Blind Steganalysis: Estimation of Hidden Message Length
Keywords:
Steganography, steganalysis, hidden message extractionAbstract
Steganography is used to hide the occurrence of communication. Discovering and rendering useless such covert message is an art of steganalysis. The importance of techniques that can reliably detect the presence of secret messages in images is increasing as images can hide a large amount of malicious code that could be activated by a small Trojan horse type of virus and also for tracking criminal activities over Internet. This paper presents an improved blind steganalysis technique. The proposed algorithm reduces the initial-bias, and estimates the LSB embedding message ratios by constructing equations with the statistics of difference image histogram. Experimental results show that this algorithm is more accurate and reliable than the conventional difference image histogram method. It outperforms other powerful steganalysis approaches for embedded ratio greater than 40% and comparable with RS steganalysis technique for shorter hidden message length.References
F.A.P.Petitcolas, R.J.Anderson and M.G.Kuhn, "Information Hiding-A Survey", Proceedings of the IEEE, vol.87(7), special issue on protection of multimedia content, June 1999, pp.1062-1018. http://dx.doi.org/10.1109/5.771065
N.F.Johnson and S.Jajodia, "Steganalysis of images created using current steganography software", Lecture Notes in Computer Science, vol.1525, Springer, Berlin, April 1998, pp.273-289.
N.F.Johnson, and S.Jajodia, "Exploring steganography: Seeing the unseen ", IEEE, Computer, February 1998, pp. 26-34.
R.Chandramouli and K.P.Subbalakshmi, "Current trends in steganalysis: a critical survey ", International Control, Automation, Robotics and Vision Conference 2004, Volume 2, December 2004, pp.964 - 967 http://dx.doi.org/10.1109/icarcv.2004.1468971
Neil F. Johnson and Sushil Jajodia, "Steganalysis: The Investigation of Hidden Information", IEEE Information Technology Conference, September 1998, pp.113-116. http://dx.doi.org/10.1109/it.1998.713394
J.Fridrich, M.Goljan and R.Du, "Detecting LSB Steganography in Color and Grayscale Images", IEEE, vol.8(4) Multimedia, October-December 2001, pp.22-28.
J. Fridrich, M. Goljan, R. Du, "Reliable detection of LSB Steganography in grayscale and color images", Proceeding of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, 2001, pp. 27-30. http://dx.doi.org/10.1145/1232454.1232466
A.Westfeld, A. Pittzmann, "Attacks on steganographic systems", Information hiding, Third International Workshop, IH'99, Dresden, Germany, 29 September-1 October, 1999. http://dx.doi.org/10.1007/10719724_5
J.Fridrich, R.Du and M.Long, "Steganalysis of Lsb Encoding in Color Images', In Proceedings of ICME 2000, July-August 2000. http://dx.doi.org/10.1109/icme.2000.871000
T.Zhang and X.Ping, "Reliable detection of LSB steganography based on the difference image histogram", IEEE International Conference on Acoustics, Speech, and Signal Processing, Volume 3, April 2003, pp.545-548. http://dx.doi.org/10.1109/icassp.2003.1199532
Li Zhi and Sui Ai Fen, "Detection of random LSB image steganography", Vehicular Technology Conference IEEE 60th , Vol.3, September 2004, pp.2113 - 2117.
A.Pinet, SecurEngine professional v1.0, 2004, http://securengine.isecu qrelabs.com.
CBIR image database, University of washington, available at http://www.cs.washington.edu/research/imagedatabse/groundtruth/.
The USC-SIPI image database, available at: http://sipi.usc.edu/ser vices/databse/Database.html
Published
Issue
Section
License
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.