Steganalysis of Images Created Using Current Steganography Software

  • Neil F. Johnson
  • Sushil Jajodia
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1525)


Steganography is the art of passing information in a manner that the very existence of the message is unknown. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. Steganalysis is the art of discovering and rendering useless such covert messages. In this paper, we identify characteristics in current steganography software that direct the steganalyst to the existence of a hidden message and introduce the ground work of a tool for automatically detecting the existence of hidden messages in images.


Discrete Cosine Transform Cover Image Watermark Image Digital Watermark Discrete Cosine Transform Coefficient 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Anderson, R., (ed.): Information hiding: first international workshop, Cambridge, UK. Lecture Notes in Computer Science, Vol. 1174. Springer-Verlag, Berlin Heidelberg New York (1996)Google Scholar
  2. 2.
    Anderson, R., Petitcolas, F.: On the Limits of Steganography, IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, May (1998) 474–481.CrossRefGoogle Scholar
  3. 3.
    Aura, T.: Invisible Communication, EET 1995. Technical Report, Helsinki Univ. of Technology, Finland, November 1995, (1995)Google Scholar
  4. 4.
    Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for Data Hiding. IBM Systems Journal Vol. 35, No. 3&4. MIT Media Lab (1996) 313–336.CrossRefGoogle Scholar
  5. 5.
    Brown, W., Shepherd, B.J.: Graphics File Formats: Reference and Guide. Manning Publications, Greenwich, CT (1995)Google Scholar
  6. 6.
    Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. Technical Report 95-10, NEC Research Institute (1995)Google Scholar
  7. 7.
    Cox, I., Kilian, J., Shamoon, T., Leighton, T.: A Secure, Robust Watermark for Multimedia. In: [1] (1996) 185–206Google Scholar
  8. 8.
    Cole, E.: Steganography. Information System Security paper, George Mason University. (1997)Google Scholar
  9. 9.
    Craver, S., Memon, N., Yeo, B., Yeung, N.M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques. Research Report RC 20755 (91985), Computer Science/ Mathematics, IBM Research Division (1997)Google Scholar
  10. 10.
    Cha, S.D., Park, G.H., Lee, H.K.: A Solution to the Image Downgrading Problem. ACSAC (1995) 108–112Google Scholar
  11. 11.
    Dunigan, T.: Work in progress on Internet steganography which involves hiding, recovering, and detecting info hidden in the TCP/IP packet headers. Oak Ridge National Laboratory, Oak Ridge, TN.Google Scholar
  12. 12.
    Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Addison-Wesley. Reading, MA, (1992)Google Scholar
  13. 13.
    Heckbert, P.: Color Image Quantization for Frame Buffer Display. ACM Computer Graphics, vol. 16, no. 3. July (1982) 297–307.CrossRefGoogle Scholar
  14. 14.
    Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the Unseen. IEEE Computer. February (1998) 26–34Google Scholar
  15. 15.
    Johnson, N.F.: Steganography. Information System Security paper, George Mason University (1995)
  16. 16.
    Koch, E., Rindfrey, J., Zhao, J.: Copyright Protection for Multimedia Data. Proceedings of the International Conference on Digital Media and Electronic Publishing, December 1994. Leeds, UK (1994)Google Scholar
  17. 17.
    Kurak, C., McHugh, J.: A Cautionary Note On Image Downgrading. IEEE Eighth Annual Computer Security Applications Conference (1992) 153–159.Google Scholar
  18. 18.
    Petitcolas, F., Anderson, R., Kuhn, M.: Attacks on Copyright Marking Systems. Second Workshop on Information Hiding, Portland, Oregon, April. This proceedings (1998)Google Scholar
  19. 19.
    Pfitzman, B.: Information Hiding Terminology. In: [1] 347–350Google Scholar
  20. 20.
    Wayner, P.: Disappearing Cryptography. AP Professional, Chestnut Hill, MA (1996)Google Scholar
  21. 21.
    Xia, X, Boncelet, C.G., Arce, G.R.: A Multiresolution Watermark for Digital Images. IEEE International Conference on Image Processing, October 1997 (1997)Google Scholar
  22. 22.
    Anonymous, Author alias: Black Wolf.: StegoDos-Black Wolf’s Picture Encoder v0.90B, Public Domain.
  23. 23.
    Arachelian, R.: White Noise Stormℳ (WNS), Shareware (1994)
  24. 24.
  25. 25.
  26. 26.
    Machado, R.: EzStego, Stego Online, Stego,
  27. 27.
  28. 28.
  29. 29.
    Hansmann F.: Steganos. Deus Ex Machina Communications.
  30. 30.
    Digimarc Corporation: PictureMarcℳ, MarcSpiderℳ,
  31. 31.
    Kutter, M., Jordan, F.: JK-PGS (Pretty Good Signature). Signal Processing Laboratory at Swiss Federal Institute of Technology (EPFL).
  32. 32.
    MediaSec Technologies LLC.: SysCopℳ,
  33. 33.
    Signum Technologies, SureSign,
  34. 34.
    Upham, D.: Jpeg-Jsteg. Modification of the Independent JPEG Group’s JPEG software (release 4) for 1-bit steganography in JFIF output files. steganography.
  35. 35.
    Kuhn, M., Petitcolas F.: StirMark.
  36. 36.
    Sanders, D.: Stegodetect. Steganography detection tool (1997)Google Scholar
  37. 37.
    Anonymous: unZign. Watermarking testing tool available at - the author may be contacted through (1997)

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Neil F. Johnson
    • 1
  • Sushil Jajodia
    • 1
  1. 1.Center for Secure Information SystemsGeorge Mason UniversityFairfax

Personalised recommendations