to be used for the detection of different type images which act as stego-carriers.<\/p>","DOI":"10.4018\/jdcf.2011100103","type":"journal-article","created":{"date-parts":[[2012,1,13]],"date-time":"2012-01-13T16:38:20Z","timestamp":1326472700000},"page":"29-41","source":"Crossref","is-referenced-by-count":4,"title":["Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis"],"prefix":"10.4018","volume":"3","author":[{"given":"Alexandros","family":"Zaharis","sequence":"first","affiliation":[{"name":"University of Thessaly, Greece"}]},{"given":"Adamantini","family":"Martini","sequence":"additional","affiliation":[{"name":"SIEMENS SA, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4024-8003","authenticated-orcid":true,"given":"Theo","family":"Tryfonas","sequence":"additional","affiliation":[{"name":"University of Bristol, UK"}]},{"given":"Christos","family":"Ilioudis","sequence":"additional","affiliation":[{"name":"ATEI of Thessaloniki, Greece"}]},{"given":"G.","family":"Pangalos","sequence":"additional","affiliation":[{"name":"Aristotle University of Thessaloniki, Greece"}]}],"member":"2432","reference":[{"key":"jdcf.2011100103-0","unstructured":"Acebo, E. D., & Sbert, M. (2005). Benford\u2019s law for natural and synthetic images. In Proceedings of the First Workshop on Computational Aesthetics in Graphics, Visualization and Imaging, Girona, Spain (pp. 169-176)."},{"key":"jdcf.2011100103-1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668971"},{"key":"jdcf.2011100103-2","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.2.2.1-9"},{"key":"jdcf.2011100103-3","first-page":"551","article-title":"The law of anomalous numbers.","volume":"78","author":"F.Benford","year":"1938","journal-title":"Proceedings of the American Philosophical Society"},{"key":"jdcf.2011100103-4","doi-asserted-by":"publisher","DOI":"10.1088\/0143-0807\/14\/2\/003"},{"key":"jdcf.2011100103-5","first-page":"1","article-title":"Practical steganalysis of digital images \u2013 State of the art.","volume":"4675","author":"J.Fridrich","year":"2002","journal-title":"Proceedings of the Society for Photo-Instrumentation Engineers"},{"key":"jdcf.2011100103-6","unstructured":"Hass, C. (2010). JPEGSnoop: JPEG file decoding utility. Retrieved from http:\/\/www.impulseadventure.com\/photo\/jpeg-snoop.html"},{"key":"jdcf.2011100103-7","doi-asserted-by":"publisher","DOI":"10.1109\/83.817598"},{"key":"jdcf.2011100103-8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008363415314"},{"key":"jdcf.2011100103-9","unstructured":"Kessler, G. C. (2004). Null Ciphers: An Overview of Steganography for the Computer Forensics Examiner. FBI\u2019s Forensic Science Communications."},{"key":"jdcf.2011100103-10","unstructured":"Latham, A. (1999). Steganography: JPHIDE and JPSEEK. Retrieved from http:\/\/linux01.gwdg.de\/\u02dcalatham\/stego.html"},{"key":"jdcf.2011100103-11","first-page":"72","article-title":"A taxpayer compliance application of Benford\u2019s law.","volume":"1","author":"M.Nigrini","year":"1996","journal-title":"Journal of the American Taxation Association"},{"issue":"1-2","key":"jdcf.2011100103-12","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1023\/A:1008167430544","article-title":"Enhancement of JPEG-Compressed Images by Re-application of JPEG.","volume":"27","author":"A.Nosratinia","year":"2001","journal-title":"Journal of VLSI Signal Processing Systems For Signal Image and Video Technology"},{"key":"jdcf.2011100103-13","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Gonz\u00e1lez, F., Heileman, G., & Abdallah, C. T. (2007). Benford's law in image processing. In Proceedings of the IEEE International Conference on Image Processing, San Antonio, TX.","DOI":"10.1109\/ICIP.2007.4378977"},{"key":"jdcf.2011100103-14","unstructured":"Sallee, P. (2011). MATLAB JEPG toolbox. Retrieved from http:\/\/redwood.ucdavis.edu\/phil\/demos\/jpegtbx\/jpegtbx.htm"},{"key":"jdcf.2011100103-15","unstructured":"Sanchez, D. (2006). Lossless JPEG transcoding: ECE 533 Project Report. Retrieved from http:\/\/homepages.cae.wisc.edu\/~ece533\/project\/f06\/sanchez.pdf"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=62076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:16:50Z","timestamp":1654121810000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdcf.2011100103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2011,10,1]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,10]]}},"URL":"https:\/\/doi.org\/10.4018\/jdcf.2011100103","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"type":"print","value":"1941-6210"},{"type":"electronic","value":"1941-6229"}],"subject":[],"published":{"date-parts":[[2011,10,1]]}}}