Skip to main content
Log in

Efficient stego key recovery based on distribution differences of extracting message bits

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

The extraction of embedded messages, i.e., extraction attacks are the ultimate purpose of steganalysis, with great practical significance to obtain covert communication content and covert communication forensics. For steganography using a stego key, the extraction attacks are equivalent to the stego key recovery. This paper mainly studies the methods of efficient stego key recovery for LSB steganography in JPEG domain. According to the distribution differences of extracting message bits generated by the correct and incorrect keys, stego key recovery is transformed into the hypothesis test of the message bits distribution extracted by the correct and incorrect keys. Firstly, by fitting the message bits distribution extracted by the correct key, a stego key recovery method based on nonparametric hypothesis test is proposed. Secondly, by utilizing the distribution differences between message bits extracted by the correct and incorrect keys, a stego key recovery method based on parametric hypothesis test is proposed. And then, formulas are given for calculating the sample size and threshold in the proposed stego key recovery model, on the basis of type I error and type II error. Experimental results show that the proposed method can successfully recover the stego key of OutGuess 0.13b, OutGuess0.2, JPEG domain random LSB matching steganography and random F3 steganography, the performance is superior to that of existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. NRCS Photo Gallery. http://www.nrcs.usda.gov/.

References

  1. Qin, C., Chang, C.C., Huang, Y.H., Liao, L.T.: An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circ. Syst. Video Technol. 23(7), 1109–1118 (2013)

    Article  Google Scholar 

  2. Zhang, Y., Qin, C., Zhang, W.M., Liu, F.L., Luo, X.Y.: On the fault-tolerant performance for a class of robust image steganography. Sig. Process. 146, 99–111 (2018)

    Article  Google Scholar 

  3. Qin, C., Chang, C.C., Chiu, Y.P.: A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans. Image Process. 23(3), 969–978 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  4. Ma, Y.Y., Luo, X.Y., Li, X.L., Bao, Z.K., Zhang, Y.: Selection of rich model steganalysis features based on decision rough set α-positive region reduction. IEEE Trans. Circ. Syst. Video Technol. 99, 1 (2018). https://doi.org/10.1109/TCSVT.2018.2799243

    Article  Google Scholar 

  5. Luo, X.Y., Song, X.F., Li, X.L., Zhang, W.M., Lu, J.C., Yang, C.F., Liu, F.L.: Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multimed. Tools Appl. 75(21), 13557–13583 (2016)

    Article  Google Scholar 

  6. Upham, D.: JPEG-JSteg-V4, steganographic algorithm JSteg. http://zooid.org/paul/crypto/jsteg

  7. Provos, N.: Defending against statistical steganalysis. Proceedings of the 10th conference on USENIX Security Symposium-Volume 10, USENIX Association, pp. 24–24 (2001)

  8. Westfeld, A.: F5-A steganographic algorithm. Proceedings of the 4th International Workshop on Information Hiding, Springer-Verlag, pp 289–302 (2001)

  9. Guo, L.J., Ni, J.Q., Shi, Y.Q.: Uniform embedding for efficient JPEG Steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814–825 (2014)

    Article  Google Scholar 

  10. Holub, V., Fridrich, J.: Digital image steganography using universal distortion. Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, pp. 59–68 (2013)

  11. Wang, Z.C., Zhang, X.P., Yin, Z.X.: Hybrid distortion function for JPEG steganography. J. Electron. Imaging 25(5), 050501 (2016)

    Article  Google Scholar 

  12. Denemark, T., Fridrich, J.: Model based steganography with precover. Electron. Imaging. 2017(7), 56–66 (2017)

  13. Gan, J.J., Liu, J.F., Luo, X.Y., Yang, C.F., Liu, F.L.: Reliable steganalysis of HUGO steganography based on partially known plaintext. Multimed. Tools Appl. (2017). https://doi.org/10.1007/s11042-017-5134-7

    Google Scholar 

  14. Fridrich, J., Goljan, M., Soukal, D.: Searching for the stego-key. Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, pp. 70–82 (2004)

  15. Pevný, T., Ker, A.D.: Steganographic key leakage through payload metadata. Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security, pp. 109–114 (2014)

  16. Fridrich, J., Goljan, M., Soukal, D., Holotyak, T.: Forensic steganalysis: determining the stego key in spatial domain steganography. Proceedings of SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, pp. 631–642 (2005)

  17. Liu, J., Tang, G.M.: Stego key estimation in LSB steganography. J. Multimed. 7(4), 309–313 (2012)

    Article  Google Scholar 

  18. Chen, J.Y., Zhu, Y.F., Zhang, W.M., Liu, J.F.: Chosen-key extracting attack to random LSB steganography. J. Commun. 31(5), 73–80 (2010)

    Google Scholar 

  19. Liu, J.F., Tian, Y.G., Han, T., Wang, J.C., Luo, X.Y.: Stego key searching for LSB steganography on JPEG decompressed image. Sci. China Inf. Sci. 59(3), 1–15 (2016)

    Article  Google Scholar 

  20. Xu, C., Liu, J.F., Gan, J.J., Luo, X.Y.: Stego key recovery based on the optimal hypothesis test. Multimed. Tools Appl. 2017(4), 1–20 (2017). https://doi.org/10.1007/s11042-017-4878-4

    Google Scholar 

  21. Giannoula, A., Boulgouris, N.V., Hatzinakos, D., Plataniotis, K.: Watermark detection for noisy interpolated images. IEEE Trans. Circ. Syst. II Express Briefs 53(5), 359–403 (2006)

    Article  Google Scholar 

  22. Lehmann, E.L., Romano, J.P.: Testing Statistical Hypotheses. Springer, Berlin (2006)

    MATH  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant no. U1636219, U1736214, 61572052, 61602508, and 61772549), the National Key R&D Program of China (Grant no. 2016YFB0801303 and 2016QY01W0105), Plan for Scientific Innovation Talent of Henan Province (no. 2018JR0018), and the Key Technologies R&D Program of Henan Province (Grant no.162102210032).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangyang Luo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, J., Gan, J., Wang, J. et al. Efficient stego key recovery based on distribution differences of extracting message bits. J Real-Time Image Proc 16, 649–660 (2019). https://doi.org/10.1007/s11554-018-0805-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-018-0805-9

Keywords

Navigation