Securing LSB embedding against structural steganalysis

被引:0
|
作者
Powell, Brian A. [1 ]
机构
[1] Johns Hopkins Univ, Appl Phys Lab, Laurel, MD 20723 USA
关键词
LSB embedding; structural steganalysis; SIGNIFICANT BIT REPLACEMENT; DEEP RESIDUAL NETWORK; STEGANOGRAPHIC METHOD; FRAMEWORK; SYSTEM;
D O I
10.3233/JCS-200123
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work explores the extent to which LSB embedding can be made secure against structural steganalysis through a modification of cover image statistics prior to message embedding. LSB embedding disturbs the statistics of consecutive k-tuples of pixels, and a kth-order structural attack detects hidden messages with lengths in proportion to the size of the imbalance amongst sets of k-tuples. To protect against kth-order structural attacks, cover modifications involve the redistribution of k-tuples among the different sets so that symmetries of the cover image are broken, then repaired through the act of LSB embedding so that the stego image bears the statistics of the original cover. We find this is only feasible for securing against up to 3rd-order attacks since higher-order protections result in virtually zero embedding capacities. To protect against 3rd-order attacks, we perform a redistribution of triplets that also preserves the statistics of pairs. This is done by embedding into only certain pixels of each sextuplet, constraining the maximum embedding rate to be <= 2/3 bits per channel. Testing on a variety of image formats, we report best performance for JPEG-compressed images with a mean maximum embedding rate undetectable by 2nd- and 3rd-order attacks of 0.21 bpc.
引用
收藏
页码:517 / 539
页数:23
相关论文
共 50 条
  • [1] Steganalysis of LSB embedding in multimedia signals
    Dumitrescu, S
    Wu, XL
    [J]. IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I AND II, PROCEEDINGS, 2002, : 581 - 584
  • [2] Quantitative Steganalysis of LSB Embedding in JPEG Domain
    Kodovsky, Jan
    Fridrich, Jessica
    [J]. MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 187 - 197
  • [3] Soft computing approach to steganalysis of LSB embedding in digital images
    Benton, R
    Chu, H
    [J]. ITRE 2005: 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, PROCEEDINGS, 2005, : 105 - 109
  • [4] A general framework for structural steganalysis of LSB replacement
    Ker, AD
    [J]. INFORMATION HIDING, 2005, 3727 : 296 - 311
  • [5] On steganalysis of random LSB embedding in continuous-tone images
    Dumitrescu, S
    Wu, XL
    Memon, N
    [J]. 2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2002, : 641 - 644
  • [6] Steganalysis of LSB Embedding in Audio Signals Based on Sample Pair Analysis
    Zeng, Wei
    Ai, Haojun
    Hu, Ruimin
    Liu, Bo
    Gao, Shang
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2960 - 2963
  • [7] LSB matching steganalysis based on patterns of pixel differences and random embedding
    Lerch-Hostalot, Daniel
    Megias, David
    [J]. COMPUTERS & SECURITY, 2013, 32 : 192 - 206
  • [8] Steganalysis of LSB greedy embedding algorithm for JPEG images using coefficient symmetry
    Li, Bin
    Huang, Fangjun
    Huang, Jiwu
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-7, 2007, : 413 - 416
  • [9] A LSB steganography approach against pixels sample pairs steganalysis
    Luo, Xiangyang
    Liu, Fenlin
    Lu, Peizhong
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2007, 3 (03): : 575 - 588
  • [10] Steganalysis of Low Embedding Rates LSB Speech Based on Histogram Moments in Frequency Domain
    Yang Wanxia
    Tang Shanyu
    Li Miaoqi
    Cheng Yongfeng
    Zhou Zhili
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (06) : 1254 - 1260