[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/11551492_1guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A new approach to estimating hidden message length in stochastic modulation steganography

Published: 15 September 2005 Publication History

Abstract

Stochastic modulation steganography hides secret message within the cover image by adding a weak noise signal with a specified probabilistic distribution. The advantages of stochastic modulation steganography include high capacity and better security. Current steganalysis methods that are applicable to the detection of hidden message in traditional least significant bit (LSB) or additive noise model based steganography cannot reliably detect the existence of hidden message in stochastic modulation steganography. In this paper, we present a new steganalysis approach which can reliably detect the existence and accurately estimate the length of hidden message in stochastic modulation steganography. By analyzing the distributions of the horizontal pixel difference of the images before and after stochastic modulation embedding, it is shown that for non-adaptive steganography, the distribution of the stego-image’s pixel difference can be modeled as the convolution of the distribution of the cover image’s pixel difference and that of the quantized stego-noise difference, and that the estimation of the hidden message length in stochastic modulation can be achieved by estimating the variance of the stego-noise. To estimate the variance of the stego-noise, hence determining the existence and the length of hidden message, we first model the distribution of the cover image’s pixel difference as a generalized Gaussian and estimate the parameters of the distribution using grid search and Chi-square goodness of fit test, and then exploit the relationship between the distribution variance of the cover image’s pixel difference and that of the stego-noise difference. We present experimental results to demonstrate that our new approach is effective for steganalyzing stochastic modulation steganography. Our method provides a general theoretical framework and is applicable to other non-adaptive embedding algorithms where the distribution models of the stego-noise are known or can be estimated.

References

[1]
R.J. Anderson and F.A.P. Petitcolas, On the Limits of Steganography, in IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and Privacy Protection, vol.16(4), pp.474-481, 1998.
[2]
N.F. Johnson and S. Jajodia, Steganalysis of Images Created Using Current Steganography Software, in Lecture Notes in Computer Science, vol.1525, pp.273-289, Springer-Verlag, Berlin, 1998.
[3]
A. Westfeld and A. Pfitzmann, Attacks on Steganographic Systems, in Proceedings of the Third International Workshop on Information Hiding, pp.61-76, 1999.
[4]
N. Provos and P. Honeyman, Detecting Steganographic Content on the Internet, in ISOC NDSS 02, San Diego, CA, February 2002.
[5]
J. Fridrich, M. Goljan and R. Du, Detecting LSB Steganography in Color and Gray-Scale Images, in Magazine of IEEE Multimedia Special Issue on Security, pp.22-28, October-November, 2001.
[6]
T. Zhang and X.J. Ping, Reliable Detection of Spatial LSB Steganography Based on Difference Histogram, in The Journal of Software, China, vol.15, no.1, pp.151-158, 2004.
[7]
S. Dumitrescu, X. Wu and Z. Wang, Detection of Lsb Steganography Via Sample Pair Analysis, in IEEE Transactions On Signal Processing, vol.51, no.7, pp.1995-2007, 2003.
[8]
T. Sharp, An Implementation of Key-Based Digital Signal Steganography, in: I. S. Moskowitz (eds.): 4th International Workshop on Information Hiding, LNCS 2137, pp.13-26, Springer-Verlag, New York, 2001.
[9]
L.M. Marvel, C.G. Boncelet and C.T. Retter, Spread Spectrum Image Steganography, in IEEE Transactions on Image Processing, vol.8, no.8, pp.1075-1083, Aug, 1999.
[10]
J. Fridrich and M. Goljan, Digital Image Steganography Using Stochastic Modulation, in Security and Watermarking of Multimedia Contents V, vol.5020, pp.191-202, 2003.
[11]
A. Westfeld, Detecting Low Embedding rates, In: Petitcolas et al. (eds.): Preproceedings 5th Information Hiding Workshop. Noordwijkerhout, Netherlands, Oct.7.9, 2002.
[12]
J.J. Harmsen and W.A. Pearlman, Steganalysis of Additive Noise Modelable Information Hiding, in Proc. SPIE Electronic Imaging, Santa Clara, January 21-24, 2003.
[13]
J. Huang and D. Mumford, Statistics of Natural Images and Models, in Proc. IEEE Conf. Computer Vision and Pattern Recognition, pp.541-547, 1999.
[14]
S.G. Mallat, A Theory for Multiresolution Signal Decomposition: The wavelet Represention, in IEEE Transations on Pattern Analysis and Machine Intelligence, vol.11, No.7, pp.674-693, July, 1989.

Cited By

View all
  • (2023)Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)Signal Processing10.1016/j.sigpro.2022.108908206:COnline publication date: 1-May-2023
  • (2015)InFrame++Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services10.1145/2742647.2742652(181-195)Online publication date: 18-May-2015
  • (2014)InFrameProceedings of the 13th ACM Workshop on Hot Topics in Networks10.1145/2670518.2673867(1-7)Online publication date: 27-Oct-2014

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
IWDW'05: Proceedings of the 4th international conference on Digital Watermarking
September 2005
505 pages
ISBN:354028768X
  • Editors:
  • Mauro Barni,
  • Ingemar Cox,
  • Ton Kalker,
  • Hyoung-Joong Kim

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 15 September 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)Signal Processing10.1016/j.sigpro.2022.108908206:COnline publication date: 1-May-2023
  • (2015)InFrame++Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services10.1145/2742647.2742652(181-195)Online publication date: 18-May-2015
  • (2014)InFrameProceedings of the 13th ACM Workshop on Hot Topics in Networks10.1145/2670518.2673867(1-7)Online publication date: 27-Oct-2014

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media