Skip to main content

Detecting Low Embedding Rates

  • Conference paper
  • First Online:
Information Hiding (IH 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2578))

Included in the following conference series:

Abstract

This paper shows three approaches for detecting steganograms with low change density. MP3Stego is a steganographic algorithm with a very low embedding rate. The attack presented here is a statistical analysis of block sizes. It is able to detect 0.001 % of steganographic payload in MP3 files. The second approach is the use of hash functions to combine sample categories for the chi-square attack. One of these hash functions enables us to detect about 0.2 bits per pixel in true colour images. Another algorithm (Hide) was presented at the last workshop and constructed to be secure against visual and statistical chi-square attacks. The detection method for Hide combines the three colour components of each pixel to recognise an increased number of “neighbour colours”.

This work is supported by the German Federal Ministry of Economics and Technology (BMWi).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 8Hz Productions: MPEG Audio Layer III Encoder. http://www.8hz.com/mp3 325, 329, 338

  2. Ross J. Anderson, Fabien A.P. Petitcolas: On the Limits of Steganography. IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, May 1998. 332

    Google Scholar 

  3. Jessica Fridrich, Miroslav Goljan, Rui Du: Steganalysis Based on JPEG Compatibility, in Multimedia Systems and Applications IV, Andrew G. Tescher, Bhaskaran Vasudev, V. Michael Bove, Jr. (Eds.), Proceedings of SPIE, Multimedia Systems and Applications IV, Denver, CO, 2001. 3

    Google Scholar 

  4. J. Fridrich, Rui Du, Meng Long: Steganalysis of LSB Encoding in Color Images, in Proc. ICME 2000, New York City, NY, 2000. 335

    Google Scholar 

  5. Neil F. Johnson, Sushil Jajodia: Steganalysis of Images Created Using Current Steganography Software, in David Aucsmith (Ed.): Information Hiding. Second International Workshop, LNCS 1525, Springer-Verlag Berlin Heidelberg 1998. pp. 273–289. 324

    Google Scholar 

  6. Fabien A.P. Petitcolas: MP3Stego 1.1.16, 1998/2002. http://www.cl.cam.ac.uk/~fapp2/steganography/mp3stego 325, 329, 338

  7. Niels Provos: Defending Against Statistical Steganalysis, 10th USENIX Security Symposium. Washington, DC, August 2001. 330

    Google Scholar 

  8. Niels Provos, Peter Honeyman: Detecting Steganographic Content on the Internet, ISOC NDSS’02, San Diego, CA, February 2002. 330

    Google Scholar 

  9. Greg Roelofs: Zlib Home Site. http://www.zlib.org 325

  10. Toby Sharp: An Implementation of Key-Based Digital Signal Steganography, in Ira S. Moskowitz (Ed.): Information Hiding. 4th International Workshop, LNCS 2137, Springer-Verlag Berlin Heidelberg 2001. pp. 13–26. 334, 335

    Chapter  Google Scholar 

  11. Toby Sharp: Hide 2.1. 2001. http://www.sharpthoughts.org 325, 333

  12. Andreas Westfeld, Andreas Pfitzmann: Attacks on Steganographic Systems, in Andreas Pfitzmann (Ed.): Information Hiding. Third International Workshop, LNCS 1768, Springer-Verlag Berlin Heidelberg 2000. pp. 61–76. 325, 330, 333, 334, 338

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Westfeld, A. (2003). Detecting Low Embedding Rates. In: Petitcolas, F.A.P. (eds) Information Hiding. IH 2002. Lecture Notes in Computer Science, vol 2578. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36415-3_21

Download citation

  • DOI: https://doi.org/10.1007/3-540-36415-3_21

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00421-9

  • Online ISBN: 978-3-540-36415-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics