The problem is generally handled with statistical analysis. A set of unmodified files of the same type, and ideally from the same source (for example, the same model of
digital camera, or if possible, the
same digital camera; digital audio from a
CD MP3 files have been "ripped" from; etc.) as the set being inspected, are analyzed for various statistics. Some of these are as simple as spectrum analysis, but since most image and audio files these days are compressed with
lossy compression algorithms, such as
JPEG and
MP3, they also attempt to look for inconsistencies in the way this data has been compressed. For example, a common artifact in JPEG compression is "
edge ringing", where high-frequency components (such as the high-
contrast edges of black text on a white background) distort neighboring pixels. This distortion is predictable, and simple steganographic encoding algorithms will produce artifacts that are detectably unlikely. One case where detection of suspect files is straightforward is when the original, unmodified carrier is available for
file comparison. Comparing the package against the original file will yield the differences caused by encoding the payload—and, thus, the payload can be extracted. == Advanced techniques ==