Steganalysis of stochastic modulation steganography

被引:0
|
作者
HE Junhui1
2. Guangdong Province Key Laboratory of Information Security
机构
关键词
information hiding; steganography; steganalysis; stochastic modulation; statistical distribution models of difference;
D O I
暂无
中图分类号
TN918 [通信保密与通信安全];
学科分类号
0839 ; 1402 ;
摘要
Stochastic modulation steganography embeds secret message within the cover image by adding stego-noise with a specific probabilistic distribution. No method is known to be applicable to the estimation of stochastic modulation steganography. By analyzing the distributions of the horizontal pixel difference of images before and after stochastic modulation embedding, we present a new steganalytic approach to accurately estimate the length of secret message in stochastic modulation steganography. The pro- posed method first establishes a model describing the statistical relationship among the differences of the cover image, stego-image and stego-noise. In the case of stego- image-only steganalysis, rough estimate of the distributional parameters of the cover im- age’s pixel difference is obtained with the use of the provided stego-image. And grid search and Chi-square goodness of fit test are exploited to estimate the length of the se- cret message embedded with stochastic modulation steganography. The experimental results demonstrate that our new approach is effective for steganalyzing stochastic modulation steganography and accurately estimating the length of the secret message.
引用
收藏
页码:273 / 285
页数:13
相关论文
共 50 条
  • [1] Steganalysis of stochastic modulation steganography
    Junhui He
    Jiwu Huang
    [J]. Science in China Series F, 2006, 49 : 273 - 285
  • [2] Steganalysis of stochastic modulation steganography
    He Junhui
    Huang Jiwu
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2006, 49 (03): : 273 - 285
  • [3] Steganalysis of transcoding steganography
    Janicki, Artur
    Mazurczyk, Wojciech
    Szczypiorski, Krzysztof
    [J]. ANNALS OF TELECOMMUNICATIONS, 2014, 69 (7-8) : 449 - 460
  • [4] Steganalysis of transcoding steganography
    Artur Janicki
    Wojciech Mazurczyk
    Krzysztof Szczypiorski
    [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 449 - 460
  • [5] Image steganography and steganalysis
    Bachrach, Mayra
    Shih, Frank Y.
    [J]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2011, 3 (03): : 251 - 259
  • [6] Steganalysis of Quantization Index Modulation Steganography in G.723.1 Codec
    Wu, Zhijun
    Li, Rong
    Yin, Panpan
    Li, Changliang
    [J]. FUTURE INTERNET, 2020, 12 (01):
  • [7] Steganalysis on synonym substitution steganography
    Luo, Gang
    Sun, Xingming
    Xiang, Lingyun
    Liu, Yuling
    Gan, Can
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2008, 45 (10): : 1696 - 1703
  • [8] Active steganalysis of sequential steganography
    Trivedi, S
    Chandramouli, R
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 123 - 130
  • [9] Batch steganography and pooled steganalysis
    Ker, Andrew D.
    [J]. INFORMATION HIDING, 2007, 4437 : 265 - 281
  • [10] Steganography capacity: A steganalysis perspective
    Chandramouli, R
    Memon, ND
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 173 - 177