Blind Steganalysis: Estimation of Hidden Message Length

Authors

  • Sanjay Kumar Jena National Institute of Technology Department ff Computer Science and Engineering Rourkela, Orissa India, 769008
  • G.V.V. Krishna National Institute of Technology Department ff Computer Science and Engineering Rourkela, Orissa India, 769008

Keywords:

Steganography, steganalysis, hidden message extraction

Abstract

Steganography is used to hide the occurrence of communication. Discovering and rendering useless such covert message is an art of steganalysis. The importance of techniques that can reliably detect the presence of secret messages in images is increasing as images can hide a large amount of malicious code that could be activated by a small Trojan horse type of virus and also for tracking criminal activities over Internet. This paper presents an improved blind steganalysis technique. The proposed algorithm reduces the initial-bias, and estimates the LSB embedding message ratios by constructing equations with the statistics of difference image histogram. Experimental results show that this algorithm is more accurate and reliable than the conventional difference image histogram method. It outperforms other powerful steganalysis approaches for embedded ratio greater than 40% and comparable with RS steganalysis technique for shorter hidden message length.

References

F.A.P.Petitcolas, R.J.Anderson and M.G.Kuhn, "Information Hiding-A Survey", Proceedings of the IEEE, vol.87(7), special issue on protection of multimedia content, June 1999, pp.1062-1018. http://dx.doi.org/10.1109/5.771065

N.F.Johnson and S.Jajodia, "Steganalysis of images created using current steganography software", Lecture Notes in Computer Science, vol.1525, Springer, Berlin, April 1998, pp.273-289.

N.F.Johnson, and S.Jajodia, "Exploring steganography: Seeing the unseen ", IEEE, Computer, February 1998, pp. 26-34.

R.Chandramouli and K.P.Subbalakshmi, "Current trends in steganalysis: a critical survey ", International Control, Automation, Robotics and Vision Conference 2004, Volume 2, December 2004, pp.964 - 967 http://dx.doi.org/10.1109/icarcv.2004.1468971

Neil F. Johnson and Sushil Jajodia, "Steganalysis: The Investigation of Hidden Information", IEEE Information Technology Conference, September 1998, pp.113-116. http://dx.doi.org/10.1109/it.1998.713394

J.Fridrich, M.Goljan and R.Du, "Detecting LSB Steganography in Color and Grayscale Images", IEEE, vol.8(4) Multimedia, October-December 2001, pp.22-28.

J. Fridrich, M. Goljan, R. Du, "Reliable detection of LSB Steganography in grayscale and color images", Proceeding of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, 2001, pp. 27-30. http://dx.doi.org/10.1145/1232454.1232466

A.Westfeld, A. Pittzmann, "Attacks on steganographic systems", Information hiding, Third International Workshop, IH'99, Dresden, Germany, 29 September-1 October, 1999. http://dx.doi.org/10.1007/10719724_5

J.Fridrich, R.Du and M.Long, "Steganalysis of Lsb Encoding in Color Images', In Proceedings of ICME 2000, July-August 2000. http://dx.doi.org/10.1109/icme.2000.871000

T.Zhang and X.Ping, "Reliable detection of LSB steganography based on the difference image histogram", IEEE International Conference on Acoustics, Speech, and Signal Processing, Volume 3, April 2003, pp.545-548. http://dx.doi.org/10.1109/icassp.2003.1199532

Li Zhi and Sui Ai Fen, "Detection of random LSB image steganography", Vehicular Technology Conference IEEE 60th , Vol.3, September 2004, pp.2113 - 2117.

A.Pinet, SecurEngine professional v1.0, 2004, http://securengine.isecu qrelabs.com.

CBIR image database, University of washington, available at http://www.cs.washington.edu/research/imagedatabse/groundtruth/.

The USC-SIPI image database, available at: http://sipi.usc.edu/ser vices/databse/Database.html

Published

2007-04-01

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.