Skip to main content
Log in

Universal secret payload location identification in spatial LSB stego images

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

Locating steganographic payload is an important aspect of active steganalysis which deals with finding the pixel locations of the embedded secret message (payload) in the stego image. The residual-based payload location detectors are well suited for this purpose. In this paper, an improved universal, blind method of precisely identifying locations in the spatial domain using enhanced weighted residuals with only a few known stego images is proposed. This is done by estimating the cover from the available stego image using the proposed novel locally weighted bivariate shrinkage function in the transform domain. The enhanced weighted residuals ensure that the proposed method is universally applicable for detecting payload locations in spatial least significant bit stego images. The added advantage of the proposed method is that it does not require any prior knowledge of the cover source or the embedding algorithm to determine the exact locations. Experiments conducted on five spatial LSB domain algorithms show that the payload locations can be precisely estimated with a minimum accuracy of 90% with 100 known stego images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Pevnỳ T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215–224

    Article  Google Scholar 

  2. Fridrich J, Kodovský J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7(3):868–882

    Article  Google Scholar 

  3. Holub V, Fridrich J (2013) Random projections of residuals for digital image steganalysis. IEEE Transactions on Information Forensics and Security 8(12):1996–2006

    Article  Google Scholar 

  4. Gkizeli M, Pados D A, Medley M J (2007) Optimal signature design for spread-spectrum steganography. IEEE Trans Image Process 16(2):391–405

    Article  MathSciNet  Google Scholar 

  5. Valizadeh A, Wang Z J (2011) Correlation-and-bit-aware spread spectrum embedding for data hiding. IEEE Trans Inf Forensic Secur 6(2):267–282

    Article  Google Scholar 

  6. Mayer J (2011) Improved spread spectrum multibit watermarking. In: IEEE International Workshop on Information Forensics and Security,(WIFS) (2011), pp 1–6

  7. Gkizeli M, Pados DA, Batalama SN, Medley MJ (2005) Blind iterative recovery of spread-spectrum steganographic messages. In: IEEE International Conference on Image Processing, vol 2 (2005), vol 2, pp II–1098–101

  8. Li M, Kulhandjian M K, Pados D A, Batalama S N, Medley M J (2013) Extracting spread-spectrum hidden data from digital media. IEEE Trans Inf Forensic Secur 8(7):1201–1210

    Article  Google Scholar 

  9. Li M, Liu Q (2015) Steganalysis of ss steganography: hidden data identification and extraction. Circ Syst Sign Process 34(10):3305–3324

    Article  Google Scholar 

  10. Fridrich J, Goljan M, Soukal D, Holotyak T (2005) Forensic steganalysis: determining the stego key in spatial domain steganography. In: Electronic Imaging (International Society for Optics and Photonics 2005), pp 631–642

  11. Steganography software. http://www.jjtc.com/Steganography/tools.html Accessed on 27 July 2017

  12. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensic Secur 5(2):201–214

    Article  Google Scholar 

  13. Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of the International Workshop on Information Hiding (Springer 2010), pp 161–177

  14. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: International Workshop on Information Forensics and Security (IEEE 2012), pp 234–239

  15. Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on Information hiding and multimedia security (ACM 2013), pp 59–68

  16. Sharp T (2001) An implementation of key-based digital signal steganography. In: Moskowitz I (ed) Information Hiding, Lecture Notes in Computer Science, vol. 2137, (2001). Springer, Berlin Heidelberg, pp 13–26

  17. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287

    Article  Google Scholar 

  18. Ker AD, Lubenko I (2009) Feature reduction and payload location with WAM steganalysis. In: IS&T/SPIE Electronic Imaging (International Society for Optics and Photonics, 2009), pp 7254–7254–13

  19. Luo Y, Li X, Yang B (2011) Locating steganographic payload for LSB matching embedding. In: Proceedings of the International Conference on Multimedia and Expo (IEEE 2011), pp 1–6

  20. Quach TT (2011) On locating steganographic payload using residuals. In: Proceedings of the Media Watermarking, Security, and Forensics XIII (SPIE, 2011), pp 7880–7880–7

  21. Gui X, Li X, Yang B (2012) Improved payload location for LSB matching steganography. In: Proceedings of the 19th International Conference on Image Processing (IEEE 2012), pp 1125–1128

  22. Quach TT (2014) Cover estimation and payload location using Markov random fields. In: IS&T/SPIE Electronic Imaging (International Society for Optics and Photonics, 2014), pp 9028–9028–9

  23. Provos N, Honeyman P (2001) Detecting steganographic content on the internet. Tech. rep., Center for Information Technology Integration

  24. Ker A D (2008) Locating steganographic payload via WS residuals. In: Proceedings of the 10th ACM workshop on Multimedia and security (ACM 2008), pp 27–32

  25. Quach T T (2011) Optimal cover estimation methods and steganographic payload location. IEEE Trans Inf Forensic Secur 6(4):1214–1222

    Article  Google Scholar 

  26. Lubenko I, Ker AD (2011) Steganalysis using logistic regression. In: IS&T/SPIE Electronic Imaging (International Society for Optics and Photonics, 2011), pp 7880–7880–11

  27. Sendur L, Selesnick I W (2002) Bivariate shrinkage functions for wavelet-based denoising exploiting interscale dependency. IEEE Trans Signal Process 50(11):2744–2756

    Article  Google Scholar 

  28. Veena S T, Arivazhagan S (2018) Quantitative steganalysis of spatial LSB based stego images using reduced instances and features. Pattern Recogn Lett 105(C):39–49

    Article  Google Scholar 

  29. Kingsbury N (2000) A dual-tree complex wavelet transform with improved orthogonality and symmetry properties. In: Proceedings of International Conference on Image Processing, vol 2 (IEEE 2000), vol 2, pp 375–378

  30. Zong H, Liu Fl, Luo Xy (2012) Blind image steganalysis based on wavelet coefficient correlation. Digit Investig 9(1):58–68

    Article  Google Scholar 

  31. Donoho D L, Johnstone I M (1994) Ideal spatial adaptation by wavelet shrinkage. Biometrika 81(3):425–455

    Article  MathSciNet  MATH  Google Scholar 

  32. Rao M V G, Venu G, Vathsal S (2009) Local adaptive bivariate shrinkage function for medicalimage denoising. Int J Electr Eng 1(1):59–65

    Google Scholar 

  33. Ker AD, Böhme R (2008) Revisiting weighted stego-image steganalysis. In: Electronic Imaging 2008 (International Society for Optics and Photonics, 2008), pp 681,905–681,905–17

  34. Bas P, Filler T, Pevný T (2011) Break our steganographic system: the ins and outs of organizing boss. In: Proceedings of the 13th International Conference on Information Hiding. Springer, Berlin, Heidelberg, pp 59–70

Download references

Acknowledgements

The authors would like to express their sincere gratitude to the Management and Principal of MSEC and KCET for providing the necessary facilities and support to carry out this research work. The authors would also like to thank Mrs. Ramya and Mrs. Sylvia for meticulously proofreading this research article and providing valuable inputs.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. T. Veena.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Veena, S.T., Arivazhagan, S. Universal secret payload location identification in spatial LSB stego images. Ann. Telecommun. 74, 273–286 (2019). https://doi.org/10.1007/s12243-018-0676-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-018-0676-x

Keywords

Navigation