Introduction
No matter how unbreakable an encryption algorithm is, the encrypted messages will attract an adversary’s awareness. Steganography can resolve this difficulty by embedding secret data into an innocuous cover medium, such as image, video, text, audio, etc. The transmission of the innocuous medium will not arouse much suspicion. Therefore, whereas cryptography only protects the contents of the secret message, steganography conceals the very existence of secret information, making the secret communications imperceptible [6].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Steganos, http://www.steganos.com/steganos-home/
Stools, ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip
Alturki, F., Mersereau, R.: A novel approach for increasing security and data embedding capacity in images for data hiding applications. In: Information Technology: Coding and Computing, Las Vegas, NV, USA, pp. 228–233 (2001)
Böhme, R., Westfeld, A.: Breaking cauchy model-based JPEG steganography with first order statistics. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 125–140. Springer, Heidelberg (2004)
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM System Journal 35, 313–336 (1996)
Chandramouli, R., Kharrazi, M., Memon, N.: Image steganography and steganalysis concepts and practice. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 35–49. Springer, Heidelberg (2004)
Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001), Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm
Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47, 1423–1443 (2001)
Chen, C., Shi, Y.Q.: JPEG image steganalysis utilizing both intra-block and inter-block correlations. In: IEEE International Symposium on Circuits and Systems, Seattle, Washington, USA, pp. 3029–3032 (2008)
Chen, C., Shi, Y.Q., Chen, W., Xuan, G.: Statistical moments based universal steganalysis using JPEG 2-D array and 2-D characteristic function. In: IEEE International Comference on Image Processing, Atlanta, Georgia, USA (2006)
Chen, C., Shi, Y.Q., Xuan, G.: Steganalyzing texture images. In: IEEE International Conference on Image Processing, Texas, USA (2007)
Dumitrescu, S., Wu, X.L., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Transactions on Signal Processing 51, 1995–2007 (2003)
Farid, H.: Detecting hidden messages using higher-order statistical models. In: International Conference on Image Processing, Rochester, NY, USA (2002)
Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)
Fridrich, J.: Minimizing the embedding impact in steganography. In: 8th ACM workshop on Multimedia and Security, Geneva, Switzerland, pp. 2–10. ACM Press, New York (2006)
Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: Delp, E.J., Wong, P.W. (eds.) IS&T/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents VI, pp. 23–34. SPIE, San Jose (2004)
Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in color and grayscale images. In: ACM workshop on Multimedia and security: new challenges, Ottawa, Ontario, Canada, pp. 27–30. ACM Press, New York (2001)
Fridrich, J., Goljan, M., Hogea, D.: Attacking the outguess. In: ACM Workshop on Multimedia and Security 2002, Juan-les-Pins, France, pp. 3–6. ACM Press, New York (2002)
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: 5th Information Hiding Workshop, pp. 310–323 (2002)
Fridrich, J., Goljan, M., Soukal, D.: Wet paper codes with improved embedding efficiency. IEEE Transactions on Information Forensics and Security 1, 102–110 (2006)
Fridrich, J., Lisonek, P., Soukal, D.: On Steganographic Embedding Efficiency. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 282–296. Springer, Heidelberg (2007)
Fu, D., Shi, Y.Q., Zou, D., Xuan, G.: JPEG steganalysis using empirical transition matrix in block DCT domain. In: 2006 IEEE Workshop on Multimedia Signal Processing, Victoria, Canada, pp. 310–313 (2006)
Harmsen, J., Pearlman, W.: Steganalysis of Additive Noise Modelable Information Hiding. In: Delp, E.J., Wong, P.W. (eds.) IS&T/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents V, pp. 131–142. SPIE, San Jose (2003)
Huang, F., Shi, Y.Q., Huang, J.: A study on the security performance of YASS. In: IEEE Int. Conference on Image Processing, San Diego, California, USA (2008)
Huang, F., Li, B., Huang, J.: Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels. In: IEEE International Conference on Image Processing 2007, San Antonio, Texas, USA, pp. 401–404 (2007)
Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters 12, 441–444 (2005)
Ker, A.D.: A general framework for the structural steganalysis of LSB replacement. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 296–311. Springer, Heidelberg (2005)
Ker, A.D.: Fourth-order structural steganalysis and analysis of cover assumptions. In: Delp, E.J., Wong, P.W. (eds.) IS&T/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents VIII, pp. 60720301–60720314. SPIE, San Jose (2006)
Ker, A.D.: A weighted stego image detector for sequential LSB replacement. In: 3rd International Symposium on Information Assurance and Security, Manchester, United Kingdom, pp. 453–456 (2007)
Ker, A.D.: Locating steganographic payload via ws residuals. In: 10th ACM workshop on Multimedia and security, Oxford, United Kingdom, pp. 27–31. ACM Press, New York (2008)
Kim, Y., Duric, Z., Richards, D.: Modified matrix encoding for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314–327. Springer, Heidelberg (2007)
Kim, Y., Duric, Z., Richards, D.: Limited distortion in LSB steganography. In: Delp, E.J., Wong, P.W. (eds.) IS&T/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents VIII, 60720N01-60720N09, SPIE, San Jose (2006)
Li, B., Shi, Y.Q., Huang, J.: Steganalysis of YASS. In: Proceedings of the 10th ACM workshop on Multimedia and security. ACM, Oxford (2008)
Marvel, L.M., Boncelet Jr., C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Trans. Image Processing 8, 1075–1083 (1999)
Pevný, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Delp, E.J., Wong, P.W. (eds.) IS&T/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents IX, pp. 650503.03-650503.14. SPIE, San Jose (2007)
Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington, DC, USA, pp. 323–325 (2001)
Provos, N., Honeyman, P.: Detecting Steganographic content on the internet. University of Michigan, Ann Arbor (2001)
Provos, N., Honeyman, P.: Hide and Seek: An Introduction to steganography. IEEE Security & Privacy Magazine 1, 32–44 (2003)
Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I.J., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)
Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics 5, 167–189 (2005)
Sarkar, A., Nataraj, L., Manjunath, B.S., Madhow, U.: Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - A randomized block based hiding scheme. In: IEEE International Conference on Image Processing 2008, San Diego, California, USA, pp. 1292–1295 (2008)
Schaefer, G., Stich, M.: UCID - An uncompressed colour image database. School of Computing and Mathematics. Nottingham Trent University, UK (2003)
Sharp, T.: An implementation of key-based digital signal steganography. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 13–26. Springer, Heidelberg (2001)
Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)
Shi, Y.Q., Chen, C., Xuan, G., Su, W.: Steganalysis versus splicing detection. In: Shi, Y.Q., Kim, H.-J., Katzenbeisser, S. (eds.) IWDW 2007. LNCS, vol. 5041, pp. 158–172. Springer, Heidelberg (2008)
Shi, Y.Q., Xuan, G., Zou, D., Gao, J., Yang, C., Zhang, Z., Chai, P., Chen, W., Chen, C.: Steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. In: IEEE International Conference on Multimedia and Expo. 2005, Amsterdam, Netherlands, pp. 768–773 (2005)
Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16–31. Springer, Heidelberg (2008)
Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.S.: Steganalysis for Markov cover data with applications to images. IEEE Transactions on Information Forensics and Security 1, 275–287 (2006)
Upham D Jsteg, http://zooid.org/~paul/crypto/jsteg/
Wang, H.Q., Wang, S.Z.: Cyber warfare: Steganography vs. steganalysis. Communications of the ACM 47, 76–82 (2004)
Weinberger, M., Seroussi, G., Sapiro, G.: LOCOI: A low complexity context-based lossless image compression algorithm. In: IEEE International Comference on Data Compression, Snowbird, Utah, pp. 140–149 (1996)
Westfeld, A.: F5-A Steganographic algorithm: high capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems - Breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-Tools-and some lessons learned. In: Pfitzmann, A. (ed.) 3rd Information Hiding Workshop, Dresden, Germany. LNCS, pp. 61–76. Springer, Heidelberg (1999)
Woods, J., Stark, H.: Probability and Random Processes With Applications to Signal Processing, 3rd edn. Prentice-Hall, Upper Saddle River (2001)
Xuan, G., Gao, J., Shi, Y.Q., Zou, D.: Image Steganalysis Based on Statistical Moments of Wavelet Subband Histograms in DFT Domain. In: IEEE International Workshop on Multimedia Signal Processing, pp. 1–4 (2005)
Xuan, G., Shi, Y.Q., Gao, J., Zou, D., Yang, C., Zhang, Z., Chai, P., Chen, C.H., Chen, W.: Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 262–277. Springer, Heidelberg (2005)
Zou, D., Shi, Y.Q., Su, W., Xuan, G.: Steganalysis based on Markov model of thresholded prediction-error image. In: IEEE International Comference on Multimedia and Expo., Toronto, Ontario, Canada (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Huang, F., Li, B., Shi, Y.Q., Huang, J., Xuan, G. (2010). Image Steganalysis. In: Sencar, H.T., Velastin, S., Nikolaidis, N., Lian, S. (eds) Intelligent Multimedia Analysis for Security Applications. Studies in Computational Intelligence, vol 282. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11756-5_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-11756-5_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11754-1
Online ISBN: 978-3-642-11756-5
eBook Packages: EngineeringEngineering (R0)