Benchmarking steganographic and steganalysis techniques

Mehdi Kharrazi, Husrev T. Sencar, Nasir Memon

Research output: Chapter in Book/Report/Conference proceedingConference contribution


There have been a number of steganography embedding techniques proposed over the past few years. In turn the development of these techniques have led to an increased interest in steganalysis techniques. More specifically Universal steganalysis techniques have become more attractive since they work independently of the embedding technique. In this work, our goal is to compare a number of universal steganalysis techniques proposed in the literature which include techniques based on binary similarity measures, wavelet coefficients' statistics, and DCT based image features. These universal steganalysis techniques are tested against a number of well know embedding techniques, including Outguess, 1 F5, 2 Model based, 3 and perturbed quantization. 4 Our experiments are done using a large dataset of JPEG images, obtained by randomly crawling a set of publicly available websites. The image dataset is categorized with respect to the size and quality. We benchmark embedding rate versus detectability performances of several widely used embedding as well as universal steganalysis techniques. Furthermore, we provide a framework for benchmarking future techniques.

Original languageEnglish (US)
Title of host publicationProceedings of SPIE - The International Society for Optical Engineering
EditorsE.J. Delp III, P.W. Wong
Number of pages12
StatePublished - 2005
EventProceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents VII - San Jose, CA, United States
Duration: Jan 17 2005Jan 20 2005


OtherProceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents VII
Country/TerritoryUnited States
CitySan Jose, CA

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Condensed Matter Physics


Dive into the research topics of 'Benchmarking steganographic and steganalysis techniques'. Together they form a unique fingerprint.

Cite this