Skip to main content
Log in

Steganalysis of stochastic modulation steganography

  • Published:
Science in China Series F Aims and scope Submit manuscript

Abstract

Stochastic modulation steganography embeds secret message within the cover image by adding stego-noise with a specific probabilistic distribution. No method is known to be applicable to the estimation of stochastic modulation steganography. By analyzing the distributions of the horizontal pixel difference of images before and after stochastic modulation embedding, we present a new steganalytic approach to accurately estimate the length of secret message in stochastic modulation steganography. The proposed method first establishes a model describing the statistical relationship among the differences of the cover image, stego-image and stego-noise. In the case of stego-image-only steganalysis, rough estimate of the distributional parameters of the cover image’s pixel difference is obtained with the use of the provided stego-image. And grid search and Chi-square goodness of fit test are exploited to estimate the length of the secret message embedded with stochastic modulation steganography. The experimental results demonstrate that our new approach is effective for steganalyzing stochastic modulation steganography and accurately estimating the length of the secret message.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Anderson R J, Petitcolas F A P. On the limits of steganography. IEEE J Selected Areas in Commun, Special Issue on Copyright and Privacy Protection, 1998, 16(4): 474–481

    Google Scholar 

  2. Johnson N F, Jajodia S. Steganalysis of images created using current steganography software. Lecture Notes in Computer Science, 1998, 1525: 273–289

    Google Scholar 

  3. Steganography information, software, and news to enhance your privacy. http://www.stegoarchive.com

  4. Westfeld A, Pfitzmann A. Attacks on steganographic systems. Lecture Notes in Computer Science, 1999, 1768: 61–76

    Google Scholar 

  5. Provos N, Honeyman P. Detecting steganographic content on the Internet. Technical Report CITI 01-1a, University of Michigan, 2001

  6. Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia Magazine, Special Issue on Security, 2001, 8: 22–28

    Google Scholar 

  7. Zhang T, Ping X J. Reliable detection of spatial LSB steganography based on difference histogram. J Software China, 2004, 15(1): 151–158

    MATH  Google Scholar 

  8. Dumitrescu S, Wu X, Wang Z. Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Processing, 2003, 51(7): 1995–2007

    Article  Google Scholar 

  9. Sharp T. An implementation of key-based digital signal steganography. Lecture Notes in Computer Science, 2001, 2137: 13–26

    Article  MATH  Google Scholar 

  10. Marvel L M, Boncelet C G, Retter C T. Spread spectrum image steganography. IEEE Trans Image Processing, 1999, 8(8): 1075–1083

    Article  Google Scholar 

  11. Fridrich J, Goljan M. Digital image steganography using stochastic modulation. In: Proceedings of SPIE: Security and Watermarking of Multimedia Contents V, 2003, 5020: 191–202

    Google Scholar 

  12. Westfeld A. Detecting low embedding rates. Lecture Notes in Computer Science, 2003, 2578: 324–339

    MATH  Google Scholar 

  13. Harmsen J J, Pearlman W A. Steganalysis of additive noise modelable information hiding. In: Proceedings of SPIE: Electronic Imaging, Santa Clara, 2003. 21–24

  14. Huang J, Mumford D. Statistics of natural images and models. In: Proceedings of IEEE Conference: Computer Vision and Pattern Recognition, 1999. 541–547

  15. Mallat S G. A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans Patt Anal Mach Intell, 1989, 11(7): 674–693

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huang Jiwu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

He, J., Huang, J. Steganalysis of stochastic modulation steganography. SCI CHINA SER F 49, 273–285 (2006). https://doi.org/10.1007/s11432-006-0273-x

Download citation

  • Received:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-006-0273-x

Keywords

Navigation