Abstract
Steganography is the art of hiding a secret object in a cover media, while Steganalysis is the art of discovering the secret object from the cover media. With the increased emphasis in security, both steganography and steganalysis have recently drawn great research attention. While it is relatively easy to embed a secret message in a media such as an image, audio or video, the detection of an embedded message i.e., steganalysis is challenging because of the many different methods used in steganography and the continuous evolution of new steganography algorithms. In this paper we discuss the different techniques of steganography and steganalysis used in popular cover types i.e., images and audio. We also present an overview of some of the state-of-the-art tools used in this field. Our goal is to provide this as a survey paper identifying the current state of research, and possible future directions in this field.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fridrich J (2004) Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In: Proceedings 6th information hiding workshop, Toronto, 2004, pp 67–81
Chandramouli R, Kharrazi M, Memon N (2004) Image steganography and steganalysis: concepts and practice. Lecture Notes in Computer Science, Springer, Berlin, pp 204–211
Kharrazi M, Sencar HT, Memon N (2005) Benchmarking steganographic and steganalysis techniques, security, steganography, and watermarking of multimedia contents VII. In: Delp, Edward J, III Wong Ping W (eds) Proceedings of the SPIE, vol 5681, pp 252–263
Lyu S, Farid H (2002) Detecting hidden messages using higher-order statistics and support vector machines. In: Proceedings of 5th International workshop on information hiding, pp 340–354
Lyu S, Farid H (2004) Steganalysis using color wavelet statistics and one-class support vector machines. Proc SPIE 5306:35–45
Martin A, Sapiro G, Seroussi G (2005) Is image steganography natural? IEEE Trans Image Process 12:2040–2050
Upham D JPEG-JSTEG—modifications of the independent JPEG groups JPEG software for 1-Bit steganography in JFIF output files. ftp://ftp.funet.fi/pub/crypt/steganography/
Tzschoppe R, Bäuml R, Huber JB, Kaup A (2003) Steganographic system based on higher-order statistics, SPIE security and watermarking of multimedia Contents V, Santa Clara, CA
Brown A (1994) S-Tools for windows. ftp://ftp.ntua.gr/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-tools4.zip
Gousseau Y, Morel JM (2001) Are natural images of bounded variation. SIAM J Math Anal 33(3):634–648
Alvarez L, Gousseau Y, Morel JM (1999) The size of objects in natural images, in CMLA. Cachan Ecole Normale Sup, France
Grenander U, Srivastava A (2001) Probability models for clutter in natural images. IEEE Trans Pattern Anal Mach Intell 23(4):424–429
Srivastava A, Liu X, Grenander U (2002) Universal analytical forms for modeling image probabilities. IEEE Trans Pattern Anal Mach Intell 24(9):1200–1214
Grenander U (2003) Toward a theory of natural scenes. Technical report, Brown University, Providence, RI. http://www.dam.brown.edu/ptg/REPORTS/natural.pdf
Green ML (2002) Statistics of images, the TV algorithm of Rudin-Osher-Fatemi for image denoising and an improved denoising algorithm. Technical report, University California, Los Angeles. ftp://ftp.math.ucla.edu/pub/camreport/cam02-55.pdf
Avcibas I, Memon N, Sankur B (2001) Steganalysis using image quality metrics. In: Proceedings security and watermarking of multimedia contents, San Jose, CA, pp 523–531
Avcibas I, Kharrazi M, Memon N, Sankur B (2005) Image steganalysis with binary similarity measures. EURASIP J Appl Signal Process 17:2749–2757
Farid H (2002) Detecting hidden messages using higher-order statistical models. In: Proceedings IEEE international conference on image processing (ICIP’02), vol 2, Rochester, NY, USA, Sept 2002, pp 905–908
Goljan M, Fridrich J, Holotyak T (2006) New blind steganalysis and its implications. In: Proceedings SPIE, electronic imaging, security, steganography, and watermarking of multimedia contents VIII, vol 6072, San Jose, CA, 16–19 Jan 2006, pp 1–13
Holotyak T, Fridrich J, Voloshynovskiy S (2005) Blind statistical Steganalysis of additive steganography using wavelet higher order statistics 9th IFIP TC-6 TC-11 conference on communications and multimedia security, LNCS vol 3677, Springer-Verlag, Berlin, pp 273–274
Westfeld A (2001) F5-A Steganographic algorithm: high capacity despite better steganalysis. Proceedings of the 4th international workshop on information hiding. LNCS 21(37):289–302
Sallee P (2003) Model-based steganography. In: Proceedings international workshop on digital watermarking, Seoul, Korea, pp 254–260
Fridrich J, Goljan M, Soukal D (2004) Perturbed quantization steganography with wet paper codes. In Proceedings ACM multimedia workshop, Magdeburg, Germany, pp 4–15
Kharrazi M, Sencar HT, Memon N (2006) Performance study of common image steganography and steganalysis techniques. J Electron Imaging 15(4):21–41
Ella W (2008) Detecting steganography on a large scale, crossroads, ACM, pp 3–6
Tian H, Zhou K, Jiang H, Liu J, Huang Y, Feng D (2009) An M-Sequence based steganography model for voice over IP, ICC ‘09. In: IEEE international conference on communications, August 2009, pp 1–5
Tian H, Zhou K, Jiang H, Liu J, Huang Y, Feng D (2009) An adaptive steganography scheme for voice over IP. In: The 2009 IEEE international symposium on circuits and systems, pp 2922–2925
Liu Q, Sung AH, Qiao M (2009) Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Trans Inf Forensics and Sec 4(3):359–368
Liu Q, Sung AH, Qiao M (2009) Novel stream mining for audio steganalysis. In: Proceedings of the seventeen ACM international conference on multimedia, 19–24 Oct 2009, Beijing, China, pp 95–104
Qiao M, Sung AH, Liu Q (2009) Feature mining and intelligent computing for MP3 steganalysis. In: 2009 international joint conference on bioinformatics, systems biology and intelligent computing, pp 627–630
Li Z, Sun X, Wang B, Wang X (2008) A steganography scheme in P2P network, IIHMSP ‘08 international conference on intelligent information hiding and multimedia signal processing, Aug 2008, pp 20–24
Fridrich J, Goljan M, Hogea D, Soukal D (2003) Quantitive steganalysis of digital images: estimating the secret message length, ACM multimedia systems journal, special issue on multimedia security, pp 288–302
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Abdelfattah, E., Mahmood, A. (2013). Steganography and Steganalysis: Current Status and Future Directions. In: Sobh, T., Elleithy, K. (eds) Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering. Lecture Notes in Electrical Engineering, vol 151. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3558-7_34
Download citation
DOI: https://doi.org/10.1007/978-1-4614-3558-7_34
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-3557-0
Online ISBN: 978-1-4614-3558-7
eBook Packages: EngineeringEngineering (R0)