Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography

被引:10
作者
Chiew, Kang Leng [1 ]
Pieprzyk, Josef [2 ]
机构
[1] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Kota Samarahan 93050, Malaysia
[2] Macquarie Univ, Dept Comp, N Ryde, NSW 2109, Australia
来源
FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS | 2010年
关键词
Steganalysis; steganography; data hiding; binary image; message length estimation; histogram quotient; STOCHASTIC MODULATION; STEGANALYSIS;
D O I
10.1109/ARES.2010.65
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new steganalytic method to detect the message hidden in a black and white image using the steganographic technique developed by Liang, Wang and Zhang. Our detection method estimates the length of hidden message embedded in a binary image. Although the hidden message embedded is visually imperceptible, it changes some image statistic (such as inter-pixels correlation). Based on this observation, we first derive the 512 patterns histogram from the boundary pixels as the distinguishing statistic, then we compute the histogram difference to determine the changes of the 512 patterns histogram induced by the embedding operation. Finally we propose histogram quotient to estimate the length of the embedded message. Experimental results confirm that the proposed method can effectively and reliably detect the length of the embedded message.
引用
收藏
页码:683 / 688
页数:6
相关论文
共 11 条
[1]  
[Anonymous], LNCS
[2]  
Böhme R, 2004, LECT NOTES COMPUT SC, V3193, P125
[3]   Forensic steganalysis: Determining the stego key in spatial domain steganography [J].
Fridrich, J ;
Goljan, M ;
Soukal, D ;
Holotyak, T .
SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VII, 2005, 5681 :631-642
[4]   Digital image steganography using stochastic modulation [J].
Fridrich, J ;
Goljan, M .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 :191-202
[5]  
Golub G., 1965, Journal of the Society for Industrial and Applied Mathematics, Series B: Numerical Analysis, V2, P205, DOI [10.1137/0702016, DOI 10.1137/0702016]
[6]  
He JH, 2006, SCI CHINA SER F, V49, P273, DOI 10.1007/s11432-006-0273-x
[7]  
JODAR L, 1991, CONGRESSUS NUMERANTI, P57
[8]  
KER AD, 2008, 10 ACM WORKSH MULT S, P27
[9]  
Liang Guang-lan, 2007, Journal of Shanghai University, V11, P272, DOI 10.1007/s11741-007-0317-2
[10]  
Pevny T., 2006, P SPIE, P257