Steganalysis of multiple-base notational system steganography

被引:10
作者
Li, Bin [1 ]
Fang, Yanmei [1 ]
Huang, Jiwu [1 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510275, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
multiple-base notational system; steganalysis; steganography;
D O I
10.1109/LSP.2008.924000
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This letter presents a method for attacking multiple-base notational system (MBNS) steganography [1]. In the MBNS steganography, secret data are converted into symbols in a notational system with multiple bases. The pixels of a host image are then modified such that when the pixel values are divided by the bases, their remainders are equal to the symbols. Through analysis, we prove that the amount of small remainders increases due to the modification. Based on this observation, we propose a steganalytic approach which is effective in not only detecting MBNS steganography but also estimating its embedding rate.
引用
收藏
页码:493 / 496
页数:4
相关论文
共 9 条
[1]  
Chandramouli R, 2004, LECT NOTES COMPUT SC, V2939, P35
[2]   Detecting LSB steganography in color and gray-scale images [J].
Fridrich, J. ;
Goljan, M. ;
Du, R. .
IEEE Multimedia, 2001, 8 (04) :22-28
[3]   Exploring steganography: Seeing the unseen [J].
Johnson, NF ;
Jajodia, S .
COMPUTER, 1998, 31 (02) :26-+
[4]   Steganalysis of LSB matching in grayscale images [J].
Ker, AD .
IEEE SIGNAL PROCESSING LETTERS, 2005, 12 (06) :441-444
[5]   Application of bit-plane decomposition steganography to JPEG2000 encoded images [J].
Noda, H ;
Spaulding, J ;
Shirazi, MN ;
Kawaguchi, E .
IEEE SIGNAL PROCESSING LETTERS, 2002, 9 (12) :410-413
[6]   UCID - An uncompressed colour image database [J].
Schaefer, G ;
Stich, M .
STORAGE AND RETRIEVAL METHODS AND APPLICATIONS FOR MULTIMEDIA 2004, 2004, 5307 :472-480
[7]   A steganographic method for images by pixel-value differencing [J].
Wu, DC ;
Tsai, WH .
PATTERN RECOGNITION LETTERS, 2003, 24 (9-10) :1613-1626
[8]   Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security [J].
Zhang, XP ;
Wang, SZ .
PATTERN RECOGNITION LETTERS, 2004, 25 (03) :331-339
[9]  
Zhang YP, 2005, J IRON STEEL RES INT, V12, P1