all InfoSec news
Compatibility and Timing Attacks for JPEG Steganalysis. (arXiv:2306.01317v1 [cs.CR])
June 5, 2023, 1:10 a.m. | Etienne Levecque (CRIStAL), Patrick Bas (CRIStAL), Jan Butora (CRIStAL)
cs.CR updates on arXiv.org arxiv.org
This paper introduces a novel compatibility attack to detect a steganographic
message embedded in the DCT domain of a JPEG image at high-quality factors
(close to 100). Because the JPEG compression is not a surjective function, i.e.
not every DCT blocks can be mapped from a pixel block, embedding a message in
the DCT domain can create incompatible blocks. We propose a method to find such
a block, which directly proves that a block has been modified during the
embedding. …
attack attacks block compression detect domain embedded function high jpeg message novel pixel quality
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
DevSecOps Engineer
@ LinQuest | Beavercreek, Ohio, United States
Senior Developer, Vulnerability Collections (Contractor)
@ SecurityScorecard | Remote (Turkey or Latin America)
Cyber Security Intern 03416 NWSOL
@ North Wind Group | RICHLAND, WA
Senior Cybersecurity Process Engineer
@ Peraton | Fort Meade, MD, United States
Sr. Manager, Cybersecurity and Info Security
@ AESC | Smyrna, TN 37167, Smyrna, TN, US | Santa Clara, CA 95054, Santa Clara, CA, US | Florence, SC 29501, Florence, SC, US | Bowling Green, KY 42101, Bowling Green, KY, US