Nothing Special   »   [go: up one dir, main page]

skip to main content
article

LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis

Published: 01 April 2012 Publication History

Abstract

Statistical steganalysis schemes detect the existence of secret information embedded by steganography. The x^2-detection and Regular-Singular (RS)-attack methods are two well-known statistical steganalysis schemes used against LSB (least significant bit) steganography. The embedded message length can be estimated accurately by these two steganalysis schemes. For secret communication, the resistance of steganography against steganalysis is very important for information security. To avoid the enemy's attempts, the statistical features between stego-images and cover images should be as similar as possible for better resistance to steganalysis. In this manuscript, a reversible histogram transformation function-based LSB steganographic method is proposed to resist statistical steganalysis. The experimental results show that the proposed method resists not only RS-attack but also x^2-detection methods.

References

[1]
Chang, C.-C. and Kieu, T.D., A reversible data hiding scheme using complementary embedding strategy. Inform. Sci. v180 i16. 3045-3058.
[2]
Chang, C.-C., Tai, W.-L. and Lin, C.-C., A reversible data hiding scheme based on side match vector quantization. IEEE Trans. Circ. Syst. Video Technol. v16 i10. 1301-1308.
[3]
Dumitrescu, S., Wu, X. and Wang, Z., Detection of LSB steganography via sample pair analysis. IEEE Trans. Signal Process. v51 i7. 1995-2007.
[4]
J. Fridrich, M. Goljan, R. Du, Reliable detection of LSB steganography in color and grayscale images, in: Proceedings ACM Workshop Multimedia and Security, 2001, pp. 27-30.
[5]
A.A. Hanafy, G.I. Salama, Y.Z. Mohasseb, A secure covert communication model based on video steganography, in: Proceedings of the 2008 IEEE Military Communications Conference, 2008, pp. 1-6.
[6]
Ko, B.-S., Nishimura, R. and Suzuki, Y., Time-spread echo method for digital audio watermarking. IEEE Trans. Multimedia. v7 i2. 212-221.
[7]
B. Liu, F. Liu, C. Yang, Y. Sun, Secure steganography in compressed video bitstreams, in: Proceedings of the 3rd International Conference on Availability, Reliability and Security, 2008, pp. 1382-1387.
[8]
Liu, Q., Sung, A.H., Ribeiro, B., Wei, M., Chen, Z. and Xu, J., Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inform. Sci. v178 i1. 21-36.
[9]
Liu, T.-Y. and Tsai, W.-H., A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique. IEEE Trans. Inf. Forens. Security. v2 i1. 24-30.
[10]
X. Liu, Q. Zhang, C. Tang, J. Zhao, J. Liu, A steganographic algorithm for hiding data in PDF files based on equivalent transformation, in: Proceedings of the 2008 International Symposium on Information Processing (ISIP), 2008, pp. 417-421.
[11]
Y. Liu, X. Sun, C. Gan, H. Wang, An efficient linguistic steganography for Chinese text, in: Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007, pp. 2094-2097.
[12]
Lou, D.-C. and Liu, J.-L., Steganographic method for secure communications. Comput. Security. v21 i5. 449-460.
[13]
Lou, D.-C. and Sung, C.-H., A steganographic scheme for secure communications based on the chaos and Euler theorem. IEEE Trans. Multimedia. v6 i3. 501-509.
[14]
Lou, D.-C., Lin, C.-L. and Liu, C.-L., Novel steganalysis schemes for BPCS steganography. Imaging Sci. J. v56 i4. 232-242.
[15]
Luo, H., Yu, F.-X., Chen, H., Huang, Z.-L., Li, H. and Wang, P.-H., Reversible data hiding based on block median preservation. Inform. Sci. v181 i2. 308-328.
[16]
Luo, W., Huang, F. and Huang, J., Edge adaptive image steganography based on lsb matching revisited. IEEE Trans. Inf. Forens. Security. v5 i2. 201-214.
[17]
A.R.S. Marçal, P.R. Pereira, A steganographic method for digital images robust to RS steganalysis, in: International Conference on Image Analysis and Recognition, Toronto, Canada, Lecture Notes in Computer Science, vol. 3656, 2005, pp. 1192-1199.
[18]
Mielikainen, J., LSB Matching Revisited. IEEE Signal Process. Lett. v13 i5. 285-287.
[19]
Noda, H., Spaulding, J., Shirazi, M.N. and Kawaguchi, E., Application of bit-plane decomposition steganography to JPEG2000 encoded images. IEEE Signal Process. Lett. v9 i12. 410-413.
[20]
R. Petrovic, J.M. Winograd, K. Jemili, E. Metois, Data hiding within audio signals, in: Proceedings of the 4th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services, 1999, pp. 88-95.
[21]
N. Provos, Defending against statistical steganalysis, in: Proceedings of the 10th USENIX Security Symposium, Washington, DC, 2001, p. 24.
[22]
P. Shah, P. Choudhari, S. Sivaraman, Adaptive wavelet packet based audio steganography using data history, in: Proceedings of the 2008 IEEE Region 10 and the 3rd International Conference on Industrial and Information Systems, 2008, pp. 1-5.
[23]
Spaulding, J., Noda, H., Shirazi, M. and Kawaguchi, E., BPCS steganography using EZW lossy compressed image. Pattern Recognit. Lett. v23 i13. 1579-1587.
[24]
Wang, C.-M., -I Wu, N., Tsai, C.-S. and Hwang, M.-S., A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Softw. v81. 150-158.
[25]
Wang, S.-J., Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Comput. v164. 99-116.
[26]
B. Wang, J. Feng, A chaos-based steganography algorithm for H.264 standard video sequences, in: Proceedings of the 2008 International Conference Communications, Circuits and Systems, 2008, pp. 750-753.
[27]
A. Westfeld, A. Pfitzmann, Attacks on steganographic systems, in: Proceedings of the 3rd International Workshop on Information Hiding, Dresden, Germany, 1999, pp. 61-76.
[28]
Yang, C.-H., Wang, W.-J., Huang, C.-T. and Wang, S.-J., Reversible steganography based on side match and hit pattern for VQ-compressed images. Inform.sci. v181 i11. 2218-2230.
[29]
Zhang, T., Li, W., Zhang, Y., Zheng, E. and Ping, X., Steganalysis of LSB matching based on statistical modeling of pixel difference distributions. Inform. Sci. v180 i23. 4685-4694.
[30]
Zhong, S., Cheng, X. and Chen, T., Data hiding in a kind of pdf texts for secret communication. Int. J. Netw. Security. v4 i1. 17-26.
[31]
CBIR Image Database, University of Washington, October 2010. <http://www.cs.washington.edu/research/imagedatabase/>.
[32]
Uncompressed Colour Image Database (UCID), October 2010. <http://vision.cs.aston.ac.uk/datasets/UCID/ucid.html>.

Cited By

View all
  1. LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Information Sciences: an International Journal
    Information Sciences: an International Journal  Volume 188, Issue
    April, 2012
    359 pages

    Publisher

    Elsevier Science Inc.

    United States

    Publication History

    Published: 01 April 2012

    Author Tags

    1. Information hiding
    2. LSB substitution
    3. RS attack
    4. Steganalysis
    5. Steganography
    6. x2 detection

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 18 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Securing LSB embedding against structural steganalysisJournal of Computer Security10.3233/JCS-20012330:4(517-539)Online publication date: 1-Jan-2022
    • (2022)A comprehensive survey of covert communication techniques, limitations and future challengesComputers and Security10.1016/j.cose.2022.102784120:COnline publication date: 1-Sep-2022
    • (2021)Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive reviewMultimedia Systems10.1007/s00530-021-00763-z27:5(985-1024)Online publication date: 1-Oct-2021
    • (2019)A difference matching technique for data embedment based on absolute moment block truncation codingMultimedia Tools and Applications10.1007/s11042-018-6983-478:10(13987-14006)Online publication date: 1-May-2019
    • (2018)High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domainMultimedia Tools and Applications10.5555/3288443.328848677:23(31487-31516)Online publication date: 1-Dec-2018
    • (2018)High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domainMultimedia Tools and Applications10.1007/s11042-018-6213-077:23(31487-31516)Online publication date: 7-Jun-2018
    • (2018)An efficient multi-bit steganography algorithm in spatial domain with two-layer securityMultimedia Tools and Applications10.1007/s11042-018-5720-377:14(18451-18481)Online publication date: 1-Jul-2018
    • (2018)A secret transmission method via numeric data with a blind authentication capabilityMultimedia Tools and Applications10.1007/s11042-017-5231-777:13(16623-16659)Online publication date: 1-Jul-2018
    • (2017)Compressed and raw video steganography techniquesMultimedia Tools and Applications10.1007/s11042-016-4055-176:20(21749-21786)Online publication date: 1-Oct-2017
    • (2017)An efficient reversible data hiding method for AMBTC compressed imagesMultimedia Tools and Applications10.1007/s11042-016-4032-876:4(5441-5460)Online publication date: 1-Feb-2017
    • Show More Cited By

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media