Skip to main content
Log in

STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost

  • Published:
annals of telecommunications - annales des télécommunications Aims and scope Submit manuscript

Abstract

A new steganographic method called STABYLO is introduced in this research work. Its main advantage is to be much lighter than the so-called HUGO, WOW, and UNIWARD schemes, the state of the art steganographic processes. To achieve the proposed goal, famous experimented components of signal processing, coding theory, and cryptography are combined together, leading to a scheme that can reasonably face up-to-date steganalysers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. http://members.femto-st.fr/jf-couchot/en/stabylo

References

  1. Blum L, Blum M, Shub M (1983) Comparison of two pseudo-random number generators. In: Chaum D, Rivest RL, Sherman AT (eds) Advances in Cryptology, Proceedings of CRYPTO 82, Santa Barbara, California, USA, August 23-25, 1982, pp 61–78. Plenum Press, New York, NY, USA

  2. Blum M, Goldwasser S (1985) An efficient probabilistic public-key encryption scheme which hides all partial information. In: Blakley GR, Chaum D (eds) Advances in Cryptology, Proceedings of CRYPTO 84, Santa Barbara, California, USA, August 19–22, 1984, Proceedings, vol 196, pp 289–302

  3. Canny J (1986) A computational approach to edge detection. IEEE Trans Pattern Anal Mach Intell PAMI 8(6):679–698. doi:10.1109/TPAMI.1986.4767851

    Article  Google Scholar 

  4. Chen WJ, Chang CC, Le THN (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37(4):3292–3301. http://dblp.uni-trier.de/db/journals/eswa/eswa37.htmlChenCL10

    Article  Google Scholar 

  5. Dumitrescu S, Wu X (2005) Lsb steganalysis based on high-order statistics. In: Eskicioglu AM, Fridrich JJ, Dittmann J (eds) Proceedings of the 7th workshop on Multimedia & Security, MM & Sec 2005, New York, NY, USA, August 1-2, 2005, 2006, pp 25–32, ACM, New York, NY, USA

  6. Dumitrescu S, Wu X, Wang Z (2003) Detection of lsb steganography via sample pair analysis. IEEE Trans Sig Process 51(7):1995–2007. http://dblp.uni-trier.de/db/journals/tsp/tsp51.htmlDumitrescuWW03

    Article  Google Scholar 

  7. Filler T, Judas J, Fridrich JJ (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics Secur 6(3-2):920–935. http://dblp.uni-trier.de/db/journals/tifs/tifs6.htmlFillerJF11

    Article  Google Scholar 

  8. Filler T, Judas J, Fridrich JJ (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics and Secur 6(3-2):920–935

    Article  Google Scholar 

  9. Fontaine C, Galand F (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J Inf Secur 2007(013): 801

    Google Scholar 

  10. Fridrich JJ, Goljan M, Du R (2001) Reliable detection of lsb steganography in color and grayscale images. In: Georganas ND, Popescu-Zeletin R (eds) Proceedings of the 4th workshop on Multimedia & Security: New Challenges, MM & Sec 2001, Ottawa, Ontario, Canada, October 5, 2001, pp 27–30, ACM, New York, NY, USA

  11. Fridrich JJ, Kodovský J (2012) Steganalysis of lsb replacement using parity-aware features. In: Kirchner M, Ghosal D (eds) Information Hiding - 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers, vol 7692, pp 31–45

  12. Fridrich JJ, Pevný T, Kodovský J (2007) Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: Kundur D, Prabhakaran B, Dittmann J, Fridrich JJ (eds) Proceedings of the 9th workshop on Multimedia & Security, MM & Sec, 2007, Dallas, Texas, USA, September 20-21, 2007, pp 3–14. ACM, New York, NY, USA

  13. Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain EURASIP. J Inf Secur 2014(1):1. doi:10.1186/1687-417X-2014-1

    Google Scholar 

  14. Holub V, Fridrich JJ (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, pp 234–239. IEEE. http://dblp.uni-trier.de/db/conf/wifs/wifs2012.htmlHolubF12

  15. Ker A D (2005) A general framework for structural steganalysis of lsb replacement. In: Barni M, Herrera-Joancomartí J, Katzenbeisser S, Pérez-González F (eds) Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, vol 3727, pp 296–311

  16. Kim Y, Duric Z, Richards D (2006) Modified matrix encoding technique for minimal distortion steganography. In: Camenisch J, Collberg CS, Johnson NF, Sallee P (eds) Information Hiding, vol 4437, pp 314–327. http://dblp.uni-trier.de/db/conf/ih/ih206.htmlKimDR06

  17. Kodovsk J, Pevn T, Fridrich JJ (2010) Modern steganalysis can detect yass. In: Media Forensics and Security, p 754102

  18. Kodovský J, Fridrich J (2011) Steganalysis in high dimensions: Fusing classifiers built on random subspaces. In: Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, pp. 78,800L–78,800L–13

  19. Kodovský J, Fridrich JJ, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432–444

    Article  Google Scholar 

  20. Li B, Huang J, Shi YQ (2008) Textural features based universal steganalysis. In: Proc. SPIE 6819, p 12

  21. Li F, Zhang X, Yu J, Shen W (2014) Adaptive jpeg steganography with new distortion function. ann telecommun - annales des telecommunications 69(7-8):431–440. doi:10.1007/s12243-013-0415-2

    Article  Google Scholar 

  22. Liu W, Liu G, Dai Y (2014) Syndrome trellis codes based on minimal span generator matrix. ann telecommun-annales des telecommunications 69(7-8):403–416

    Article  Google Scholar 

  23. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on lsb matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214. doi:10.1109/TIFS.2010.2041812

    Article  MathSciNet  Google Scholar 

  24. Mielikainen J (2006) Lsb matching revisited. IEEE Signal Processing Letters 13(5):285–287

    Article  Google Scholar 

  25. Pevný T, Filler T (2010) Break our steganographic system Available at. URL http://www.agents.cz/boss/

  26. Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Böhme R, Fong PWL, Safavi-Naini R (eds) Information Hiding - 12th International Conference, IH 2010, Calgary, A B Canada, June 28-30, 2010, Revised Selected Papers, 6387, pp 161–177

  27. Tyan CY, Wang PP (1993) Image processing-enhancement, filtering and edge detection using the fuzzy logic approach. In: Proceedings of the Second IEEE International Conference on Fuzzy Systems, vol 1, pp 600–605

  28. Westfeld A (2001) F5-a steganographic algorithm. In: I S Moskowitz (ed) Information Hiding, 4th International Workshop, 2001, I H W, Pittsburgh, P A, USA, April 25-27, 2001, Proceedings, 2137, 289–302

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jean-François Couchot.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Couchot, JF., Couturier, R. & Guyeux, C. STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost. Ann. Telecommun. 70, 441–449 (2015). https://doi.org/10.1007/s12243-015-0466-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-015-0466-7

Keywords

Navigation