Steganalysis of YASS

@article{Li2008SteganalysisOY,
  title={Steganalysis of YASS},
  author={Bin Li and Yun Q. Shi and Jiwu Huang},
  journal={IEEE Transactions on Information Forensics and Security},
  year={2008},
  volume={4},
  pages={369-382}
}
In this paper, we describe a method for attacking Yet Another Steganographic Scheme (YASS), which is designed to be a very secure JPEG steganographic algorithm. The success of YASS is attributed to its innovation in embedding, i.e., hiding data in embedding host blocks whose locations are randomized. However, we find that the locations of the embedding host blocks are not randomized enough. Some locations in an image are possible to hold an entire embedding host block and some locations are… CONTINUE READING