Skip to main content
Log in

Modification ratio estimation for a category of adaptive steganography

  • Research Papers
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

This paper investigates the detection of adaptive image steganography. Firstly, the sample pair analysis model of multiple least-significant bits (MLSB) replacement is analyzed, and the conditions under which the adaptive steganography can be detected via this model are given. For the category of adaptive steganography satisfying these conditions, a general quantitative steganalysis method is presented based on specific areas and sample pair analysis. Then, for a typical adaptive steganography, some concrete methods are proposed to select specific areas and trace sets of sample pairs, and estimate the stego modification ratios. Experimental results show that the proposed methods can estimate the stego modification ratio accurately. This verifies the validity of the proposed general quantitative steganalysis method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Lian S G, Kanellopoulos D, Ruffo G. Recent advances in multimedia information system security. Inf Sloven Soc Inform, 2009, 33: 3–24

    MathSciNet  Google Scholar 

  2. Lian S G, Zhang Y. Handbook of Research on Secure Multimedia Distribution. Hershey PA: IGI Global (formerly Idea Group, Inc.), 2009

    Google Scholar 

  3. Westfeld A. Detecting low embedding rates. In: Proceedings of 5th International Workshop on Information Hiding, LNCS, vol. 2578. Heidelberg: Springer, 2002. 324–339

    Chapter  Google Scholar 

  4. Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, 2001, 8: 22–28

    Article  Google Scholar 

  5. Dumitrescu S, Wu X, Wang Z. Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process, 2003, 51: 1995–2007

    Article  Google Scholar 

  6. Fridrich J, Goljan M. On estimation of secret message length in LSB steganography in spatial domain. In: Proceedings of SPIE, Security, Steganography and Watermarking of Multimedia Contents VI, 2004, 5306: 23–34

    Google Scholar 

  7. Lu P Z, Luo X Y, Tang Q Y, et al. An improved sample pairs method for detection of LSB embedding. In: Proceedings of 6th International Workshop on Information Hiding, LNCS, vol. 3200. Heidelberg: Springer, 2004. 116–128

    Chapter  Google Scholar 

  8. Ker A. Improved detection of LSB steganography in grayscale images. In: Proceedings of 6th International Workshop on Information Hiding, LNCS, vol. 3200. Heidelberg: Springer, 2004. 97–115

    Chapter  Google Scholar 

  9. Wang G X, Ping X J, Xu M K, et al. Steganalytic method based on short and repeated sequence distance statistics. Sci China Ser F-Inf Sci, 2008, 51: 1466–1474

    Article  MATH  MathSciNet  Google Scholar 

  10. He J H, Huang J W. Steganalysis of stochastic modulation steganography. Sci China Ser F-Inf Sci, 2006, 49: 273–285

    Article  MATH  MathSciNet  Google Scholar 

  11. Fridrich J, Goljan M, Hogea D, Soukal D. Quantitative steganalysis of digital images: estimating the secret message length. ACM Multimedia Syst J, 2003, 9: 288–302

    Article  Google Scholar 

  12. Kawaguchi E, Eason R. Principle and applications of BPCS-steganography. In: Proceedings of SPIE, Multimedia Systems and Applications, vol. 3528. New York: SPIE, 1998. 464–472

    Google Scholar 

  13. Noda H, Shirazi M, Spaulding J, et al. Application of bit-plane decomposition steganography to JPEG2000 encoded images. IEEE Signal Process Lett, 2002, 9: 410–413

    Article  Google Scholar 

  14. Furuta T, Noda H, Niimi M, et al. Bit-plane decomposition steganography using wavelet compressed video. In: Proceedings of forth International Conference on Information, Communications and Signal Processing, vol. 3. Berlin: Singapore, 2003. 970–974

    Google Scholar 

  15. Nguyen B, Yoon S, Lee H. Multi bit plane image steganography. In: Proceeding of International Workshop on Digital Watermarking, LNCS, vol. 4283. Berlin: Springer, 2006. 61–70

    Google Scholar 

  16. Agaian S, Rodriguez B, Perez J. Stego sensitivity measure and multibit plane based steganography using different color models. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072. New York: SPIE, 2006. 279–290

    Google Scholar 

  17. Wang Y, Moulin P. Optimized feature extraction for learning-based image steganalysis. IEEE Trans Inf Foren Secur, 2007, 2: 31–45

    Article  Google Scholar 

  18. Luo X Y, Liu F L, Yang C F, et al. Image universal steganalysis based on best wavelet packet decomposition. Sci China Inf Sci, 2010, 53: 634–647

    Article  Google Scholar 

  19. Kim C, Chul S, Lee S, et al. Steganalysis on BPCS steganography. In: Pacific Rim Workshop on Digital Steganography, Kitakyushu, Japan, 2003

  20. Niimi M, Ei T, Noda H, et al. An attack to BPCS-steganography using complexity histogram and countermeasure. In: Proceedings of International Conference on Image Processing, Singapore, 2004. 733–736

  21. Zhang X P, Wang S Z. Statistical analysis against spatial BPCS steganography (in Chinese). J Comput-Aid Design Comput Graph, 2005, 17: 1625–1629

    Google Scholar 

  22. Yu X Y, Tan T N, Wang Y H. Reliable detection of BPCS-steganography in natural images. In: Proceedings of the third International Conference on Image and Graphics, Hong Kong, 2004. 333–336

  23. Julio L, Raul M, Mariko N, et al. Detection of BPCS-steganography using SMWCF steganalysis and SVM. In: Proceedings of International Symposium on Information Theory and its Applications, Auckland, New Zealand, 2008. 1–5

  24. Xuan G R, Shi Y Q, Zou D K, et al. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: Proceedings of International Workshop on Information Hiding, LNCS, vol. 3727. Berlin: Springer, 2005. 262–277

    Chapter  Google Scholar 

  25. Barbier J, Mayoura K. Steganalysis of multi bit plane image steganography. In: Proceedings of International Workshop on Digital Watermarking, LNCS, vol. 5041. Berlin: Springer, 2008. 99–111

    Google Scholar 

  26. Yu X Y, Tan T N, Wang Y H. Extended optimization method of LSB steganalysis. In: Proceedings of IEEE International Conference on Image Processing, Genoa, Italy, 2005, 2: 1102–1105

    Google Scholar 

  27. Ker A. Steganalysis of embedding in two least-significant bits. IEEE Trans Inf Foren Secur, 2007, 2: 46–54

    Article  Google Scholar 

  28. Luo X Y, Yang C F, Wang D S, et al. LTSB steganalysis based on quartic equation. LNCS Trans Data Hid Multimed Secur II, 2007, 4499: 68–90

    Article  Google Scholar 

  29. Yu X, Babaguchi N. A fast and effective method to detect multiple least significant bits steganography. In: Proceedings of ACM Symposium on Applied Computing, Ceará, Brazil, 2008. 1443–1447

  30. Yang C F, Liu F L, Luo X Y, et al. Steganalysis frameworks of embedding in multiple least-significant bits. IEEE Trans Inf Foren Secur, 2008, 3: 662–672

    Article  Google Scholar 

  31. Yang C F, Luo X Y, Liu F L. Embedding ratio estimating for each bit plane of image. In: Proceedings of International Workshop on Information Hiding, LNCS, vol. 5806. Berlin: Springer, 2009, 59–72

    Chapter  Google Scholar 

  32. Böhme R, Ker A. A two-factor error model for quantitative steganalysis. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072. New York: SPIE, 2006. 59–74

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to ChunFang Yang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Luo, X., Liu, F., Yang, C. et al. Modification ratio estimation for a category of adaptive steganography. Sci. China Inf. Sci. 53, 2472–2484 (2010). https://doi.org/10.1007/s11432-010-4105-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-010-4105-7

Keywords

Navigation