Advertisement

Steganalysis of Multi Bit Plane Image Steganography

  • Johann Barbier
  • Kichenakoumar Mayoura
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5041)

Abstract

In this paper, we present an efficient specific steganalysis scheme for multi bit plane image steganography. This algorithm proposed by Nguyen, Yoon and Lee at IWDW’06 is applied to uncompressed images and embeds data into several bit planes of the canonical gray coding. It is designed to be robust against RS steganalysis and pixel difference histogram analysis. We show how to adapt RS analysis into a local analysis to design an efficient detector against multi bit plane image steganography. This method takes advantages from both the counter-measures introduced by the authors and the power of RS analysis approach. Finally, we designed a specific classifier to detect images embedded with Nguyen’s algorithm. This detector has high detection rates, even for low embedding rates.

Keywords

Multi bit plane image steganography Fisher discriminant RS steganalysis 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Nguyen, B., Yoon, S., Lee, H.K.: Multi bit plane image steganography. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 61–70. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  2. 2.
    Agaian, S., Rodriguez, B., Perez, J.: Stego sensitivity measure and multibit plane based steganography using different color models. In: Delp, E., Wong, P. (eds.) Proc.Security, Steganography, and Watermarking of Multimedia Contents VIII, February 2006, vol. 6072, pp. 279–290 (2006)Google Scholar
  3. 3.
    Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in grayscale and color images. In: Proc. ACM Workshop on Multimedia and Security, Ottawa, Canada, October 2001, pp. 27–30 (2001)Google Scholar
  4. 4.
    Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  5. 5.
    Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 355–372. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Lu, P., Luo, X., Tang, Q., Shen, L.: An improved sample pairs method for detection of LSB embedding. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 116–127. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    Lyu, S., Farid, H.: Steganalysis using higher-order image statistics. IEEE Transactions on Information Forensics and Security 1 (2006)Google Scholar
  8. 8.
    Ker, A.: Improved detection of LSB steganography in grayscale images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 97–115. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Barbier, J., Filiol, É., Mayoura, K.: Universal detection of JPEG steganography. Journal of Multimedia 2(2), 1–9 (2007)CrossRefGoogle Scholar
  10. 10.
    Barbier, J., Filiol, É., Mayoura, K.: Universal JPEG steganalysis in the compressed frequency domain. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 253–267. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  11. 11.
    Saporta, G.: Probabilité, Analyse des Données et Statistiques. Technip (in french) (1990)Google Scholar
  12. 12.
    Raudys, S.: Statistical and Neural Classifiers: An Integrated Approach to Design. Advances in Pattern Recognition. Springer, Heidelberg (2001)CrossRefzbMATHGoogle Scholar
  13. 13.
    Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and gray-scale images. IEEE MultiMedia 8(4), 22–28 (2001)CrossRefGoogle Scholar
  14. 14.
    Westfeld, A.: F5-a steganographic algorithm. In: Moskowitz, I. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  15. 15.
    Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington, DC, USA (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Johann Barbier
    • 1
    • 2
  • Kichenakoumar Mayoura
    • 1
  1. 1.Laboratoire de Virologie et CryptologieÉcole Supérieure et d’Application des TransmissionsRennes CedexFrance
  2. 2.Département de Cryptologie, La Roche MargueriteCentre d’ÉLectronique de l’ARmementBruz CedexFrance

Personalised recommendations