Abstract
This paper investigates the detection of adaptive image steganography. Firstly, the sample pair analysis model of multiple least-significant bits (MLSB) replacement is analyzed, and the conditions under which the adaptive steganography can be detected via this model are given. For the category of adaptive steganography satisfying these conditions, a general quantitative steganalysis method is presented based on specific areas and sample pair analysis. Then, for a typical adaptive steganography, some concrete methods are proposed to select specific areas and trace sets of sample pairs, and estimate the stego modification ratios. Experimental results show that the proposed methods can estimate the stego modification ratio accurately. This verifies the validity of the proposed general quantitative steganalysis method.
Similar content being viewed by others
References
Lian S G, Kanellopoulos D, Ruffo G. Recent advances in multimedia information system security. Inf Sloven Soc Inform, 2009, 33: 3–24
Lian S G, Zhang Y. Handbook of Research on Secure Multimedia Distribution. Hershey PA: IGI Global (formerly Idea Group, Inc.), 2009
Westfeld A. Detecting low embedding rates. In: Proceedings of 5th International Workshop on Information Hiding, LNCS, vol. 2578. Heidelberg: Springer, 2002. 324–339
Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, 2001, 8: 22–28
Dumitrescu S, Wu X, Wang Z. Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process, 2003, 51: 1995–2007
Fridrich J, Goljan M. On estimation of secret message length in LSB steganography in spatial domain. In: Proceedings of SPIE, Security, Steganography and Watermarking of Multimedia Contents VI, 2004, 5306: 23–34
Lu P Z, Luo X Y, Tang Q Y, et al. An improved sample pairs method for detection of LSB embedding. In: Proceedings of 6th International Workshop on Information Hiding, LNCS, vol. 3200. Heidelberg: Springer, 2004. 116–128
Ker A. Improved detection of LSB steganography in grayscale images. In: Proceedings of 6th International Workshop on Information Hiding, LNCS, vol. 3200. Heidelberg: Springer, 2004. 97–115
Wang G X, Ping X J, Xu M K, et al. Steganalytic method based on short and repeated sequence distance statistics. Sci China Ser F-Inf Sci, 2008, 51: 1466–1474
He J H, Huang J W. Steganalysis of stochastic modulation steganography. Sci China Ser F-Inf Sci, 2006, 49: 273–285
Fridrich J, Goljan M, Hogea D, Soukal D. Quantitative steganalysis of digital images: estimating the secret message length. ACM Multimedia Syst J, 2003, 9: 288–302
Kawaguchi E, Eason R. Principle and applications of BPCS-steganography. In: Proceedings of SPIE, Multimedia Systems and Applications, vol. 3528. New York: SPIE, 1998. 464–472
Noda H, Shirazi M, Spaulding J, et al. Application of bit-plane decomposition steganography to JPEG2000 encoded images. IEEE Signal Process Lett, 2002, 9: 410–413
Furuta T, Noda H, Niimi M, et al. Bit-plane decomposition steganography using wavelet compressed video. In: Proceedings of forth International Conference on Information, Communications and Signal Processing, vol. 3. Berlin: Singapore, 2003. 970–974
Nguyen B, Yoon S, Lee H. Multi bit plane image steganography. In: Proceeding of International Workshop on Digital Watermarking, LNCS, vol. 4283. Berlin: Springer, 2006. 61–70
Agaian S, Rodriguez B, Perez J. Stego sensitivity measure and multibit plane based steganography using different color models. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072. New York: SPIE, 2006. 279–290
Wang Y, Moulin P. Optimized feature extraction for learning-based image steganalysis. IEEE Trans Inf Foren Secur, 2007, 2: 31–45
Luo X Y, Liu F L, Yang C F, et al. Image universal steganalysis based on best wavelet packet decomposition. Sci China Inf Sci, 2010, 53: 634–647
Kim C, Chul S, Lee S, et al. Steganalysis on BPCS steganography. In: Pacific Rim Workshop on Digital Steganography, Kitakyushu, Japan, 2003
Niimi M, Ei T, Noda H, et al. An attack to BPCS-steganography using complexity histogram and countermeasure. In: Proceedings of International Conference on Image Processing, Singapore, 2004. 733–736
Zhang X P, Wang S Z. Statistical analysis against spatial BPCS steganography (in Chinese). J Comput-Aid Design Comput Graph, 2005, 17: 1625–1629
Yu X Y, Tan T N, Wang Y H. Reliable detection of BPCS-steganography in natural images. In: Proceedings of the third International Conference on Image and Graphics, Hong Kong, 2004. 333–336
Julio L, Raul M, Mariko N, et al. Detection of BPCS-steganography using SMWCF steganalysis and SVM. In: Proceedings of International Symposium on Information Theory and its Applications, Auckland, New Zealand, 2008. 1–5
Xuan G R, Shi Y Q, Zou D K, et al. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: Proceedings of International Workshop on Information Hiding, LNCS, vol. 3727. Berlin: Springer, 2005. 262–277
Barbier J, Mayoura K. Steganalysis of multi bit plane image steganography. In: Proceedings of International Workshop on Digital Watermarking, LNCS, vol. 5041. Berlin: Springer, 2008. 99–111
Yu X Y, Tan T N, Wang Y H. Extended optimization method of LSB steganalysis. In: Proceedings of IEEE International Conference on Image Processing, Genoa, Italy, 2005, 2: 1102–1105
Ker A. Steganalysis of embedding in two least-significant bits. IEEE Trans Inf Foren Secur, 2007, 2: 46–54
Luo X Y, Yang C F, Wang D S, et al. LTSB steganalysis based on quartic equation. LNCS Trans Data Hid Multimed Secur II, 2007, 4499: 68–90
Yu X, Babaguchi N. A fast and effective method to detect multiple least significant bits steganography. In: Proceedings of ACM Symposium on Applied Computing, Ceará, Brazil, 2008. 1443–1447
Yang C F, Liu F L, Luo X Y, et al. Steganalysis frameworks of embedding in multiple least-significant bits. IEEE Trans Inf Foren Secur, 2008, 3: 662–672
Yang C F, Luo X Y, Liu F L. Embedding ratio estimating for each bit plane of image. In: Proceedings of International Workshop on Information Hiding, LNCS, vol. 5806. Berlin: Springer, 2009, 59–72
Böhme R, Ker A. A two-factor error model for quantitative steganalysis. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072. New York: SPIE, 2006. 59–74
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Luo, X., Liu, F., Yang, C. et al. Modification ratio estimation for a category of adaptive steganography. Sci. China Inf. Sci. 53, 2472–2484 (2010). https://doi.org/10.1007/s11432-010-4105-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-010-4105-7