Skip to main content

Steganography and Steganalysis: Current Status and Future Directions

  • Conference paper
  • First Online:
Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 151))

Abstract

Steganography is the art of hiding a secret object in a cover media, while Steganalysis is the art of discovering the secret object from the cover media. With the increased emphasis in security, both steganography and steganalysis have recently drawn great research attention. While it is relatively easy to embed a secret message in a media such as an image, audio or video, the detection of an embedded message i.e., steganalysis is challenging because of the many different methods used in steganography and the continuous evolution of new steganography algorithms. In this paper we discuss the different techniques of steganography and steganalysis used in popular cover types i.e., images and audio. We also present an overview of some of the state-of-the-art tools used in this field. Our goal is to provide this as a survey paper identifying the current state of research, and possible future directions in this field.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fridrich J (2004) Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In: Proceedings 6th information hiding workshop, Toronto, 2004, pp 67–81

    Google Scholar 

  2. Chandramouli R, Kharrazi M, Memon N (2004) Image steganography and steganalysis: concepts and practice. Lecture Notes in Computer Science, Springer, Berlin, pp 204–211

    Google Scholar 

  3. Kharrazi M, Sencar HT, Memon N (2005) Benchmarking steganographic and steganalysis techniques, security, steganography, and watermarking of multimedia contents VII. In: Delp, Edward J, III Wong Ping W (eds) Proceedings of the SPIE, vol 5681, pp 252–263

    Google Scholar 

  4. Lyu S, Farid H (2002) Detecting hidden messages using higher-order statistics and support vector machines. In: Proceedings of 5th International workshop on information hiding, pp 340–354

    Google Scholar 

  5. Lyu S, Farid H (2004) Steganalysis using color wavelet statistics and one-class support vector machines. Proc SPIE 5306:35–45

    Google Scholar 

  6. Martin A, Sapiro G, Seroussi G (2005) Is image steganography natural? IEEE Trans Image Process 12:2040–2050

    Google Scholar 

  7. Upham D JPEG-JSTEG—modifications of the independent JPEG groups JPEG software for 1-Bit steganography in JFIF output files. ftp://ftp.funet.fi/pub/crypt/steganography/

  8. Tzschoppe R, Bäuml R, Huber JB, Kaup A (2003) Steganographic system based on higher-order statistics, SPIE security and watermarking of multimedia Contents V, Santa Clara, CA

    Google Scholar 

  9. Brown A (1994) S-Tools for windows. ftp://ftp.ntua.gr/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-tools4.zip

  10. Gousseau Y, Morel JM (2001) Are natural images of bounded variation. SIAM J Math Anal 33(3):634–648

    Article  MathSciNet  MATH  Google Scholar 

  11. Alvarez L, Gousseau Y, Morel JM (1999) The size of objects in natural images, in CMLA. Cachan Ecole Normale Sup, France

    Google Scholar 

  12. Grenander U, Srivastava A (2001) Probability models for clutter in natural images. IEEE Trans Pattern Anal Mach Intell 23(4):424–429

    Article  Google Scholar 

  13. Srivastava A, Liu X, Grenander U (2002) Universal analytical forms for modeling image probabilities. IEEE Trans Pattern Anal Mach Intell 24(9):1200–1214

    Article  Google Scholar 

  14. Grenander U (2003) Toward a theory of natural scenes. Technical report, Brown University, Providence, RI. http://www.dam.brown.edu/ptg/REPORTS/natural.pdf

  15. Green ML (2002) Statistics of images, the TV algorithm of Rudin-Osher-Fatemi for image denoising and an improved denoising algorithm. Technical report, University California, Los Angeles. ftp://ftp.math.ucla.edu/pub/camreport/cam02-55.pdf

  16. Avcibas I, Memon N, Sankur B (2001) Steganalysis using image quality metrics. In: Proceedings security and watermarking of multimedia contents, San Jose, CA, pp 523–531

    Google Scholar 

  17. Avcibas I, Kharrazi M, Memon N, Sankur B (2005) Image steganalysis with binary similarity measures. EURASIP J Appl Signal Process 17:2749–2757

    Google Scholar 

  18. Farid H (2002) Detecting hidden messages using higher-order statistical models. In: Proceedings IEEE international conference on image processing (ICIP’02), vol 2, Rochester, NY, USA, Sept 2002, pp 905–908

    Google Scholar 

  19. Goljan M, Fridrich J, Holotyak T (2006) New blind steganalysis and its implications. In: Proceedings SPIE, electronic imaging, security, steganography, and watermarking of multimedia contents VIII, vol 6072, San Jose, CA, 16–19 Jan 2006, pp 1–13

    Google Scholar 

  20. Holotyak T, Fridrich J, Voloshynovskiy S (2005) Blind statistical Steganalysis of additive steganography using wavelet higher order statistics 9th IFIP TC-6 TC-11 conference on communications and multimedia security, LNCS vol 3677, Springer-Verlag, Berlin, pp 273–274

    Google Scholar 

  21. http://www.outguess.org/detection.php

  22. Westfeld A (2001) F5-A Steganographic algorithm: high capacity despite better steganalysis. Proceedings of the 4th international workshop on information hiding. LNCS 21(37):289–302

    Google Scholar 

  23. Sallee P (2003) Model-based steganography. In: Proceedings international workshop on digital watermarking, Seoul, Korea, pp 254–260

    Google Scholar 

  24. Fridrich J, Goljan M, Soukal D (2004) Perturbed quantization steganography with wet paper codes. In Proceedings ACM multimedia workshop, Magdeburg, Germany, pp 4–15

    Google Scholar 

  25. Kharrazi M, Sencar HT, Memon N (2006) Performance study of common image steganography and steganalysis techniques. J Electron Imaging 15(4):21–41

    Google Scholar 

  26. Ella W (2008) Detecting steganography on a large scale, crossroads, ACM, pp 3–6

    Google Scholar 

  27. http://sarc-wv.com/products/stegalyzerss.aspx

  28. Tian H, Zhou K, Jiang H, Liu J, Huang Y, Feng D (2009) An M-Sequence based steganography model for voice over IP, ICC ‘09. In: IEEE international conference on communications, August 2009, pp 1–5

    Google Scholar 

  29. Tian H, Zhou K, Jiang H, Liu J, Huang Y, Feng D (2009) An adaptive steganography scheme for voice over IP. In: The 2009 IEEE international symposium on circuits and systems, pp 2922–2925

    Google Scholar 

  30. Liu Q, Sung AH, Qiao M (2009) Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Trans Inf Forensics and Sec 4(3):359–368

    Article  Google Scholar 

  31. Liu Q, Sung AH, Qiao M (2009) Novel stream mining for audio steganalysis. In: Proceedings of the seventeen ACM international conference on multimedia, 19–24 Oct 2009, Beijing, China, pp 95–104

    Google Scholar 

  32. Qiao M, Sung AH, Liu Q (2009) Feature mining and intelligent computing for MP3 steganalysis. In: 2009 international joint conference on bioinformatics, systems biology and intelligent computing, pp 627–630

    Google Scholar 

  33. http://wandership.ca/projects/deogol/intro.html

  34. Li Z, Sun X, Wang B, Wang X (2008) A steganography scheme in P2P network, IIHMSP ‘08 international conference on intelligent information hiding and multimedia signal processing, Aug 2008, pp 20–24

    Google Scholar 

  35. Fridrich J, Goljan M, Hogea D, Soukal D (2003) Quantitive steganalysis of digital images: estimating the secret message length, ACM multimedia systems journal, special issue on multimedia security, pp 288–302

    Google Scholar 

  36. http://www.skyjuicesoftware.com/software/ds_info.html

  37. http://www.spychecker.com/program/stools.html

  38. http://wbstego.wbailer.com/

  39. http://www.brothersoft.com/stegdetect-download-306943.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eman Abdelfattah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Abdelfattah, E., Mahmood, A. (2013). Steganography and Steganalysis: Current Status and Future Directions. In: Sobh, T., Elleithy, K. (eds) Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering. Lecture Notes in Electrical Engineering, vol 151. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3558-7_34

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-3558-7_34

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-3557-0

  • Online ISBN: 978-1-4614-3558-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics