Skip to main content
Log in

Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Highly Undetectable steGO (HUGO steganography) is a well-known image steganography method proposed in recent years. The security of HUGO steganography is analyzed in this paper, and a corresponding steganalysis method is proposed based on the blind coding parameters recognition. Firstly, the principle of covert communication based on HUGO steganography and the characteristics of the Syndrome-Trellis codes (STCs) used in HUGO are analyzed; and then the potential security risk of HUGO is pointed out; Secondly, based on the idea of the blind parameters recognition for channel coding, the submatrix parameter of STCs is recognized correctly, and thus the message embedded by HUGO can be extracted correctly by decode algorithm of STCs. A series of experimental results show that the proposed steganalysis method can not only detect the stego-images reliably, but also extract the embedded message correctly; these validated the existence of security flaw of HUGO steganography.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. BossBase-1.01[EB/OL]. http://exile.felk.cvut.cz/boss/BOSSFinal/.2013

References

  1. Fridrich J, Kodovsky J, Goljan M and Holub V (2011) Steganalysis of content-adaptive steganography in spatial domain. Proceedings of the 13th International Workshop on Information Hiding, Prague, 102–117

  2. Guo LJ, Ni JQ, and Shi YQ (2012) An efficient JPEG steganographic scheme using uniform embedding. Proceedings of the 4th IEEE International Workshop on Information Forensics and Security, Tenerife, 169–174

  3. Gul G, Kurugollu F. (2011) A new methodology in steganalysis: Breaking highly undetectable steganography. Proceedings of the 13th International Workshop on Information Hiding, Prague, 71–84

  4. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. Proceedings of the 4th IEEE International Workshop on Information Forensics and Security, Tenerife, 69–76

  5. Holub V, Fridrich J (2013) Digital image steganography using universal distortion. Proceedings of the 1st ACM workshop on information hiding and multimedia security. Montpellier, 59–68

  6. Holub V, Fridrich J (2013) Random projections of residuals as an alternative to co-occurrences in steganalysis. In: Proceedings of SPIE, electronic imaging, media watermarking, security, and forensics, California, 8665:1–11

  7. Huang FJ, Huang JW, Shi YQ (2012) New channel selection rule for JPEG steganography. IEEE Trans Inf Forensc Security 7(4):1181–1191

    Article  Google Scholar 

  8. Kodovsky J, Fridrich J (2009) Calibration revisited. In: Proceedings of the 11th ACMWorkshop on Multimedia and Security, Montpellier, 63–74

  9. Kodovsky J, Fridrich J, Holub V (2011) On dangers of overtraining steganography to incomplete cover model. Proceedings of the 13th ACM workshop on multimedia and security, Niagara Falls, 69–76

  10. Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensc Security 7(2):432–444

    Article  Google Scholar 

  11. Kodovsky J, Fridrich J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensc Security 7(3):868–882

    Article  Google Scholar 

  12. Kodovsky J, Fridrich J (2013) Quantitative steganalysis using rich models. Proceedings of SPIE, Electronic Imaging, Security and Forensics of Multimedia XV, California, 1–11

  13. Luo WQ, Huang FJ, Huang JW (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensc Security 5(2):182–193

    MathSciNet  Google Scholar 

  14. Luo XY, Wang DX, Wang P, Liu FL (2008) A review on blind detection for image steganography. Signal Process 88(9):2138–2157

    Article  MATH  Google Scholar 

  15. Luo XY, Liu FL, Lian SG, Yang CF (2011) On the Typical Statistic Features for Image Blind Steganalysis. IEEE J Selected AreasCommun 29(7):1404–1422

    Article  Google Scholar 

  16. Li FY, Zhang XP, Yu J, Shen WF (2014) Adaptive JPEG steganography with new distortion function. Ann Telecommun 69(7–8):431–440

    Article  Google Scholar 

  17. Provos N (2011) Defending against statistical steganalysis. In: Proceedings of the 10th conference on USENIX Security Symposium. Washington, 323–335

  18. Rukhin A, Soto J, Nechvatal J (2008) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800–22

  19. Shi Y Q, Sutthiwan P, Chen LC (2011) Textural features for steganalysis. Proceedings of the 14th International Workshop on Information Hiding. Berkeley, 63–77

  20. Tomas P, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensc Security 5(2):215–224

    Article  Google Scholar 

  21. Tomas P, Tomas F, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. Proceedings of the 12th International Workshop on Information Hiding, Calgary, 161–177

  22. Tomas F, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensc Security 6(3):920–935

    Article  Google Scholar 

  23. Tomass F, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, San Francisco, 2011, 1–14

  24. Wang Y, Moulin P (2007) Optimized feature extraction for learning-based image steganalysis. IEEE Trans Inf Forensc Security 2(1):31–45

    Article  Google Scholar 

  25. Westfeld A (2001) F5-a steganographic algorithm: high capacity despite better steganalysis. Proceedings of the 4th International Workshop on Information Hiding, Pittsburgh, 289–302

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (No. 61379151, 61272489, 61302159, 61401512 and 61373020), the Excellent Youth Foundation of Henan Province of China (No. 144100510001), and the Foundation of Science and Technology on Information Assurance Laboratory (No. KJ-14-108).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangyang Luo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luo, X., Song, X., Li, X. et al. Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75, 13557–13583 (2016). https://doi.org/10.1007/s11042-015-2759-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2759-2

Keywords

Navigation