Skip to main content
Log in

Steganographic key recovery for adaptive steganography under “known-message attacks”

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Since the performance of STC (Syndrome-Trellis Codes) is approaching the theoretical optimum in minimizing embedded distortion, STC-based adaptive steganography has become the focus of forward improvement and the difficulty of reverse analysis of steganography algorithms. At present, the researches on secret message extraction from STC-based adaptive steganography are mainly focused on the scenario where the secret message is plaintext and part of the plaintext format information is known, while it needs to be studied when these characteristics are unknown. Analogous to the “known-plaintext attack” in cryptanalysis, this manuscript proposes a steganographic key recovery algorithm under the condition of “known-message attack”. Firstly, by studying the structure characteristics of STC parity-check matrix, the concept of basic row vector is proposed, and the problem of secret message extraction attack is transformed into the problem of solving the basic row vectors. Then, the existence of bit string with special structure in the differential sequences of stego sequences is proved. Finally, using the distribution characteristics of the special bit strings in the differential sequence, the problem of solving the basic row vectors is transformed into the problem of solving the simple linear equation system through the differential analysis, and good code judgment criteria is used to filter out the correct steganographic key. The research results of this manuscript can realize the secret message extraction attack when the secret message is ciphertext, which is expected to solve the application requirements of actual scenarios. At the same time, the experimental results also show that, based on the algorithm proposed in this manuscript, only a PC can be used to extract secret message from the common STC-based adaptive steganography algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Abdulla AA, Jassim SA, Sellahewa H (2013) Secure steganography technique based on bitplane indexes. In: Proceedings of the 1st ACM workshop on information hiding and multimedia security, vol 12, Montpellier, France, pp 45–58

  2. Abdulla AA, Jassim SA, Sellahewa H (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. In: Proceedings of international conference on research in security standardisation, pp 151–166

  3. Boroumand M, Chen M, Fridrich J (2019) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forens Secur 14(5):1181–1193

    Article  Google Scholar 

  4. Chen J, Liu J, Zhang W et al (2013) Cryptographic secrecy analysis of matrix embedding. Int J Comput Intell Syst 6(4):639–647

    Article  Google Scholar 

  5. Chen B, Luo W, Zheng P (2019) Enhancing steganography via stego post-processing by reducing image residual difference. In: Proceedings of the 7th ACM workshop on information hiding and multimedia security (IH&MMSec), New York, no. 63–68

  6. Denemark T, Fridrich J (2017) Steganography with multiple JPEG images of the same scene. IEEE Trans Inf Forens Secur 12(10):2308–2319

    Article  Google Scholar 

  7. Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using Syndrome-Trellis Codes. IEEE Trans Inf Forens Secur (WIFS) 6(3):920–935

    Article  Google Scholar 

  8. Fridrich J, Goljan M, Soukal D et al (2004) Searching for the stego key. In: Proceedings of SPIE-electronic imaging, security, steganography and watermaking of multimedia contents VI, vol 5306, San Jose, pp 70–82

  9. Fridrich J, Goljan M, Lisonek P et al (2005) Writing on wet paper. IEEE Trans Sig Process 53(10):3923–3935

    Article  MathSciNet  Google Scholar 

  10. Fridrich J, Goljan M, Soukal D et al (2005) Forensic steganalysis: Determining the stego key in spatial domain steganography. In: Proceedings of SPIE, security, steganography, and watermarking of multimedia contents VII, vol 5681, San Jose, CA, pp 631–642

  11. Gan J, Liu J, Luo X et al (2017) Reliable steganalysis of HUGO steganography based on partially known plaintext. Multimed Tools Appl 77(14):18007–18027

    Article  Google Scholar 

  12. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Proceedings of the 4th IEEE international workshop on information forensics and security (IH&MMSec), Tenerife, Spain, pp 234–239

  13. Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the 1st ACM information hiding and multimedia security workshop (IH&MMSec), Montpellier, France, pp 59–68

  14. Ker AD, Bas P, Rainer B et al (2013) Moving steganography and steganalysis from the laboratory into the real word. In: Proceedings of the 1st ACM workshop on information hiding and multimedia security, vol 12, Montpellier, France, pp 45–58

  15. Kim Y, Duric Z, Richards D (2006) Modified matrix encoding technique for minimal Distortion steganography. In: Proceedings of the 12th international workshop on information hiding (IH), New York, pp 314–327

  16. Kim J, Park H, Park JI (2020) CNN-Based image steganalysis using additional data embedding. Multimed Tools Appl 79(1):1355–1372

    Article  Google Scholar 

  17. Kodovsk J, Fridrich J (2011) Steganalysis in high dimensions: Fusing classifiers built on random subspaces. In: Proceedings of SPIE, Electronic imaging security forensics of multimedia XIII, vol 7880, San Francisco, pp OL 1–13

  18. Kodovský J, Fridrich J (2012) Steganalysis of JPEG images using rich models. In: Proceedings of SPIE, Electronic imaging, media watermarking, security, and forensics of multimedia XIV, vol 8303, San Francisco, pp 0A 1–13

  19. Kodovsk J, Kodovský J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forens Secur 7(3):868–882

    Article  Google Scholar 

  20. Kodovský J, Fridrich J (2013) Quantitative Steganalysis using rich models. In: Proceedings of SPIE, Electronic imaging, media watermarking, security, and forensics XV, vol 8665, San Francisco, p 866500

  21. Li JL, Luo XY, Zhang Y et al (2020) Steganalysis of adaptive steganography under the known cover image. In: Proceedings of international conference on security and privacy in digital economy, pp 560–574

  22. Liu W, Liu G, Dai Y (2014) On recovery of the stego-key in Syndrome-Trellis Codes. Innov Comput Inf Control Express Lett 8(10):2901–2906

    Google Scholar 

  23. Liu J, Tian Y, Han T et al (2016) Stego key searching for LSB steganography on JPEG decompressed image. Sci China Inf Sci 59(3):1–15

    Article  Google Scholar 

  24. Liu J, Gan J, Wang J et al (2019) Efficient stego key recovery based on distribution differences of extracting message bits. Journal of Real-Time Image Processing 16(3):649–660

    Article  Google Scholar 

  25. Liu Q, Wu H, Zhang X (2020) Adaptive video data hiding with low bit-rate growth based on texture selection and ternary Syndrome-Trellis coding. Multimed Tools Appl 79(43):32935–32955

    Article  Google Scholar 

  26. Luo X, Song X, Li X et al (2016) Steganalysis of HUGO steganography based on parameter recognition of Syndrome-Trellis-Codes. Multimed Tools Appl 75(21):13557–13583

    Article  Google Scholar 

  27. Muselli M (1996) Simple expressions for success run distributions in bernoulli trials. Stat Probab Lett 31(2):121–128

    Article  MathSciNet  Google Scholar 

  28. Pan H, Chen Y, Tseng Y (2000) A secure data hiding scheme for two-color images. In: Proceedings of 5th IEEE symposium on computers and communications, Piscataway, pp 750–755

  29. Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of the 12th international workshop on information hiding (IH), Calgary, pp 161–177

  30. Song X, Lin S, Kou W et al (2017) The development of image adaptive steganography and steganalysis technology. Electro Inf Warfare Technol 32(1):70–76

    Google Scholar 

  31. Su A, Ma S, Zhao X (2020) Fast and secure steganography based on j-UNIWARD. EEE Sig Process Lett 27:221–225

    Article  Google Scholar 

  32. Tan S, Li B (2014) Stacked convolutional auto-encoders for steganalysis of digital images. In: Proceedings of the signal and information processing association annual summit and conference (APSIPA), 2014 Asia-Pacific, Chiang Mai, pp 1–4

  33. Tan S, Wu W, Shao Z et al (2020) CALPA-NET: channel-pruning-assisted deep residual network for steganalysis of digital images. IEEE Trans Inf Forens Secur 16:131–146

    Article  Google Scholar 

  34. Xu C, Liu J, Gan J et al (2018) Stego key recovery based on the optimal hypothesis test. Multimed Tools Appl 77(14):17973–17992

    Article  Google Scholar 

  35. You W, Zhang H, Zhao X (2020) A Siamese, CNN for image steganalysis. IEEE Trans Inf Forens Secur 16:291–306

    Article  Google Scholar 

  36. Yousfi Y, Fridrich J (2020) An intriguing struggle of cnns in jpeg steganalysis and the onehot solution. IEEE Sig Process Lett 27:830–834

    Article  Google Scholar 

  37. Zeng J, Tan S, Liu G et al (2019) WISERNEt: wider separate-then-reunion network for steganalysis of color images. IEEE Trans Inf Forens Secur 14 (10):2735–2748

    Article  Google Scholar 

  38. Zhang W, Li S, Liu J (2007) Equivalent key analysis of steganography CPT. Chin J Electron 35(12):2258–2261

    Google Scholar 

  39. Zhang Y, Luo X, Wang J et al (2021) Image robust adaptive steganography adapted to lossy channels in open social networks. Inf Sci 564:306–326

    Article  MathSciNet  Google Scholar 

  40. Zhang R, Zhu F, Liu J, Liu G (2020) Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis. IEEE Trans Inf Forens Secur 15:1138–1150

    Article  Google Scholar 

  41. Zhu L, Luo X, Yang C et al (2021) Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography. Sig Process 183:108015

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Founddation of China (No.U1804263, U1736214, U1636219, 61602508, and 61772549), the National Key R&D Program of China (No.2016- YFB0801303,2016QY01W0105) and the Plan for Scientific Innovation Talent of Henan Province (No. 184200510018).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangyang Luo.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Du, H., Liu, J., Tian, Y. et al. Steganographic key recovery for adaptive steganography under “known-message attacks”. Multimed Tools Appl 81, 10981–11004 (2022). https://doi.org/10.1007/s11042-022-12109-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12109-6

Keywords

Navigation