LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis

被引:51
|
作者
Lou, Der-Chyuan [1 ]
Hu, Chen-Hao [2 ]
机构
[1] Chang Gung Univ, Dept Comp Sci & Informat Engn, Tao Yuan 33302, Taiwan
[2] Natl Def Univ, Dept Elect & Elect Engn, Chung Cheng Inst Technol, Tao Yuan 33509, Taiwan
关键词
Information hiding; LSB substitution; Steganography; Steganalysis; x(2) detection; RS attack; SCHEME;
D O I
10.1016/j.ins.2011.06.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Statistical steganalysis schemes detect the existence of secret information embedded by steganography. The x(2)-detection and Regular-Singular (RS)-attack methods are two well-known statistical steganalysis schemes used against LSB (least significant bit) steganography. The embedded message length can be estimated accurately by these two steganalysis schemes. For secret communication, the resistance of steganography against steganalysis is very important for information security. To avoid the enemy's attempts, the statistical features between stego-images and cover images should be as similar as possible for better resistance to steganalysis. In this manuscript, a reversible histogram transformation function-based LSB steganographic method is proposed to resist statistical steganalysis. The experimental results show that the proposed method resists not only RS-attack but also x(2)-detection methods. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:346 / 358
页数:13
相关论文
共 40 条
  • [31] Histogram estimation-scheme-based steganalysis defeating the steganography using pixel-value differencing and modulus function
    Joo, Jeong-Chun
    Kim, Kyung-Su
    Lee, Heung-Kyu
    Lee, Hae-Yeoun
    OPTICAL ENGINEERING, 2010, 49 (07)
  • [32] A Markov-based reversible data hiding method based on histogram shifting
    Wang, Cheng-Tzu
    Yu, Hsiang-Fu
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2012, 23 (05) : 798 - 811
  • [33] An Image Steganalysis Method Based on Characteristic Function Moments and PCA
    Li Hui
    Sun Ziwen
    Zhou Zhiping
    2011 30TH CHINESE CONTROL CONFERENCE (CCC), 2011, : 3005 - 3008
  • [34] Reliable Detection of Embedded Code by Steganalysis Based Statistical Method in Natural Image
    Aarif, K. O. Mohammed
    Yousuf, C. Mohammed
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOL 1, 2009, : 95 - 98
  • [35] A Image Steganalysis Method Based on Characteristic Function Moments of Wavelet Subbands
    Sun, Ziwen
    Li, Hui
    Wu, Zhijian
    Zhou, Zhiping
    2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL I, PROCEEDINGS, 2009, : 291 - 295
  • [36] Adaptive reversible data hiding method based on error energy control and histogram shifting
    Hong, Wien
    OPTICS COMMUNICATIONS, 2012, 285 (02) : 101 - 108
  • [37] A Novel JPEG Steganography Method Based on Modulus Function with Histogram Analysis
    Banoci, Vladimir
    Bugar, Gabriel
    Levicky, Dusan
    Klenovicova, Zita
    RADIOENGINEERING, 2012, 21 (02) : 758 - 763
  • [38] A reversible database watermarking method non-redundancy shifting-based histogram gaps
    Li, Yan
    Wang, Junwei
    Luo, Xiangyang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [39] Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm
    Weng, Shaowei
    Tan, Wenlong
    Ou, Bo
    Pan, Jeng-Shyang
    INFORMATION SCIENCES, 2021, 549 (549) : 13 - 33
  • [40] Statistical moments based universal steganalysis using JPEG 2-D array and 2-D characteristic function
    Chen, Chunhua
    Shi, Yun Q.
    Chen, Wen
    Xuan, Guorong
    2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 105 - +