Skip to main content

Improving Hidden Message Extraction Using LSB Steganalysis Techniques

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 514))

Abstract

Increased awareness of the role of digital forensics in investigations has led to greater efforts being employed by users to conceal their data, possibly even using algorithms purposely designed to evade detection during steganalysis. A digital investigator seeking to ascertain whether some medium is indeed making use of steganography to hide pertinent evidence must therefore consider including other steganalysis techniques in their analysis in order to overcome the different steganographic strategies that may be used to evade detection. This paper investigates the design of a more comprehensive steganalysis tool that makes use of a series of statistical methods in conjunction with visual and forensic methods to detect messages hidden in images, specifically those hidden in PNG files using Least Significant Bit steganography. The study devises an appropriate combination of the techniques to generate a more effective and comprehensive steganalysis strategy for digital investigators attempting to detect hidden data.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kessler GC, Hosmer C (2011) An overview of steganography. Adv Comput 83:51–107

    Article  Google Scholar 

  2. Schaathun HG (2012) Machine learning in image steganalysis. Wiley, Norway

    Book  Google Scholar 

  3. Bohme R (2010) Advanced statistical steganalysis. Springer

    Book  Google Scholar 

  4. Manoharan S (2008) An empirical analysis of RS steganalysis. In: The third international conference on internet monitoring and protection internet monitoring and protection, pp 172–177

    Google Scholar 

  5. Westfeld A (2002) Detecting low embedding rates, Berlin

    Google Scholar 

  6. Zhang T, Ping X (2003) Reliable detection of LSB steganography based on the difference image histogram, Hong Kong

    Google Scholar 

  7. Shreelekshmi R, Wilsey M, Veni Madhavan C (2011) Improved LSB steganalysis based on analysis of adjacent pixel pairs. SIViP 7(5):811–816

    Article  Google Scholar 

  8. Everingham M (2015) The PASCAL object recognition database collection. http://host.robots.ox.ac.uk/pascal/VOC/databases.html#VOC2005_1. Accessed 14 July 2017

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wai Sze Leung .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mewalal, N., Leung, W.S. (2019). Improving Hidden Message Extraction Using LSB Steganalysis Techniques. In: Kim, K., Baek, N. (eds) Information Science and Applications 2018. ICISA 2018. Lecture Notes in Electrical Engineering, vol 514. Springer, Singapore. https://doi.org/10.1007/978-981-13-1056-0_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1056-0_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1055-3

  • Online ISBN: 978-981-13-1056-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics