Abstract
The extraction of embedded messages, i.e., extraction attacks are the ultimate purpose of steganalysis, with great practical significance to obtain covert communication content and covert communication forensics. For steganography using a stego key, the extraction attacks are equivalent to the stego key recovery. This paper mainly studies the methods of efficient stego key recovery for LSB steganography in JPEG domain. According to the distribution differences of extracting message bits generated by the correct and incorrect keys, stego key recovery is transformed into the hypothesis test of the message bits distribution extracted by the correct and incorrect keys. Firstly, by fitting the message bits distribution extracted by the correct key, a stego key recovery method based on nonparametric hypothesis test is proposed. Secondly, by utilizing the distribution differences between message bits extracted by the correct and incorrect keys, a stego key recovery method based on parametric hypothesis test is proposed. And then, formulas are given for calculating the sample size and threshold in the proposed stego key recovery model, on the basis of type I error and type II error. Experimental results show that the proposed method can successfully recover the stego key of OutGuess 0.13b, OutGuess0.2, JPEG domain random LSB matching steganography and random F3 steganography, the performance is superior to that of existing methods.





Similar content being viewed by others
Notes
NRCS Photo Gallery. http://www.nrcs.usda.gov/.
References
Qin, C., Chang, C.C., Huang, Y.H., Liao, L.T.: An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circ. Syst. Video Technol. 23(7), 1109–1118 (2013)
Zhang, Y., Qin, C., Zhang, W.M., Liu, F.L., Luo, X.Y.: On the fault-tolerant performance for a class of robust image steganography. Sig. Process. 146, 99–111 (2018)
Qin, C., Chang, C.C., Chiu, Y.P.: A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans. Image Process. 23(3), 969–978 (2014)
Ma, Y.Y., Luo, X.Y., Li, X.L., Bao, Z.K., Zhang, Y.: Selection of rich model steganalysis features based on decision rough set α-positive region reduction. IEEE Trans. Circ. Syst. Video Technol. 99, 1 (2018). https://doi.org/10.1109/TCSVT.2018.2799243
Luo, X.Y., Song, X.F., Li, X.L., Zhang, W.M., Lu, J.C., Yang, C.F., Liu, F.L.: Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multimed. Tools Appl. 75(21), 13557–13583 (2016)
Upham, D.: JPEG-JSteg-V4, steganographic algorithm JSteg. http://zooid.org/paul/crypto/jsteg
Provos, N.: Defending against statistical steganalysis. Proceedings of the 10th conference on USENIX Security Symposium-Volume 10, USENIX Association, pp. 24–24 (2001)
Westfeld, A.: F5-A steganographic algorithm. Proceedings of the 4th International Workshop on Information Hiding, Springer-Verlag, pp 289–302 (2001)
Guo, L.J., Ni, J.Q., Shi, Y.Q.: Uniform embedding for efficient JPEG Steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814–825 (2014)
Holub, V., Fridrich, J.: Digital image steganography using universal distortion. Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, pp. 59–68 (2013)
Wang, Z.C., Zhang, X.P., Yin, Z.X.: Hybrid distortion function for JPEG steganography. J. Electron. Imaging 25(5), 050501 (2016)
Denemark, T., Fridrich, J.: Model based steganography with precover. Electron. Imaging. 2017(7), 56–66 (2017)
Gan, J.J., Liu, J.F., Luo, X.Y., Yang, C.F., Liu, F.L.: Reliable steganalysis of HUGO steganography based on partially known plaintext. Multimed. Tools Appl. (2017). https://doi.org/10.1007/s11042-017-5134-7
Fridrich, J., Goljan, M., Soukal, D.: Searching for the stego-key. Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, pp. 70–82 (2004)
Pevný, T., Ker, A.D.: Steganographic key leakage through payload metadata. Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security, pp. 109–114 (2014)
Fridrich, J., Goljan, M., Soukal, D., Holotyak, T.: Forensic steganalysis: determining the stego key in spatial domain steganography. Proceedings of SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, pp. 631–642 (2005)
Liu, J., Tang, G.M.: Stego key estimation in LSB steganography. J. Multimed. 7(4), 309–313 (2012)
Chen, J.Y., Zhu, Y.F., Zhang, W.M., Liu, J.F.: Chosen-key extracting attack to random LSB steganography. J. Commun. 31(5), 73–80 (2010)
Liu, J.F., Tian, Y.G., Han, T., Wang, J.C., Luo, X.Y.: Stego key searching for LSB steganography on JPEG decompressed image. Sci. China Inf. Sci. 59(3), 1–15 (2016)
Xu, C., Liu, J.F., Gan, J.J., Luo, X.Y.: Stego key recovery based on the optimal hypothesis test. Multimed. Tools Appl. 2017(4), 1–20 (2017). https://doi.org/10.1007/s11042-017-4878-4
Giannoula, A., Boulgouris, N.V., Hatzinakos, D., Plataniotis, K.: Watermark detection for noisy interpolated images. IEEE Trans. Circ. Syst. II Express Briefs 53(5), 359–403 (2006)
Lehmann, E.L., Romano, J.P.: Testing Statistical Hypotheses. Springer, Berlin (2006)
Acknowledgements
This work was supported by the National Natural Science Foundation of China (Grant no. U1636219, U1736214, 61572052, 61602508, and 61772549), the National Key R&D Program of China (Grant no. 2016YFB0801303 and 2016QY01W0105), Plan for Scientific Innovation Talent of Henan Province (no. 2018JR0018), and the Key Technologies R&D Program of Henan Province (Grant no.162102210032).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liu, J., Gan, J., Wang, J. et al. Efficient stego key recovery based on distribution differences of extracting message bits. J Real-Time Image Proc 16, 649–660 (2019). https://doi.org/10.1007/s11554-018-0805-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11554-018-0805-9