Abstract
MSLB replacement steganography has attracted researchers’ attentions. However, existing steganalysis methods for MLSB replacement steganography have been just designed under the assumption that the embedding ratios in all stego bit planes are equal. Therefore, when the messages are embedded into different bit planes with different lengths independently, a new, principled method is introduced to estimate the embedding ratio in each stego bit plane based on a sample pair model. The new method estimates the embedding ratio in each bit plane in sequence according to the priority of each bit plane’s significance. A series of experiments show that the presented steganalysis method has significantly smaller bias than applying SPA method, a typical steganalysis for LSB steganography, to estimate the embedding ratio in each bit plane directly.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Fridrich, J., Goljan, M., Du, R.: Reliable Detection of LSB Steganography in Color and Grayscale Images. In: Proc. ACM Workshop Multimedia Security, on Ottawa, Canada, October 2001, pp. 27–30 (2001)
Zhang, T., Ping, X.: A New Approach to Reliable Detection of LSB Steganography in Natural Images. Signal Processing 83(8), 2085–2093 (2003)
Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB Steganography via Sample Pair Analysis. IEEE Transactions on Signal Processing 51(7), 1995–2007 (2003)
Ker, A.: Improved Detection of LSB Steganography in Grayscale Images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 97–115. Springer, Heidelberg (2004)
Lu, P., Luo, X., Tang, Q., Shen, L.: An Improved Sample Pairs Method for Detection of LSB Embedding. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 116–127. Springer, Heidelberg (2004)
Ker, A., Lubenko, I.: Feature Reduction and Payload Location with WAM Steganalysis. In: Delp III, E.J., Wong, J. (eds.) Proc. SPIE, Security, Forensics, Steganography and Watermarking of Multimedia Contents XI, vol. 7254, 0A (2009)
Ker, A.: A General Framework for the Structural Steganalysis of LSB Replacement. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 296–311. Springer, Heidelberg (2005)
Ker, A.: Fourth-Order Structural Steganalysis and Analysis of Cover Assumptions. In: Delp III, E.J., Wong, P.W. (eds.) Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 25–38 (2006)
Dumitrescu, S., Wu, X.: A New Framework of LSB Steganalysis of Digital Media. IEEE Transactions on Signal Processing 53(10), 3936–3947 (2005)
Fridrich, J., Goljan, M.: On Estimation of Secret Message Length in LSB Steganography in Spatial Domain. In: Delp III, E.J., Wong, P.W. (eds.) Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 23–34 (2004)
Ker, A., BÖhme, R.: Revisiting Weighted Stego-Image Steganalysis. In: Delp III, E.J., Wong, P.W., et al. (eds.) Proc. SPIE, Security, Forensics, Steganography and Watermarking of Multimedia Contents X, vol. 6819, p. 681905 (2008)
Ker, A.: Steganalysis of Embedding in Two Least-Significant Bits. IEEE Transactions on Information Forensics and Security 2(1), 46–54 (2007)
Wu, N., Hwang, M.: Data Hiding: Current Status and Key Issues. International Journal of Network Security 4(1), 1–9 (2007)
Nguyen, B., Yoon, S., Lee, H.: Multi Bit Plane Image Steganography. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 61–70. Springer, Heidelberg (2006)
Yu, X., Tan, T., Wang, Y.: Extended Optimization Method of LSB Steganalysis. In: Proc. IEEE International Conference on Image Processing, vol. 2, pp. 1102–1105 (2005)
Luo, X., Wang, Q., Yang, C., Liu, F.: Detection of LTSB Steganography Based on Quartic Equation. In: Proc. 8th International Conference on Advanced Communication Technology, on Phoenix Park, Korea, February 2006, pp. 20–22 (2006)
Luo, X., Yang, C., Wang, D., Liu, F.: LTSB Steganalysis Based on Quartic Equation. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security II. LNCS, vol. 4499, pp. 68–90. Springer, Heidelberg (2007)
Yu, X., Babaguchi, N.: A Fast and Effective Method to Detect Multiple Least Significant Bits Steganography. In: Proc. ACM Symposium on Applied Computing, Fortaleza, Cear, Brazil, March 2008, pp. 1443–1447 (2008)
Yang, C., Lin, F., Luo, X., Liu, B.: Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits. IEEE Transactions on Information Forensics and Security 3(4), 662–672 (2008)
Luo, X., Wang, D., Wang, P., Liu, F.: A Review on Blind Detection for Image Steganography. Signal Process. 88(9), 2138–2157 (2008)
Böhme, R., Ker, A.: A Two-Factor Error Model for Quantitative Steganalysis. In: Delp III, E.J., Wong, P.W. (eds.) Proc. SPIE, Security, Steganography and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 59–74 (2006)
Ker, A.: Derivation of Error Distribution in Least Squares Steganalysis. IEEE Transactions on Information Forensics and Security 2(2), 140–148 (2007)
Böhme, R.: Assessment of Steganalytic Methods Using Multiple Regression Models. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 278–295. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, C., Luo, X., Liu, F. (2009). Embedding Ratio Estimating for Each Bit Plane of Image. In: Katzenbeisser, S., Sadeghi, AR. (eds) Information Hiding. IH 2009. Lecture Notes in Computer Science, vol 5806. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04431-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-04431-1_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04430-4
Online ISBN: 978-3-642-04431-1
eBook Packages: Computer ScienceComputer Science (R0)