Abstract
This paper explores the statistics of least-significant bit (LSB) steganography. The problem of encoding a bit sequence (message) to match the statistics of a random bit-sequence (cover) is considered. A method of hiding information in the least significant bits (LSBs) of JPEG coefficients is described; the method mimics either the chi-square statistic of JPEG coefficients or their distribution. The method uses two-bit codes to encode the message bits. It is shown to be very effective on JPEG images of natural scenes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R.J., Petitcolas, F.: On the limits of steganography. IEEE Journal on Selected Areas in Communications 16, 474–481 (1998)
Böhme, R., Westfeld, A.: Exploiting preserved statistics for steganalysis. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 82–96. Springer, Heidelberg (2004)
Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)
Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340–354. Springer, Heidelberg (2003)
Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Proc. 6th Information Hiding Workshop, Toronto, Canada (2004)
Fridrich, J., Goljan, M., Du, R.: Detecting LSB Steganography in color and gray-scale images. IEEE Multimedia Magazine, 22–28 (October 2001)
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)
Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography with wet paper codes. In: Proc. ACM Multimedia Workshop, Magdeburg, Germany (2004)
Independent JPEG Group, http://www.ijg.org
Johnson, N., Jajodia, S.: Exploring steganography: Seeing the unseen. IEEE Computer 31, 26–34 (1998)
Johnson, N., Duric, Z., Jajodia, S.: Information Hiding: Steganography and Watermarking — Attacks and Countermeasures. Kluwer Academic Publishers, Boston (2000)
Johnson, N., Jajodia, S.: Steganalysis of images created using current steganography software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 273–289. Springer, Heidelberg (1998)
Katzenbeisser, S., Petitcolas, F.A.P.(eds.): Information Hiding: Techniques for Steganography and Digital Watermarking. Artech House, Norwood, (2000)
Joint Photographic Experts Group, http://www.jpeg.org/public/jpeghomepage.htm
Provos, N.: Defending against statistical steganalysis. In: Proc. 10th USENIX Security Symposium, pp. 323–325 (2001)
Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)
Upham, D.: Jsteg V4. available at: http://www.funet.fi/pub/crypt/steganography
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Proc. Information Hiding Workshop. LNCS, vol. 1768, pp. 61–75. Springer, New York (1999)
Westfeld, A.: F5-A steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Wayner, P.: Disappearing Cryptography, 2nd edn. Morgan Kaufmann, San Francisco (2002)
Westfeld, A.: Detecting low embedding rates. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 324–339. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Duric, Z., Richards, D., Kim, Y. (2005). Minimizing the Statistical Impact of LSB Steganography. In: Kamel, M., Campilho, A. (eds) Image Analysis and Recognition. ICIAR 2005. Lecture Notes in Computer Science, vol 3656. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11559573_142
Download citation
DOI: https://doi.org/10.1007/11559573_142
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29069-8
Online ISBN: 978-3-540-31938-2
eBook Packages: Computer ScienceComputer Science (R0)