Skip to main content

A Fusion of Maximum Likelihood and Structural Steganalysis

  • Conference paper
Information Hiding (IH 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4567))

Included in the following conference series:

Abstract

This paper draws together two methodologies for the detection of bit replacement steganography: the principle of maximum likelihood, which is statistically well-founded but has lead to weak detectors in practice, and so-called structural detection, which is sensitive but lacks optimality and can suffer from complicated exposition. The key novelty is to extend structural analysis to include a hypothetical “pre-cover”, from which the cover object is imagined to derive. Here, maximum likelihood detection is presented for three structural detectors. Although the algebraic derivation is long, and maximizing the likelihood function difficult in practice, conceptually the new detectors are reasonably simple. Experiments show that the new detectors are the best performers yet, very significantly so in the detection of replacement of multiple bit planes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and grayscale images. IEEE Multimedia 8, 22–28 (2001)

    Article  Google Scholar 

  2. Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Transactions on Signal Processing 51, 1995–2007 (2003)

    Article  MATH  Google Scholar 

  3. Lu, P., Luo, X., Tang, Q., Shen, L.: An improved sample pairs method for detection of LSB embedding. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 116–127. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Dumitrescu, S., Wu, X.: A new framework of LSB steganalysis of digital media. IEEE Transactions on Signal Processing 53, 3936–3947 (2005)

    Article  MathSciNet  Google Scholar 

  5. Ker, A.: A general framework for the structural steganalysis of LSB replacement. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 296–311. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Ker, A.: Fourth-order structural steganalysis and analysis of cover assumptions. In: Security, Steganography and Watermarking of Multimedia Contents VIII. Proc. SPIE, vol. 6072, pp. 25–38 (2006)

    Google Scholar 

  7. Ker, A.: Steganalysis of embedding in two least significant bits. IEEE Transactions on Information Forensics and Security 2, 46–54 (2007)

    Article  Google Scholar 

  8. Dabeer, O., Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.: Detection of hiding in the least significant bit. IEEE Transactions on Signal Processing 52, 3046–3058 (2004)

    Article  MathSciNet  Google Scholar 

  9. Hogan, M., Hurley, N., Silvestre, G., Balado, F., Whelan, K.: ML detection of steganography. In: Security, Steganography and Watermarking of Multimedia Contents VII. Proc. SPIE, vol. 5681, pp. 16–27 (2005)

    Google Scholar 

  10. Draper, S., Ishwar, P., Molnar, D., Prabhakaran, V., Ramchandran, K., Schonberg, D., Wagner, D.: An analysis of empirical PMF based tests for least significant bit image steganography. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 327–341. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.: Steganalysis for Markov cover data with applications to images. IEEE Transactions on Information Forensics and Security 1, 275–287 (2006)

    Article  Google Scholar 

  12. Ker, A.: A fusion of maximum likelihood and structural steganalysis, extended technical report in preparation (2007)

    Google Scholar 

  13. Ker, A.: Derivation of error distribution in least-squares steganalysis. IEEE Transactions on Information Forensics and Security 2, 140–148 (2007)

    Article  Google Scholar 

  14. Fridrich, J., Soukal, D.: Matrix embedding for large payloads. In: Security, Steganography and Watermarking of Multimedia Contents VIII. Proc. SPIE, vol. 6072 (2006)

    Google Scholar 

  15. Nelder, J., Mead, R.: A simplex algorithm for function minimization. Computer Journal 7, 308–313 (1965)

    Article  MathSciNet  MATH  Google Scholar 

  16. Ker, A.: Optimally weighted least-squares steganalysis. In: Security, Steganography and Watermarking of Multimedia Contents IX. Proc. SPIE, vol. 6505 (2007)

    Google Scholar 

  17. Yu, X., Tan, T., Wang, Y.: Extended optimization method of LSB steganalysis. In: Proc. IEEE International Conference on Image Processing, vol. 2, pp. 1102–1105 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ker, A.D. (2007). A Fusion of Maximum Likelihood and Structural Steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds) Information Hiding. IH 2007. Lecture Notes in Computer Science, vol 4567. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77370-2_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77370-2_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77369-6

  • Online ISBN: 978-3-540-77370-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics