Abstract
In recent years, several lossless data hiding techniques have been proposed for images. Lossless data embedding can take place in the spatial domain or in the transform domain. They utilized characteristics of the difference image or the transform coefficient histogram and modify these values slightly to embed the data. However, after embedding message bits these steganography changed the nature of the difference image histogram or the transform coefficient histogram gradually. In this paper, we introduce two new steganalytic techniques based on the difference image histogram and the transform coefficient histogram. The algorithm can not only detect existence of secret messages in images which are embedded by above methods reliably, but also estimate the amount of hidden messages exactly.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Honsinger, C., Jone, P., Rabbani, M., Stoffel, J.: Lossless recovery of an original image containing embedded data. US Patent: 6,278,791 B1 (2001)
Ni, Z., Shi, Y., Ansari, N., Su, W.: Reversible data hiding. In: Proc. ISCAS, pp. 912–915 (2003)
Lee, S.-K., Suh, Y.-H., Ho, Y.-S.: Lossless Data Hiding Based on Histogram Modification of Difference Images. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3333, pp. 340–347. Springer, Heidelberg (2004)
Xuan, G., Zhu, J., Chen, J., Shi, Y., Ni, Z., Su, W.: Distortionless data hiding based on integer wavelet transform. IEEE Electrionics Letters, 1646–1648 (2002)
Xuan, G., Yao, Q., Yang, C., Gao, J., Chai, P., Shi, Y.Q., Ni, Z.: Lossless Data Hidding Using Histogram Shifting Method Based on Integer Wavelets. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 323–332. Springer, Heidelberg (2006)
CBIR image database, University of Washington, http://www.cs.washington.edu/research/imagedatabase/groundtruth/
USC-SIPI Image Database, http://sipi.usc.edu/services/database/Database.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Thom, H.T.H., Van Canh, H., Tien, T.N. (2009). Steganalysis for Reversible Data Hiding. In: Ślęzak, D., Kim, Th., Zhang, Y., Ma, J., Chung, Ki. (eds) Database Theory and Application. DTA 2009. Communications in Computer and Information Science, vol 64. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10583-8_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-10583-8_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10582-1
Online ISBN: 978-3-642-10583-8
eBook Packages: Computer ScienceComputer Science (R0)