Blind Steganalysis: Estimation of Hidden Message Length

  • Sanjay Kumar Jena National Institute of Technology Department ff Computer Science and Engineering Rourkela, Orissa India, 769008
  • G.V.V. Krishna National Institute of Technology Department ff Computer Science and Engineering Rourkela, Orissa India, 769008

Abstract

Steganography is used to hide the occurrence of communication. Discovering and rendering useless such covert message is an art of steganalysis. The importance of techniques that can reliably detect the presence of secret messages in images is increasing as images can hide a large amount of malicious code that could be activated by a small Trojan horse type of virus and also for tracking criminal activities over Internet. This paper presents an improved blind steganalysis technique. The proposed algorithm reduces the initial-bias, and estimates the LSB embedding message ratios by constructing equations with the statistics of difference image histogram. Experimental results show that this algorithm is more accurate and reliable than the conventional difference image histogram method. It outperforms other powerful steganalysis approaches for embedded ratio greater than 40% and comparable with RS steganalysis technique for shorter hidden message length.

References

[1] F.A.P.Petitcolas, R.J.Anderson and M.G.Kuhn, "Information Hiding-A Survey", Proceedings of the IEEE, vol.87(7), special issue on protection of multimedia content, June 1999, pp.1062-1018.
http://dx.doi.org/10.1109/5.771065

[2] N.F.Johnson and S.Jajodia, "Steganalysis of images created using current steganography software", Lecture Notes in Computer Science, vol.1525, Springer, Berlin, April 1998, pp.273-289.

[3] N.F.Johnson, and S.Jajodia, "Exploring steganography: Seeing the unseen ", IEEE, Computer, February 1998, pp. 26-34.

[4] R.Chandramouli and K.P.Subbalakshmi, "Current trends in steganalysis: a critical survey ", International Control, Automation, Robotics and Vision Conference 2004, Volume 2, December 2004, pp.964 - 967
http://dx.doi.org/10.1109/icarcv.2004.1468971

[5] Neil F. Johnson and Sushil Jajodia, "Steganalysis: The Investigation of Hidden Information", IEEE Information Technology Conference, September 1998, pp.113-116.
http://dx.doi.org/10.1109/it.1998.713394

[6] J.Fridrich, M.Goljan and R.Du, "Detecting LSB Steganography in Color and Grayscale Images", IEEE, vol.8(4) Multimedia, October-December 2001, pp.22-28.

[7] J. Fridrich, M. Goljan, R. Du, "Reliable detection of LSB Steganography in grayscale and color images", Proceeding of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, 2001, pp. 27-30.
http://dx.doi.org/10.1145/1232454.1232466

[8] A.Westfeld, A. Pittzmann, "Attacks on steganographic systems", Information hiding, Third International Workshop, IH'99, Dresden, Germany, 29 September-1 October, 1999.
http://dx.doi.org/10.1007/10719724_5

[9] J.Fridrich, R.Du and M.Long, "Steganalysis of Lsb Encoding in Color Images', In Proceedings of ICME 2000, July-August 2000.
http://dx.doi.org/10.1109/icme.2000.871000

[10] T.Zhang and X.Ping, "Reliable detection of LSB steganography based on the difference image histogram", IEEE International Conference on Acoustics, Speech, and Signal Processing, Volume 3, April 2003, pp.545-548.
http://dx.doi.org/10.1109/icassp.2003.1199532

[11] Li Zhi and Sui Ai Fen, "Detection of random LSB image steganography", Vehicular Technology Conference IEEE 60th , Vol.3, September 2004, pp.2113 - 2117.

[12] A.Pinet, SecurEngine professional v1.0, 2004, http://securengine.isecu qrelabs.com.

[13] CBIR image database, University of washington, available at http://www.cs.washington.edu/research/imagedatabse/groundtruth/.

[14] The USC-SIPI image database, available at: http://sipi.usc.edu/ser vices/databse/Database.html
Published
2007-04-01
How to Cite
JENA, Sanjay Kumar; KRISHNA, G.V.V.. Blind Steganalysis: Estimation of Hidden Message Length. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, [S.l.], v. 2, n. 2, p. 149-158, apr. 2007. ISSN 1841-9844. Available at: <http://univagora.ro/jour/index.php/ijccc/article/view/2348>. Date accessed: 24 nov. 2020. doi: https://doi.org/10.15837/ijccc.2012.2.2348.

Keywords

Steganography, steganalysis, hidden message extraction