Detection of LSB Steganography via Sample Pair Analysis

  • Sorina Dumitrescu
  • Xiaolin Wu
  • Zhe Wang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2578)


This paper introduces a new, principled approach to detecting LSB steganography in digital signals such as images and audio. It is shown that the length of hidden message embedded in the least significant bits of signal samples can be estimated with relatively high precision. The new steganalytic approach is based on some statistical measures of sample pairs that are highly sensitive to LSB embedding operations. The resulting detection algorithm is simple and fast. To evaluate the robustness of the proposed steganalytic approach, bounds on estimation errors are developed. Furthermore, the vulnerability of the new approach to possible attacks is also assessed, and counter measures are suggested.


Sample Pair False Alarm Rate Counter Measure Probability Mass Function Message Length 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    R. Chandramouli, G. Li, and N. Memon, “Adaptive steganography”, submitted manuscript, 2002. 366Google Scholar
  2. [2]
    J. Fridrich, R. Du, M. Long, “Steganalysis of LSB Encoding in Color Images”, Proc. of ICME 2000, NYC, July 31-Aug. 2, USA. 355Google Scholar
  3. [3]
    J. Fridrich, M. Goljan and R. Du, “Reliable Detection of LSB Steganography in Color and Grayscale Images”. Proc. of ACM Workshop on Multimedia and Security, Ottawa, Oct. 5, 2001, pp. 27–30. 355, 366Google Scholar
  4. [4]
    N.F. Johnson, S. Jajodia, “Steganalysis of Images created using current steganography software”, in David Aucsmith (Ed.): Information Hiding, LNCS 1525, pp. 32–47. Springer-Verlag, 1998. 355Google Scholar
  5. [5]
    N.F. Johnson, S. Katzenbeisser, “A Survey of steganographic techniques”, in S. Katzenbeisser and F. Petitcolas (Eds.): Information Hiding, pp. 43–78. Artech House, Norwood, MA, 2000. 355Google Scholar
  6. [6]
    A. Westfeld, A. Pfitzmann, “Attacks on Steganographic Systems”, in Andreas Pfitzmann (Ed.): Information Hiding, LNCS 1768, pp. 61–76, Springer-Verlag, 1999. 355Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Sorina Dumitrescu
    • 1
  • Xiaolin Wu
    • 1
  • Zhe Wang
    • 1
  1. 1.Department of Electrical and Computer EngineeringMcMaster University HamiltonOntarioCanada

Personalised recommendations