Steganalysis of stochastic modulation steganography

被引:10
|
作者
He Junhui
Huang Jiwu [1 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510275, Peoples R China
[2] Guangdong Prov Key Lab Informat Secur, Guangzhou 510275, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
information hiding; steganography; steganalysis; stochastic modulation; statistical distribution models of difference;
D O I
10.1007/s11432-006-0273-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Stochastic modulation steganography embeds secret message within the cover image by adding stego-noise with a specific probabilistic distribution. No method is known to be applicable to the estimation of stochastic modulation steganography. By analyzing the distributions of the horizontal pixel difference of images before and after stochastic modulation embedding, we present a new steganalytic approach to accurately estimate the length of secret message in stochastic modulation steganography. The proposed method first establishes a model describing the statistical relationship among the differences of the cover image, stego-image and stego-noise. In the case of stego-image-only steganalysis, rough estimate of the distributional parameters of the cover image's pixel difference is obtained with the use of the provided stego-image. And grid search and Chi-square goodness of fit test are exploited to estimate the length of the secret message embedded with stochastic modulation steganography. The experimental results demonstrate that our new approach is effective for steganalyzing stochastic modulation steganography and accurately estimating the length of the secret message.
引用
收藏
页码:273 / 285
页数:13
相关论文
共 50 条
  • [1] Steganalysis of stochastic modulation steganography
    HE Junhui1
    2. Guangdong Province Key Laboratory of Information Security
    [J]. Science China(Information Sciences), 2006, (03) : 273 - 285
  • [2] Steganalysis of stochastic modulation steganography
    Junhui He
    Jiwu Huang
    [J]. Science in China Series F, 2006, 49 : 273 - 285
  • [3] Steganalysis of transcoding steganography
    Janicki, Artur
    Mazurczyk, Wojciech
    Szczypiorski, Krzysztof
    [J]. ANNALS OF TELECOMMUNICATIONS, 2014, 69 (7-8) : 449 - 460
  • [4] Steganalysis of transcoding steganography
    Artur Janicki
    Wojciech Mazurczyk
    Krzysztof Szczypiorski
    [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 449 - 460
  • [5] Image steganography and steganalysis
    Bachrach, Mayra
    Shih, Frank Y.
    [J]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2011, 3 (03): : 251 - 259
  • [6] Steganalysis of Quantization Index Modulation Steganography in G.723.1 Codec
    Wu, Zhijun
    Li, Rong
    Yin, Panpan
    Li, Changliang
    [J]. FUTURE INTERNET, 2020, 12 (01):
  • [7] Active steganalysis of sequential steganography
    Trivedi, S
    Chandramouli, R
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 123 - 130
  • [8] Batch steganography and pooled steganalysis
    Ker, Andrew D.
    [J]. INFORMATION HIDING, 2007, 4437 : 265 - 281
  • [9] JPEG Steganography and Steganalysis - A Review
    Banerjee, Siddhartha
    Ghosh, Bibek Ranjan
    Roy, Pratik
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 175 - 187
  • [10] Steganography capacity: A steganalysis perspective
    Chandramouli, R
    Memon, ND
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 173 - 177