skip to main content
10.1145/1022431.1022444acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

Hidden Markov models and steganalysis

Published: 20 September 2004 Publication History

Abstract

In this paper we presented a novel approach to steganalysis. We formulated two problems for steganalysis and showed that these problems can be solved using the theory of hidden markov models, the case of LSB encoding is discussed in detail. Some suggestions about steganalysis of images using hidden markov field model conclude the paper.

References

[1]
J. Anigbogu and A. Belaid. Hidden markov models in text recognition. IJPRAI, 9(6):925--958, 1995.]]
[2]
C. Cachin. An information-theoretic model for steganography. Lecture Notes in Computer Science, 1525:306--318, 1998.]]
[3]
G. Celeux, F. Forbes, and N. Peyrard. EM procedures using mean field-like approximations for markov model-based image segmentation. Pattern Recognition, 36(1):131--144, 2003.]]
[4]
B. Chalmond. An iterative gibbsian technique for reconstruction of m-ary images. Pattern Recognition, 22(6):747--761, 1989.]]
[5]
S. Dumitrescu, X. Wu, and Z. Wang. Detection of LSB steganography via sample pair analysis. In IEEE Transactions on Signal Processing, pages 1995--2007, July 2003.]]
[6]
J. Fridrich and R. D. M. Goljan. Reliable detection of LSB steganography in grayscale and color images. In Proc. of the ACM Workshop on Multimedia and Security, pages 27--30, October 2001.]]
[7]
N. F. Johnson, Z. Duric, and S. Jajodia. Information hiding: steganography and watermarking - attacks and countermeasures. Kluwer, USA, 2000.]]
[8]
P. Moulin and J. O'Sullivan. Information-theoretic analysis of information hiding. Preprint submitted to IEEE Trans. on Information Theory, October 1999.]]
[9]
L. R. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257--286, February 1989.]]
[10]
M. Sidorov. A statistical steganalysis for digital images. In Proc. of the International I & S Workshop, pages 34--36, January 2004.]]
[11]
K. Sullivan, O. Dabeer, U. Madhow, B. Manjunath, and S. Chandrasekaran. LLRT based detection of LSB hiding. In IEEE International Conference on Image Processing (ICIP), September 2003.]]
[12]
G. Winkler. Image Analysis, Random Fields and Dynamic Monte Carlo Methods. Springer Verlag, 1995.]]
[13]
J. Zhang. The mean field theory in EM procedures for markov random fields. IEEE Transactions on Signal Processing, 40(10):2570--2583, 1992.]]

Cited By

View all
  • (2012)A Framework Components for Natural Language SteganalysisInternational Journal of Computer Theory and Engineering10.7763/IJCTE.2012.V4.548(641-645)Online publication date: 2012
  • (2009)Fisher Information Determines Capacity of ε-Secure SteganographyInformation Hiding10.1007/978-3-642-04431-1_3(31-47)Online publication date: 3-Sep-2009
  • (2007)The Security Threat Posed by Steganographic Content on the InternetProceedings of the International Conference on Information Technology10.1109/ITNG.2007.192(794-798)Online publication date: 2-Apr-2007
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MM&Sec '04: Proceedings of the 2004 workshop on Multimedia and security
September 2004
236 pages
ISBN:1581138547
DOI:10.1145/1022431
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 September 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. hidden markov models
  2. steganalysis
  3. steganography

Qualifiers

  • Article

Conference

MM&Sec '04
Sponsor:
MM&Sec '04: Multimedia and Security Workshop 2004
September 20 - 21, 2004
Magdeburg, Germany

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2012)A Framework Components for Natural Language SteganalysisInternational Journal of Computer Theory and Engineering10.7763/IJCTE.2012.V4.548(641-645)Online publication date: 2012
  • (2009)Fisher Information Determines Capacity of ε-Secure SteganographyInformation Hiding10.1007/978-3-642-04431-1_3(31-47)Online publication date: 3-Sep-2009
  • (2007)The Security Threat Posed by Steganographic Content on the InternetProceedings of the International Conference on Information Technology10.1109/ITNG.2007.192(794-798)Online publication date: 2-Apr-2007
  • (2006)Steganalysis for Markov cover data with applications to imagesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2006.8735951:2(275-287)Online publication date: 1-Nov-2006
  • (2005)Applications of a hidden Markov field model in steganalysis of imagesDiscrete Mathematics and Applications10.1515/15693920577446492715:4Online publication date: 1-Jan-2005

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media