Abstract
Westfeld [1] analyzed a sequential LSB embedding steganography effectively through the χ 2–statistical test which measures the frequencies of PoVs(pairs of values). Fridrich [2] also proposed another statistical analysis, so-called RS steganalysis by which the embedding message rate can be estimated. This method is based on the partition of pixels as three groups ; Regular, Singular, Unusable groups. In this paper, we propose a new steganographic scheme which preserves the above two statistics. The proposed scheme embeds the secret message in the innocent image by randomly adding one to real pixel value or subtracting one from it, then adjusts the statistical measures to equal those of the original image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and gray-scale image. Magazine of IEEE Multimedia, 22–28 (2001)
Simmons, G.J.: The Prisoner’s Problem and the Subliminal Channel. In: Advances in Cryptology, Proceedings of CRYPTO 1983, pp. 51–67. Plenum Press, New York (1984)
Maurer, U.: A universal statistical test for random bit generators. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 409–426. Springer, Heidelberg (1991)
Provos, N.: Defending Against Statistical Steganalysis. In: Proceedings of the 10th USENIX Security Symposium, pp. 323–335 (2001)
Westfeld, A.: F5–A Steganographic Algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yu, J.J., Han, J.W., Lee, K.S., O, S.C., Lee, S., Park, I.H. (2004). A Secure Steganographic Scheme against Statistical Analyses. In: Kalker, T., Cox, I., Ro, Y.M. (eds) Digital Watermarking. IWDW 2003. Lecture Notes in Computer Science, vol 2939. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24624-4_40
Download citation
DOI: https://doi.org/10.1007/978-3-540-24624-4_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21061-0
Online ISBN: 978-3-540-24624-4
eBook Packages: Springer Book Archive