Skip to main content
Log in

Steganalysis of adaptive image steganography in multiple gray code bit-planes

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

For detecting the MBPIS (multiple bit-planes image steganography), which embeds the messages into the multiple Gray code bit-planes, a steganalysis method is proposed to estimate the embedding ratios based on sample pairs analysis. The proposed method combines appropriate trace sets of a more elegant and pellucid sample pair analysis model to estimate the modification ratio of each natural binary bit-plane. Then the modification ratios in Gray code bit-planes are estimated from the modification ratios in natural binary bit-planes based on the relationship between natural binary bit-planes and Gray code bit-planes. Finally, considering the matrix encoding in MBPIS, the embedding ratios are obtained from the modification ratios in Gray code bit-planes. Experimental results show that compared with existing steganalysis methods, the proposed method can not only detect the stego images of MBPIS more reliably, but also estimate the embedding ratios of MBPIS with smaller errors. When the embedding ratio in the first Gray code bit-plane is not less than 0.1, the average absolute error of the proposed method will less than it of the ID3SPA by 0.04 at least.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Barbier J, Mayoura K (2008) Steganalysis of multi bit plane image steganography. In: Proceedings of International Workshop on Digital Watermarking, LNCS 5041:99–111

  2. Böhme R, Ker A (2006) A two-factor error model for quantitative steganalysis. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII 6072:59–74

  3. Cachin C (2004) An information-theoretic model for steganography. Inf Comput 192:41–56

    Article  MathSciNet  MATH  Google Scholar 

  4. Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007

    Article  Google Scholar 

  5. Fridrich J, Goljan M (2002) Practical steganalysis: state of the art. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents IV 4675:1–13

  6. Fridrich J, Goljan M (2004) On estimation of secret message length in LSB steganography in spatial domain. In: Proceedings of SPIE, Security, Steganography and Watermarking of Multimedia Contents VI 5306:23–34

  7. Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color and gray-scale images. IEEE Multimedia 8(4):22–28

    Article  Google Scholar 

  8. Fridrich J, Goljan M, Hogea D, Soukal D (2003) Quantitative steganalysis of digital images: estimating the secret message length. ACM Multimed Syst J 9(3):288–302

    Article  Google Scholar 

  9. Fridrich J, Goljan M, Soukal D, Holotyak T (2005) Forensic steganalysis: determining the stego key in spatial domain steganography. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII5681:631–642

  10. Furuta T, Noda H, Niimi M et al (2003) Bit-plane decomposition steganography using wavelet compressed video. In: Proceedings of forth International Conference on Information, Communications and Signal Processing 3:970–974

  11. Julio L, Raul M, Mariko N et al (2008) Detection of BPCS-steganography using SMWCF steganalysis and SVM. In: Proceedings of International Symposium on Information Theory and its Applications 1–5

  12. Kawaguchi E, Eason R (1998) Principle and applications of BPCS-steganography. In: Proceedings of SPIE, Multimedia Systems and Applications 3528:464–472

  13. Ker A (2007) Steganalysis of embedding in two least-significant bits. IEEE Trans Inf Forensics Secur 2(1):46–54

    Article  Google Scholar 

  14. Ker A (2008) Locating steganography payload via WS residuals. In: Proceedings of 10th ACM Workshop on Multimedia Security 27–32

  15. Ker A, Lubenko I (2009) Feature reduction and payload location with WAM steganalysis. In: Proceedings of SPIE, Electronic Imaging, Security and Forensics of Multimedia Contents XI 0A01–0A13

  16. Kim C, Chul S, Lee S et al (2003) Steganalysis on BPCS steganography. In: Pacific Rim Workshop on Digital Steganography

  17. Lian S, Kanellopoulos D, Ruffo G (2009) Recent advances in multimedia information system security. Informatica Slovenian Soc Informatika 33(1):3–24

    MathSciNet  Google Scholar 

  18. Lian S, Zhang Y (2009) Handbook of research on secure multimedia distribution. IGI Global (formerly Idea Group, Inc), March

  19. Luo XY, Yang CF, Wang DS et al (2007) LTSB steganalysis based on quartic equation. LNCS Trans Data Hiding Multimed Secur II 4499:68–90

    Article  Google Scholar 

  20. Nguyen B, Yoon S, Lee H (2006) Multi bit plane image steganography. In: Proceeding of International Workshop on Digital Watermarking, LNCS 4283:61–70

  21. Niimi M, Ei T, Noda H et al (2004) An attack to BPCS-steganography using complexity histogram and countermeasure. In: Proceedings of International Conference on Image Processing 733–736

  22. Noda H, Shirazi M, Spaulding J, Kawaguchi E (2002) Application of bit-plane decomposition steganography to JPEG2000 encoded images. IEEE Signal Process Lett 9(12):410–413

    Article  Google Scholar 

  23. Westfeld A (2001) High capacity despite better steganalysis (F5-a steganographic algorithm). In: Proceedings of International Workshop on Information Hiding, LNCS 2137:289–302

  24. Yang CF, Liu FL, Luo XY et al (2008) Steganalysis frameworks of embedding in multiple least-significant bits. IEEE Trans Inf Forensics Secur 3(4):662–672

    Article  Google Scholar 

  25. Yang CF, Luo XY, Liu FL (2009) Embedding ratio estimating for each bit plane of image. In: Proceedings of International Workshop on Information Hiding, LNCS 5806:59–72

  26. Yu X, Babaguchi N (2008) A fast and effective method to detect multiple least significant bits steganography. In: Proceedings of ACM Symposium on Applied Computing 1443–1447

  27. Yu XY, Tan TN, Wang YH (2004) Reliable detection of BPCS-steganography in natural images. In: Proceedings of the third International Conference on Image and Graphics 333–336

  28. Yu XY, Tan TN, Wang YH (2005) Extended optimization method of LSB steganalysis. In: Proceedings of IEEE International Conference on Image Processing 2:1102–1105

  29. Zhang T, Ping X (2003) A new approach to reliable detection of LSB steganography in natural images. Signal Process 83:2085–2093

    Article  MATH  Google Scholar 

  30. Zhang XP, Wang SZ (2005) Statistical analysis against spatial BPCS steganography. J Comput Aided Des Comput Graph 17(7):1625–1629, in Chinese

    Google Scholar 

  31. Zöllner J, Federrath H, Klimant H et al (1998) Modeling the security of steganographic systems. In: Proceedings of International Workshop on Information Hiding, LNCS 1525: 344–354

  32. Luo XY, Liu FL, Yang CF et al (2010) Modification ratio estimation for a category of adaptive steganography. Sci China: Inf Sci 53(12), in press

Download references

Acknowledgment

This work is supported by the National Natural Science Foundation of China (Grant Nos. 60970141 and 60902102), the Found of Innovation Scientists and Technicians Outstanding Talents of Henan Province of China (Grant No. 094200510008), the Science-Technology Project of Zhengzhou City of China (Grant No. 083SGYG21125), and the Doctoral Dissertation Innovation Fund of Information Science and Technology Institute (Grant No. BSLWCX200804).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangyang Luo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Luo, X., Liu, F., Yang, C. et al. Steganalysis of adaptive image steganography in multiple gray code bit-planes. Multimed Tools Appl 57, 651–667 (2012). https://doi.org/10.1007/s11042-010-0663-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-010-0663-3

Keywords

Navigation