June 5, 2023, 1:10 a.m. | Etienne Levecque (CRIStAL), Patrick Bas (CRIStAL), Jan Butora (CRIStAL)

cs.CR updates on arXiv.org arxiv.org

This paper introduces a novel compatibility attack to detect a steganographic
message embedded in the DCT domain of a JPEG image at high-quality factors
(close to 100). Because the JPEG compression is not a surjective function, i.e.
not every DCT blocks can be mapped from a pixel block, embedding a message in
the DCT domain can create incompatible blocks. We propose a method to find such
a block, which directly proves that a block has been modified during the
embedding. …

attack attacks block compression detect domain embedded function high jpeg message novel pixel quality

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

DevSecOps Engineer

@ LinQuest | Beavercreek, Ohio, United States

Senior Developer, Vulnerability Collections (Contractor)

@ SecurityScorecard | Remote (Turkey or Latin America)

Cyber Security Intern 03416 NWSOL

@ North Wind Group | RICHLAND, WA

Senior Cybersecurity Process Engineer

@ Peraton | Fort Meade, MD, United States

Sr. Manager, Cybersecurity and Info Security

@ AESC | Smyrna, TN 37167, Smyrna, TN, US | Santa Clara, CA 95054, Santa Clara, CA, US | Florence, SC 29501, Florence, SC, US | Bowling Green, KY 42101, Bowling Green, KY, US