Reliable Detection of Spatial LSB Steganography Based on Difference Histogram
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [16]
  • |
  • Related [20]
  • |
  • Cited by [49]
  • | |
  • Comments
    Abstract:

    Detection of hidden messages in images is of great importance for both the network information security and the improvement of security of steganographic algorithms. Based on the statistical observations on the difference histogram of images, a new steganalytic technique capable of a reliable detection of the spatial LSB (least significant bit) steganography is proposed. Translation coefficients between the difference histograms are defined as a measure of the weak correlation between the LSB plane and the remained bit planes, and then used to construct a classifier to discriminate the stego-image from the carrier-image. The algorithm can not only detect the existence of hidden messages embedded using LSB replacement in images reliably, but also estimate the amount of hidden messages exactly. It has a distinct physical meaning and can be implemented conveniently. Experimental results show that for raw losslessly stored images, the new algorithm has a better performance than the RS (regular singular) steganalysis method and improves the computation speed significantly. The new approach is also applicable for color images.

    Reference
    [1]Petitcolas FAP, Anderson RJ, Kuhn MG. Information hiding-A survey. Proceedings of the IEEE, 1999,87(7):1062~1078.
    [2]Johnson NF, Jajodia S. Steganalysis of images created using current steganography software. In: Aucsmith D, ed. Proc. of the 2nd Int'l. Workshop on Information Hiding. Lecture Notes on Computer Science 1525, Berlin: Springer-Verlag, 1998. 273~289.
    [3]Fridrich J, Goljan M. Practical steganalysis: State of the art. In: Delp EJ, Wong PW, eds. Proc. of the SPIE Vol. 4675, Security and Watermarking of Multimedia Contents IV. San Jose: SPIE, 2002. 1~13.
    [4]Westfeld A, Pfitzmann A. Attacks on steganographic systems. In: Pfitzmann A, ed. Proc. of the 3rd Int'l. Workshop on Information Hiding. Lecture Notes on Computer Science 1768, Berlin: Springer-Verlag, 1999. 61~76.
    [5]Fridrich J, Goljan M, Du R. Reliable detection of LSB steganography in grayscale and color images. In: Dittmann J, Nahrstedt K, et al. eds. Proc. of the ACM Workshop on Multimedia and Security. Ottawa: ACM Press, 2001. 27~30.
    [6]Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, 2001,8(4):22~28.
    [7]Avcibas I, Memon ND, Sankur B. Steganalysis based on image quality metrics. In: Dugelay J-L, Rose K, eds. Proc. of the IEEE 4th Workshop on Multimedia Signal Processing. Cannes: IEEE, 2001. 517~522.
    [8]Farid H. Detecting hidden messages using higher-order statistical models. In: Proc. Of the IEEE Int'l. Conf. On Image Processing 02, Vol Ⅱ. New York: IEEE, 2002. 905~908.
    [9]Pal SK, Saxena PK, Muttoo SK. A systematic approach to steganalysis of images. In: Proc. of the Pacific Rim Workshop on Digital Steganography 02. Kitakyushu: Kyushu Institute of Technology, 2002. 188~200.
    [10]Huang JG, Mumford D. Statistics of natural images and models. In: Proc. of the IEEE Int'l. Conf. on Computer Vision and Pattern Recognition'99, Vol I. Ft. Collins: IEEE Computer Society, 1999. 1541~1547.
    [11]Katzenbeisser S, Petitcolas FAP. Translated by Wu QX, Niu XY, Yang YX, Luo SS, Yang XB. Information Hiding Techniques for Steganography and Digital Watermarking. Beijing: Peoples Posts & Telecommunications Publishing House, 2001. 33~34 (in Chinese).
    [12]Müller F. Distribution shape of two-dimensional DCT coefficients of natural images. Electronics Letters, 1993,29(22):1935~1936.
    [13]Hateren JH, Schaaf A. Independent component filters of natural images compared with simple cells in primary visual cortex. Proceedings Royal Society of London: Biological Sciences, 1998,265(1394):359~366. http://hlab.phys.rug.nl/imlib/ index.html
    [14]CBIR Image Database. University of Washington. 1997. http://www.cs.washington.edu/research/imagedatabase/groundtruth/
    [15]USC-SIPI Image Database. 1977. http://sipi.usc.edu/services/database/Database.html
    [16]Katzenbeisser S,Petitcolas FAP,编.吴秋新,钮心怡,杨义先,罗守山,杨晓兵,译.信息隐藏技术--隐写术与数字水印.北京:人民邮电出版社,2001.33~34.
    Comments
    Comments
    分享到微博
    Submit
Get Citation

张涛,平西建.基于差分直方图实现LSB信息伪装的可靠检测.软件学报,2004,15(1):151-158

Copy
Share
Article Metrics
  • Abstract:4685
  • PDF: 6780
  • HTML: 0
  • Cited by: 0
History
  • Received:October 14,2002
  • Revised:April 17,2003
You are the first2032680Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063