Securing LSB embedding against structural steganalysis

被引:0
|
作者
Powell, Brian A. [1 ]
机构
[1] Johns Hopkins Univ, Appl Phys Lab, Laurel, MD 20723 USA
关键词
LSB embedding; structural steganalysis; SIGNIFICANT BIT REPLACEMENT; DEEP RESIDUAL NETWORK; STEGANOGRAPHIC METHOD; FRAMEWORK; SYSTEM;
D O I
10.3233/JCS-200123
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work explores the extent to which LSB embedding can be made secure against structural steganalysis through a modification of cover image statistics prior to message embedding. LSB embedding disturbs the statistics of consecutive k-tuples of pixels, and a kth-order structural attack detects hidden messages with lengths in proportion to the size of the imbalance amongst sets of k-tuples. To protect against kth-order structural attacks, cover modifications involve the redistribution of k-tuples among the different sets so that symmetries of the cover image are broken, then repaired through the act of LSB embedding so that the stego image bears the statistics of the original cover. We find this is only feasible for securing against up to 3rd-order attacks since higher-order protections result in virtually zero embedding capacities. To protect against 3rd-order attacks, we perform a redistribution of triplets that also preserves the statistics of pairs. This is done by embedding into only certain pixels of each sextuplet, constraining the maximum embedding rate to be <= 2/3 bits per channel. Testing on a variety of image formats, we report best performance for JPEG-compressed images with a mean maximum embedding rate undetectable by 2nd- and 3rd-order attacks of 0.21 bpc.
引用
收藏
页码:517 / 539
页数:23
相关论文
共 50 条
  • [21] Steganalysis of AI Models LSB Attacks
    Gilkarov, Daniel
    Dubin, Ran
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4767 - 4779
  • [22] Close Color Pair Signature Ensemble Adaptive Threshold based Steganalysis for LSB Embedding in Digital Images
    Geetha, S.
    Sindhu, Siva S. Sivatha
    Kamaraj, N.
    [J]. TRANSACTIONS ON DATA PRIVACY, 2008, 1 (03) : 140 - 161
  • [23] Steganalysis of LSB replacement based on wavelet transform
    Wei, Jingjing
    Wang, Daoshun
    [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2007, 47 (04): : 595 - 598
  • [24] STEGANALYSIS OF LSB REPLACEMENT FOR MULTIVARIATE GAUSSIAN COVERS
    Xue, Bowen
    Li, Xiaolong
    Li, Bin
    Guo, Zongming
    [J]. 2015 IEEE CHINA SUMMIT & INTERNATIONAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING, 2015, : 836 - 840
  • [25] Category attack for LSB steganalysis of JPEG images
    Lee, Kwangsoo
    Westfeld, Andreas
    Lee, Sangjin
    [J]. DIGITAL WATERMARKING, PROCEEDINGS, 2006, 4283 : 35 - 48
  • [26] LSB steganalysis using support vector regression
    Lin, E
    Woertz, E
    Kam, M
    [J]. PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 95 - 100
  • [27] Analysis and Categorical Application of LSB Steganalysis Techniques
    Cazalas, Joshua
    Andel, Todd
    McDonald, Jeffrey
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 25 - 32
  • [28] Steganalysis of LSB Matching Based on Image Noise
    Lu, Jicang
    Liu, Fenlin
    Luo, Xiangyang
    Song, Xiaofeng
    [J]. MULTIMEDIA AND UBIQUITOUS ENGINEERING, 2014, 308 : 211 - 217
  • [29] An Information Theoretic Image Steganalysis for LSB Steganography
    Chhikara, Sonam
    Kumar, Rajeev
    [J]. ACTA CYBERNETICA, 2020, 24 (04): : 593 - 612
  • [30] A FURTHER STUDY ON STEGANALYSIS OF LSB MATCHING BY CALIBRATION
    Li, Xiaolong
    Zeng, Tieyong
    Yang, Bin
    [J]. 2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5, 2008, : 2072 - 2075