Advertisement

Detecting Low Embedding Rates

  • Andreas Westfeld
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2578)

Abstract

This paper shows three approaches for detecting steganograms with low change density. MP3Stego is a steganographic algorithm with a very low embedding rate. The attack presented here is a statistical analysis of block sizes. It is able to detect 0.001 % of steganographic payload in MP3 files. The second approach is the use of hash functions to combine sample categories for the chi-square attack. One of these hash functions enables us to detect about 0.2 bits per pixel in true colour images. Another algorithm (Hide) was presented at the last workshop and constructed to be secure against visual and statistical chi-square attacks. The detection method for Hide combines the three colour components of each pixel to recognise an increased number of “neighbour colours”.

Keywords

Hash Function Block Length Carrier Medium Rate Control Process Colour Pair 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    8Hz Productions: MPEG Audio Layer III Encoder. http://www.8hz.com/mp3 325, 329, 338
  2. [2]
    Ross J. Anderson, Fabien A.P. Petitcolas: On the Limits of Steganography. IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, May 1998. 332Google Scholar
  3. [3]
    Jessica Fridrich, Miroslav Goljan, Rui Du: Steganalysis Based on JPEG Compatibility, in Multimedia Systems and Applications IV, Andrew G. Tescher, Bhaskaran Vasudev, V. Michael Bove, Jr. (Eds.), Proceedings of SPIE, Multimedia Systems and Applications IV, Denver, CO, 2001. 3Google Scholar
  4. [4]
    J. Fridrich, Rui Du, Meng Long: Steganalysis of LSB Encoding in Color Images, in Proc. ICME 2000, New York City, NY, 2000. 335Google Scholar
  5. [5]
    Neil F. Johnson, Sushil Jajodia: Steganalysis of Images Created Using Current Steganography Software, in David Aucsmith (Ed.): Information Hiding. Second International Workshop, LNCS 1525, Springer-Verlag Berlin Heidelberg 1998. pp. 273–289. 324Google Scholar
  6. [6]
    Fabien A.P. Petitcolas: MP3Stego 1.1.16, 1998/2002. http://www.cl.cam.ac.uk/~fapp2/steganography/mp3stego 325, 329, 338
  7. [7]
    Niels Provos: Defending Against Statistical Steganalysis, 10th USENIX Security Symposium. Washington, DC, August 2001. 330Google Scholar
  8. [8]
    Niels Provos, Peter Honeyman: Detecting Steganographic Content on the Internet, ISOC NDSS’02, San Diego, CA, February 2002. 330Google Scholar
  9. [9]
    Greg Roelofs: Zlib Home Site. http://www.zlib.org 325
  10. [10]
    Toby Sharp: An Implementation of Key-Based Digital Signal Steganography, in Ira S. Moskowitz (Ed.): Information Hiding. 4th International Workshop, LNCS 2137, Springer-Verlag Berlin Heidelberg 2001. pp. 13–26. 334, 335CrossRefGoogle Scholar
  11. [11]
    Toby Sharp: Hide 2.1. 2001. http://www.sharpthoughts.org 325, 333
  12. [12]
    Andreas Westfeld, Andreas Pfitzmann: Attacks on Steganographic Systems, in Andreas Pfitzmann (Ed.): Information Hiding. Third International Workshop, LNCS 1768, Springer-Verlag Berlin Heidelberg 2000. pp. 61–76. 325, 330, 333, 334, 338Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Andreas Westfeld
    • 1
  1. 1.Institute for System ArchitectureTechnische Universität DresdenDresdenGermany

Personalised recommendations