Attack on JPEG2000 Steganography Using LRCA

  • Hwajong Oh
  • Kwangsoo Lee
  • Sangjin Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4283)


In this paper, using a new steganalytic method, namely the left-and-right cube analysis (LRCA), we explore the steganography exploiting the JPEG2000 image as the carrier medium, where the steganography works by substituting message bits for the least significant bits (LSBs) of the quantized wavelet coefficients. For the achievement of the LRCA implementation on JPEG2000 images, we establish an appropriate sampling rule to extract the sample vectors from the image data, i.e., the quantized wavelet coefficients, in the wavelet domain. In experiments, we used the LSB steganography and the bit-plane complexity segmentation (BPCS) steganography in order to generate the stego images. In results, the proposed method works well for both steganographic methods, and outperforms some other previous steganalytic methods.


Secret Message Digital Medium Stego Image JPEG2000 Image Sample Vector 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kawaguchi, E., Eason, R.O.: Principle and Appications of BPCS Steganography. In: Proceedings of SPIE, vol. 3528 (1998)Google Scholar
  2. 2.
    Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  3. 3.
    Provos, N., Honeyman, P.: Detecting Steganographic Content on the Internet. CITI Technical Report 01–11 (2001)Google Scholar
  4. 4.
    Westfeld, A.: Detecting Low Embedding Rates. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 324–339. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    Noda, H., Spaulding, J., Shirazi, M.N., Kawaguchi, E.: Application of Bit-Plane Decomposition Steganography to JPEG 2000 Encoded Images. IEEE Signal Processing Letters 9 (2002)Google Scholar
  6. 6.
    Lee, K., Jung, C., Lee, S.-J., Lim, J.-I.: New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 312–326. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  7. 7.
    The JPEG-2000 Still Image Compression Standard, Michael Adams, ISO/IEC JTC 1/SC 29/WG 1N 2412 (2001)Google Scholar
  8. 8.
    Yu, X., Tan, T., Wang, Y.: Reliable Detection of BPCS-Steganography in Natural Images. In: Proceedings of Third International Conference on Image and Graphics, ICIG 2004, pp. 333–336 (2004)Google Scholar
  9. 9.
    CBIR Image Database, University of Washington,

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Hwajong Oh
    • 1
  • Kwangsoo Lee
    • 1
  • Sangjin Lee
    • 1
  1. 1.Center for Information Security Technologies (CIST)Korea UniversitySeoulKorea

Personalised recommendations