Abstract
Since the performance of STC (Syndrome-Trellis Codes) is approaching the theoretical optimum in minimizing embedded distortion, STC-based adaptive steganography has become the focus of forward improvement and the difficulty of reverse analysis of steganography algorithms. At present, the researches on secret message extraction from STC-based adaptive steganography are mainly focused on the scenario where the secret message is plaintext and part of the plaintext format information is known, while it needs to be studied when these characteristics are unknown. Analogous to the “known-plaintext attack” in cryptanalysis, this manuscript proposes a steganographic key recovery algorithm under the condition of “known-message attack”. Firstly, by studying the structure characteristics of STC parity-check matrix, the concept of basic row vector is proposed, and the problem of secret message extraction attack is transformed into the problem of solving the basic row vectors. Then, the existence of bit string with special structure in the differential sequences of stego sequences is proved. Finally, using the distribution characteristics of the special bit strings in the differential sequence, the problem of solving the basic row vectors is transformed into the problem of solving the simple linear equation system through the differential analysis, and good code judgment criteria is used to filter out the correct steganographic key. The research results of this manuscript can realize the secret message extraction attack when the secret message is ciphertext, which is expected to solve the application requirements of actual scenarios. At the same time, the experimental results also show that, based on the algorithm proposed in this manuscript, only a PC can be used to extract secret message from the common STC-based adaptive steganography algorithm.
Similar content being viewed by others
References
Abdulla AA, Jassim SA, Sellahewa H (2013) Secure steganography technique based on bitplane indexes. In: Proceedings of the 1st ACM workshop on information hiding and multimedia security, vol 12, Montpellier, France, pp 45–58
Abdulla AA, Jassim SA, Sellahewa H (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. In: Proceedings of international conference on research in security standardisation, pp 151–166
Boroumand M, Chen M, Fridrich J (2019) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forens Secur 14(5):1181–1193
Chen J, Liu J, Zhang W et al (2013) Cryptographic secrecy analysis of matrix embedding. Int J Comput Intell Syst 6(4):639–647
Chen B, Luo W, Zheng P (2019) Enhancing steganography via stego post-processing by reducing image residual difference. In: Proceedings of the 7th ACM workshop on information hiding and multimedia security (IH&MMSec), New York, no. 63–68
Denemark T, Fridrich J (2017) Steganography with multiple JPEG images of the same scene. IEEE Trans Inf Forens Secur 12(10):2308–2319
Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using Syndrome-Trellis Codes. IEEE Trans Inf Forens Secur (WIFS) 6(3):920–935
Fridrich J, Goljan M, Soukal D et al (2004) Searching for the stego key. In: Proceedings of SPIE-electronic imaging, security, steganography and watermaking of multimedia contents VI, vol 5306, San Jose, pp 70–82
Fridrich J, Goljan M, Lisonek P et al (2005) Writing on wet paper. IEEE Trans Sig Process 53(10):3923–3935
Fridrich J, Goljan M, Soukal D et al (2005) Forensic steganalysis: Determining the stego key in spatial domain steganography. In: Proceedings of SPIE, security, steganography, and watermarking of multimedia contents VII, vol 5681, San Jose, CA, pp 631–642
Gan J, Liu J, Luo X et al (2017) Reliable steganalysis of HUGO steganography based on partially known plaintext. Multimed Tools Appl 77(14):18007–18027
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Proceedings of the 4th IEEE international workshop on information forensics and security (IH&MMSec), Tenerife, Spain, pp 234–239
Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the 1st ACM information hiding and multimedia security workshop (IH&MMSec), Montpellier, France, pp 59–68
Ker AD, Bas P, Rainer B et al (2013) Moving steganography and steganalysis from the laboratory into the real word. In: Proceedings of the 1st ACM workshop on information hiding and multimedia security, vol 12, Montpellier, France, pp 45–58
Kim Y, Duric Z, Richards D (2006) Modified matrix encoding technique for minimal Distortion steganography. In: Proceedings of the 12th international workshop on information hiding (IH), New York, pp 314–327
Kim J, Park H, Park JI (2020) CNN-Based image steganalysis using additional data embedding. Multimed Tools Appl 79(1):1355–1372
Kodovsk J, Fridrich J (2011) Steganalysis in high dimensions: Fusing classifiers built on random subspaces. In: Proceedings of SPIE, Electronic imaging security forensics of multimedia XIII, vol 7880, San Francisco, pp OL 1–13
Kodovský J, Fridrich J (2012) Steganalysis of JPEG images using rich models. In: Proceedings of SPIE, Electronic imaging, media watermarking, security, and forensics of multimedia XIV, vol 8303, San Francisco, pp 0A 1–13
Kodovsk J, Kodovský J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forens Secur 7(3):868–882
Kodovský J, Fridrich J (2013) Quantitative Steganalysis using rich models. In: Proceedings of SPIE, Electronic imaging, media watermarking, security, and forensics XV, vol 8665, San Francisco, p 866500
Li JL, Luo XY, Zhang Y et al (2020) Steganalysis of adaptive steganography under the known cover image. In: Proceedings of international conference on security and privacy in digital economy, pp 560–574
Liu W, Liu G, Dai Y (2014) On recovery of the stego-key in Syndrome-Trellis Codes. Innov Comput Inf Control Express Lett 8(10):2901–2906
Liu J, Tian Y, Han T et al (2016) Stego key searching for LSB steganography on JPEG decompressed image. Sci China Inf Sci 59(3):1–15
Liu J, Gan J, Wang J et al (2019) Efficient stego key recovery based on distribution differences of extracting message bits. Journal of Real-Time Image Processing 16(3):649–660
Liu Q, Wu H, Zhang X (2020) Adaptive video data hiding with low bit-rate growth based on texture selection and ternary Syndrome-Trellis coding. Multimed Tools Appl 79(43):32935–32955
Luo X, Song X, Li X et al (2016) Steganalysis of HUGO steganography based on parameter recognition of Syndrome-Trellis-Codes. Multimed Tools Appl 75(21):13557–13583
Muselli M (1996) Simple expressions for success run distributions in bernoulli trials. Stat Probab Lett 31(2):121–128
Pan H, Chen Y, Tseng Y (2000) A secure data hiding scheme for two-color images. In: Proceedings of 5th IEEE symposium on computers and communications, Piscataway, pp 750–755
Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of the 12th international workshop on information hiding (IH), Calgary, pp 161–177
Song X, Lin S, Kou W et al (2017) The development of image adaptive steganography and steganalysis technology. Electro Inf Warfare Technol 32(1):70–76
Su A, Ma S, Zhao X (2020) Fast and secure steganography based on j-UNIWARD. EEE Sig Process Lett 27:221–225
Tan S, Li B (2014) Stacked convolutional auto-encoders for steganalysis of digital images. In: Proceedings of the signal and information processing association annual summit and conference (APSIPA), 2014 Asia-Pacific, Chiang Mai, pp 1–4
Tan S, Wu W, Shao Z et al (2020) CALPA-NET: channel-pruning-assisted deep residual network for steganalysis of digital images. IEEE Trans Inf Forens Secur 16:131–146
Xu C, Liu J, Gan J et al (2018) Stego key recovery based on the optimal hypothesis test. Multimed Tools Appl 77(14):17973–17992
You W, Zhang H, Zhao X (2020) A Siamese, CNN for image steganalysis. IEEE Trans Inf Forens Secur 16:291–306
Yousfi Y, Fridrich J (2020) An intriguing struggle of cnns in jpeg steganalysis and the onehot solution. IEEE Sig Process Lett 27:830–834
Zeng J, Tan S, Liu G et al (2019) WISERNEt: wider separate-then-reunion network for steganalysis of color images. IEEE Trans Inf Forens Secur 14 (10):2735–2748
Zhang W, Li S, Liu J (2007) Equivalent key analysis of steganography CPT. Chin J Electron 35(12):2258–2261
Zhang Y, Luo X, Wang J et al (2021) Image robust adaptive steganography adapted to lossy channels in open social networks. Inf Sci 564:306–326
Zhang R, Zhu F, Liu J, Liu G (2020) Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis. IEEE Trans Inf Forens Secur 15:1138–1150
Zhu L, Luo X, Yang C et al (2021) Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography. Sig Process 183:108015
Acknowledgements
This work was supported by the National Natural Science Founddation of China (No.U1804263, U1736214, U1636219, 61602508, and 61772549), the National Key R&D Program of China (No.2016- YFB0801303,2016QY01W0105) and the Plan for Scientific Innovation Talent of Henan Province (No. 184200510018).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Du, H., Liu, J., Tian, Y. et al. Steganographic key recovery for adaptive steganography under “known-message attacks”. Multimed Tools Appl 81, 10981–11004 (2022). https://doi.org/10.1007/s11042-022-12109-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-12109-6