Advertisement

Steganography Preserving Statistical Properties

  • Elke Franz
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2578)

Abstract

Steganographic modifications must not noticeably change characteristics of the cover data known to an attacker. However, it is a difficult task to define an appropriate set of features that should be preserved. This article investigates possibilities to maintain statistical properties while embedding information. As an example, the simple embedding function “overwriting the least significant bits” is discussed, w.r.t. greyscale images used as covers. Two modifications of this technique are presented here: The first modification avoids changes of first-order statistics and thereby overcomes possible attacks based on histogram analysis. The second modification tries to reduce noticeable modifications of second-order statistics and, thereby, of the structure of an image. The suggested modifications are tested on a set of images. Testing a possible attack and comparing these results to the results of the same attack on stego images created by the original method clarifies the improvements.

Keywords

Test Image Usable Group Cover Image Secret Message Adjacent Pixel 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Ismail Avcibas, Nasir Memon, Bülent Sankur: Steganalysis of Watermarking Techniques using Image Quality Metrics. In: Ping Wah Wong, Edward J. Delp (Ed.): Security and Watermarking of Multimedia Contents III. Proceedings of SPIE Vol. 4314, 2001, 523–531. 287Google Scholar
  2. [2]
    Wilfried J. Dixon, Frank J. Massey: Introduction to Statistical Analysis. McGraw-Hill Book Company, Inc. New York, 1957. 284, 289zbMATHGoogle Scholar
  3. [3]
    Hany Farid: Detecting Steganographic Messages in Digital Images. http://www.cs.dartmouth.edu/~farid/publications/tr01.html 287
  4. [4]
    Elke Franz, Andreas Pfitzmann: Steganography Secure Against Cover-Stego-Attacks. In Andreas Pfitzmann (Ed.): Information Hiding. Third International Workshop, IH’99, Dresden, Germany, September/October 1999, Proceedings, Springer, LNCS 1768, 2000, 29–46. 286Google Scholar
  5. [5]
    Jessica Fridrich, Rui Du, Meng Long: Steganalysis of LSB Encoding in Color Images. ICME 2000, New York City, July 31th-August 2nd, USA. http://www.ssie.binghampton.edu/fridrich/publications.html 287
  6. [6]
    Jessica Fridrich, Miroslav Goljan, Rui Du: Steganalysis Based on JPEG Compatibility. SPIE Multimedia Systems and Applications IV, Denver, CO, August 20-24, 2001. 292Google Scholar
  7. [7]
    Jessica Fridrich, Miroslav Goljan, Rui Du: Reliable Detection of LSB Steganography in Color and Grayscale Images. Proc. of the ACM Workshop on Multimedia and Security, Ottawa, CA, October 5, 2001, 27–30. 287, 292Google Scholar
  8. [8]
    Wilhelm Göhler: Höhere Mathematik: Formeln und Hinweise. Bearb. von Barbara Ralle, 10. überarb. Auflage, VEB Deutscher Verlag für Grundstoffindustrie, Leipzig, 1987. 288Google Scholar
  9. [9]
    Solomon W. Golomb, Robert E. Peile, Robert A. Scholtz: Basic Concepts in Information Theory and Coding. Plenum Press, New York, 1994. 279zbMATHGoogle Scholar
  10. [10]
    Neil F. Johnson, Sushil Jajodia: Steganalysis of Images Created Using Current Steganography Software. In David Aucsmith (Ed.): Information Hiding. Second InternationalWorkshop, IH’98, Portland, Oregon, USA, April 1998, Proceedings, Springer, LNCS 1525, 1998, 273–289. 278Google Scholar
  11. [11]
    Stefan Katzenbeisser, Fabien A.P. Petitcolas (Ed.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, 2000. 287Google Scholar
  12. [12]
    Donald E. Knuth: The art of computer programming. Volume 2: Seminumerical algorithms. Addison-Wesley, 3rd Ed., 1998. 280Google Scholar
  13. [13]
    Maurice Maes: Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks. In David Aucsmith (Ed.): Information Hiding. Second International Workshop, IH’98, Portland, Oregon, USA, April 1998, Proceedings, Springer, LNCS 1525, 1998, 290–305. 287Google Scholar
  14. [14]
    A. Papoulis, Probability, Random Variables, and Stochastic Processes, 2nd ed. New York, McGraw-Hill, 1984. 280, 284zbMATHGoogle Scholar
  15. [15]
    Niels Provos: Defending Against Statistical Steganalysis. 10th USENIX Security Symposium, August 2001. http://www.citi.umich.edu/u/provos/stego/ 279, 287
  16. [16]
    Maxwell T. Sandford, Jonathan N. Bradley, Theodore G. Handel: The data embedding method. In Proc. of the SPIE Photonics East Conference, Philadelphia, September 1995. 291Google Scholar
  17. [17]
    Peter Wayner: Mimic Functions. Technical Report, Cornell University, Department of Computer Science, 1990. 280Google Scholar
  18. [18]
    Andreas Westfeld, Andreas Pfitzmann: Attacks on Steganographic Systems. In Andreas Pfitzmann (Ed.): Information Hiding. Third International Workshop, IH’99, Dresden, Germany, September/October 1999, Proceedings, Springer, LNCS 1768, 2000, 61–76. 278, 279, 286, 287Google Scholar
  19. [19]
    Andreas Westfeld: F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis. In Ira S. Moscowitz (Ed.): Information Hiding. 4th International Workshop, IH’01, Pittsburgh, PA, USA, April 2001, Proceedings, Springer, LNCS 2137, 2001, 289–302. 279Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Elke Franz
    • 1
  1. 1.Department of Computer ScienceDresden University of TechnologyDresdenGermany

Personalised recommendations