Our raw-image database contains 5150 raw color images and they are never compressed. Due to the storage capacity limitation, we are currently not be able to provide our steganography and forgery images that were used in the following papers. To validate our algorithms or your detection methods, You may convert these raw images into JPEG images and build steganalysis and forgery databases for your purposes. We appreciate your interests and citations on our relevant work.
Never-compressed image database
The relevant papers:
Q. Liu, “Calibrated Neighboring joint density-based approach to steganalysis of JPEG images", under review.
Q. Liu (2011), “Steganalysis of DCT-embedding based adaptive steganography and YASS”, in Proc. ACM Workshop on Multimedia & Security, Buffalo, NY, September 29-30, 2011
Q. Liu (2011), “Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery”, in Proc. ACM Multimedia Workshop on Multimedia Forensics and Intelligence, Scottsdale, Arizona, USA, November 29, 2011
Q. Liu, A. H. Sung, M. Qiao (2011), "A Method to Detect JPEG-Based Double Compression". ISNN (2) 2011: 466-476.
Q. Liu , A. Sung, and M. Qiao (2011), “Neighboring joint density-based JPEG Steganalysis”, ACM Transactions on Intelligent Systems and Technology, 2(2), article 16:1-16.
Q. Liu , A. Sung, M. Qiao, Z. Chen and B. Ribeiro (2010), “An Improved Approach to Steganalysis of JPEG Images”, Information Sciences, 180(9):1643-1655.
Q. Liu , A. Sung, Z. Chen, J. Xu (2008), “Feature Mining and Pattern Classification for Steganalysis of LSB Matching Steganography in Grayscale Images”, Pattern Recognition, 41 (1): 56-66. doi: 10.1016/j.patcog.2007.06.005.
Note: We are not able to provide our audio database due to storage limitation, but some of our source codes will be available soon.