A Better Detection of 2LSB Steganography via Standard Deviation of the Extended Pairs of Values

被引:1
作者
Khalind, Omed [1 ]
Aziz, Benjamin [1 ]
机构
[1] Univ Portsmouth, Sch Comp, Portsmouth PO1 3HE, Hants, England
来源
MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2015 | 2015年 / 9497卷
关键词
2LSB steganalysis; 2LSB steganography; Pairs of values analysis; detection; information hiding; STEGANALYSIS;
D O I
10.1117/12.2184496
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a modification to the Extended Pairs of Values (EPoV) method of 2LSB steganalysis in digital still images. In EPoV, the detection and the estimation of the hidden message length were performed in two separate processes as it considered the automated detection. However, the new proposed method uses the standard deviation of the EPoV to measure the amount of distortion in the stego image made by the embedding process using 2LSB replacement, which is directly proportional with the embedding rate. It is shown that it can accurately estimate the length of the hidden message and outperform the other methods of the targeted 2LSB steganalysis in the literature. The proposed method is also more consistent with the steganalysis methods in the literature by giving the amount of difference to the expected clean image. According to the experimental results, based on analysing 3000 never-compressed images, the proposed method is more accurate than the current targeted 2LSB steganalysis methods for low embedding rates.
引用
收藏
页数:8
相关论文
共 13 条
[1]   Steganography capacity: A steganalysis perspective [J].
Chandramouli, R ;
Memon, ND .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 :173-177
[2]  
Chandramouli R, 2001, 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, P1019, DOI 10.1109/ICIP.2001.958299
[3]  
Chorein A., 2008, SILENTEYE STEGANOGRA
[4]   Steganalysis of embedding in two least-significant bits [J].
Ker, Andrew D. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (01) :46-54
[5]  
Khalind O., 2014, P SOC PHOTO-OPT INS, V9120
[6]  
Luo X., 2006, IEEE 8 INT C ADV COM, V2, P1199
[7]   Steganalysis of adaptive image steganography in multiple gray code bit-planes [J].
Luo, Xiangyang ;
Liu, Fenlin ;
Yang, Chunfang ;
Lian, Shiguo ;
Zeng, Ying .
MULTIMEDIA TOOLS AND APPLICATIONS, 2012, 57 (03) :651-667
[8]   Stegananlysis method of Two Least-Significant Bits steganography [J].
Mang, Ke ;
Gao, Hai-ying ;
Bao, Wan-su .
ITCS: 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, PROCEEDINGS, VOL 2, PROCEEDINGS, 2009, :350-353
[9]   Steganalysis of Two Least Significant Bits Embedding Based on Least Square Method [J].
Niu, Changming ;
Sun, Xingming ;
Qin, Jiaohua ;
Xia, Zhihua .
2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL III, 2009, :124-127
[10]  
Westfeld A, 2000, LECT NOTES COMPUT SC, V1768, P61