Abstract
A new steganographic method called STABYLO is introduced in this research work. Its main advantage is to be much lighter than the so-called HUGO, WOW, and UNIWARD schemes, the state of the art steganographic processes. To achieve the proposed goal, famous experimented components of signal processing, coding theory, and cryptography are combined together, leading to a scheme that can reasonably face up-to-date steganalysers.
Similar content being viewed by others
References
Blum L, Blum M, Shub M (1983) Comparison of two pseudo-random number generators. In: Chaum D, Rivest RL, Sherman AT (eds) Advances in Cryptology, Proceedings of CRYPTO 82, Santa Barbara, California, USA, August 23-25, 1982, pp 61–78. Plenum Press, New York, NY, USA
Blum M, Goldwasser S (1985) An efficient probabilistic public-key encryption scheme which hides all partial information. In: Blakley GR, Chaum D (eds) Advances in Cryptology, Proceedings of CRYPTO 84, Santa Barbara, California, USA, August 19–22, 1984, Proceedings, vol 196, pp 289–302
Canny J (1986) A computational approach to edge detection. IEEE Trans Pattern Anal Mach Intell PAMI 8(6):679–698. doi:10.1109/TPAMI.1986.4767851
Chen WJ, Chang CC, Le THN (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37(4):3292–3301. http://dblp.uni-trier.de/db/journals/eswa/eswa37.htmlChenCL10
Dumitrescu S, Wu X (2005) Lsb steganalysis based on high-order statistics. In: Eskicioglu AM, Fridrich JJ, Dittmann J (eds) Proceedings of the 7th workshop on Multimedia & Security, MM & Sec 2005, New York, NY, USA, August 1-2, 2005, 2006, pp 25–32, ACM, New York, NY, USA
Dumitrescu S, Wu X, Wang Z (2003) Detection of lsb steganography via sample pair analysis. IEEE Trans Sig Process 51(7):1995–2007. http://dblp.uni-trier.de/db/journals/tsp/tsp51.htmlDumitrescuWW03
Filler T, Judas J, Fridrich JJ (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics Secur 6(3-2):920–935. http://dblp.uni-trier.de/db/journals/tifs/tifs6.htmlFillerJF11
Filler T, Judas J, Fridrich JJ (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics and Secur 6(3-2):920–935
Fontaine C, Galand F (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J Inf Secur 2007(013): 801
Fridrich JJ, Goljan M, Du R (2001) Reliable detection of lsb steganography in color and grayscale images. In: Georganas ND, Popescu-Zeletin R (eds) Proceedings of the 4th workshop on Multimedia & Security: New Challenges, MM & Sec 2001, Ottawa, Ontario, Canada, October 5, 2001, pp 27–30, ACM, New York, NY, USA
Fridrich JJ, Kodovský J (2012) Steganalysis of lsb replacement using parity-aware features. In: Kirchner M, Ghosal D (eds) Information Hiding - 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers, vol 7692, pp 31–45
Fridrich JJ, Pevný T, Kodovský J (2007) Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: Kundur D, Prabhakaran B, Dittmann J, Fridrich JJ (eds) Proceedings of the 9th workshop on Multimedia & Security, MM & Sec, 2007, Dallas, Texas, USA, September 20-21, 2007, pp 3–14. ACM, New York, NY, USA
Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain EURASIP. J Inf Secur 2014(1):1. doi:10.1186/1687-417X-2014-1
Holub V, Fridrich JJ (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, pp 234–239. IEEE. http://dblp.uni-trier.de/db/conf/wifs/wifs2012.htmlHolubF12
Ker A D (2005) A general framework for structural steganalysis of lsb replacement. In: Barni M, Herrera-Joancomartí J, Katzenbeisser S, Pérez-González F (eds) Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, vol 3727, pp 296–311
Kim Y, Duric Z, Richards D (2006) Modified matrix encoding technique for minimal distortion steganography. In: Camenisch J, Collberg CS, Johnson NF, Sallee P (eds) Information Hiding, vol 4437, pp 314–327. http://dblp.uni-trier.de/db/conf/ih/ih206.htmlKimDR06
Kodovsk J, Pevn T, Fridrich JJ (2010) Modern steganalysis can detect yass. In: Media Forensics and Security, p 754102
Kodovský J, Fridrich J (2011) Steganalysis in high dimensions: Fusing classifiers built on random subspaces. In: Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, pp. 78,800L–78,800L–13
Kodovský J, Fridrich JJ, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432–444
Li B, Huang J, Shi YQ (2008) Textural features based universal steganalysis. In: Proc. SPIE 6819, p 12
Li F, Zhang X, Yu J, Shen W (2014) Adaptive jpeg steganography with new distortion function. ann telecommun - annales des telecommunications 69(7-8):431–440. doi:10.1007/s12243-013-0415-2
Liu W, Liu G, Dai Y (2014) Syndrome trellis codes based on minimal span generator matrix. ann telecommun-annales des telecommunications 69(7-8):403–416
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on lsb matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214. doi:10.1109/TIFS.2010.2041812
Mielikainen J (2006) Lsb matching revisited. IEEE Signal Processing Letters 13(5):285–287
Pevný T, Filler T (2010) Break our steganographic system Available at. URL http://www.agents.cz/boss/
Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Böhme R, Fong PWL, Safavi-Naini R (eds) Information Hiding - 12th International Conference, IH 2010, Calgary, A B Canada, June 28-30, 2010, Revised Selected Papers, 6387, pp 161–177
Tyan CY, Wang PP (1993) Image processing-enhancement, filtering and edge detection using the fuzzy logic approach. In: Proceedings of the Second IEEE International Conference on Fuzzy Systems, vol 1, pp 600–605
Westfeld A (2001) F5-a steganographic algorithm. In: I S Moskowitz (ed) Information Hiding, 4th International Workshop, 2001, I H W, Pittsburgh, P A, USA, April 25-27, 2001, Proceedings, 2137, 289–302
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Couchot, JF., Couturier, R. & Guyeux, C. STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost. Ann. Telecommun. 70, 441–449 (2015). https://doi.org/10.1007/s12243-015-0466-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-015-0466-7