skip to main content
10.1145/1073170.1073176acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

LSB steganalysis based on high-order statistics

Published: 01 August 2005 Publication History

Abstract

We propose a general framework for the detection of the LSB steganography using digital media files as cover objects. The new framework exploits high-order statistics of the samples. It can compute a robust estimate of the length of a secret message hidden in the least significant bits of samples for a large class of digital media contents such as image, video and audio, in which the underlying signals consist of correlated samples. A case study on the LSB steganalysis of natural grey-scale and color images and experimental results are reported.

References

[1]
R. Bohme and A. Westfeld, "Exploiting Preserved Statistics for Steganalysis", Pre-proceedings of 6th International Workshop on Information Hiding, Toronto, May 2004.]]
[2]
S. Dumitrescu, X. Wu, and Z. Wang, "Detection of LSB Steganography via Sample Pair Analysis", IEEE Transactions on Signal Processing, vol. 51, no. 7, July 2003, pp. 1995--2007.]]
[3]
J. Fridrich, R. Du, M. Long, "Steganalysis of LSB Encoding in Color Images", Proc. of ICME 2000, NYC, July 31-Aug. 2, USA.]]
[4]
J. Fridrich, M. Goljan and R. Du, "Reliable Detection of LSB Steganography in Color and Grayscale Images". Proc. of ACM Workshop on Multimedia and Security, Ottawa, Oct. 5, 2001, pp. 27--30.]]
[5]
J. Fridrich, M. Goljan, D. Hogea, and D. Soukal, "Quantitative Steganalysis of Digital Images: Estimating the Secret Message Length", Multimedia Systems, 2003.]]
[6]
J. Fridrich, "Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes", Pre-proceedings of 6th International Workshop on Information Hiding, Toronto, May 2004.]]
[7]
N. F. Johnson, S. Jajodia, "Steganalysis of Images created using current steganography software", in David Aucsmith (Ed.): Information Hiding, LNCS 1525, pp. 32--47. Springer-Verlag, 1998.]]
[8]
N. F. Johnson, S. Katzenbeisser, "A Survey of steganographic techniques", in S. Katzenbeisser and F. Petitcolas (Eds.): Information Hiding, pp. 43--78. Artech House, Norwood, MA, 2000.]]
[9]
A. Ker, "Improved Detection of LSB Steganography in Grayscale Images", Pre-proceedings of 6th International Workshop on Information Hiding, Toronto, May 2004.]]
[10]
P. Lu, X. Luo, Q. Tang, and L. Shen, " An Improved Sample Pairs Method for Detection of LSB Embedding", Pre-proceedings of 6th International Workshop on Information Hiding, Toronto, May 2004.]]
[11]
A. Westfeld, A. Pfitzmann, "Attacks on Steganographic Systems", in Andreas Pfitzmann (Ed.): Information Hiding, LNCS 1768, pp. 61--76, Springer-Verlag, 1999.]]

Cited By

View all
  • (2022)Securing LSB embedding against structural steganalysisJournal of Computer Security10.3233/JCS-20012330:4(517-539)Online publication date: 1-Jan-2022
  • (2019)Reference Channels for Steganalysis of Images with Convolutional Neural NetworksProceedings of the ACM Workshop on Information Hiding and Multimedia Security10.1145/3335203.3335733(188-197)Online publication date: 2-Jul-2019
  • (2015)Modification of Steganographic Algorithm Using LSB and a Set of StegomediaActa Informatica Pragensia10.18267/j.aip.734:3(258-275)Online publication date: 31-Dec-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MM&Sec '05: Proceedings of the 7th workshop on Multimedia and security
August 2005
164 pages
ISBN:1595930329
DOI:10.1145/1073170
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. LSB steganography
  2. digital media
  3. steganalysis

Qualifiers

  • Article

Conference

MM&Sec '05
Sponsor:
MM&Sec '05: Multimedia and Security Workshop 2005
August 1 - 2, 2005
NY, New York, USA

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Securing LSB embedding against structural steganalysisJournal of Computer Security10.3233/JCS-20012330:4(517-539)Online publication date: 1-Jan-2022
  • (2019)Reference Channels for Steganalysis of Images with Convolutional Neural NetworksProceedings of the ACM Workshop on Information Hiding and Multimedia Security10.1145/3335203.3335733(188-197)Online publication date: 2-Jul-2019
  • (2015)Modification of Steganographic Algorithm Using LSB and a Set of StegomediaActa Informatica Pragensia10.18267/j.aip.734:3(258-275)Online publication date: 31-Dec-2015
  • (2015)STABYLO: steganography with adaptive, Bbs, and binary embedding at low costannals of telecommunications - annales des télécommunications10.1007/s12243-015-0466-770:9-10(441-449)Online publication date: 12-Jun-2015
  • (2012)Steganalysis of LSB replacement using parity-aware featuresProceedings of the 14th international conference on Information Hiding10.1007/978-3-642-36373-3_3(31-45)Online publication date: 15-May-2012
  • (2011)LSB Steganographic Detection Using Compressive SensingIntelligent Interactive Multimedia Systems and Services10.1007/978-3-642-22158-3_22(219-225)Online publication date: 2011
  • (2009)Detection of Hidden Information, Covert Channels and Information FlowsWiley Handbook of Science and Technology for Homeland Security10.1002/9780470087923.hhs427(1-37)Online publication date: 15-Jun-2009
  • (2007)The Security Threat Posed by Steganographic Content on the InternetProceedings of the International Conference on Information Technology10.1109/ITNG.2007.192(794-798)Online publication date: 2-Apr-2007
  • (2006)SteganalysisMultimedia Security Technologies for Digital Rights Management10.1016/B978-012369476-8/50016-6(349-381)Online publication date: 2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media