Abstract
In this paper, we proposed a new method for Steganography based on deceiving χ 2 algorithm. Since the cover image coefficients and stego image coefficients histograms have sensible difference for purposes of statistical properties, statistical analysis of χ 2-test reveals the existence of hidden messages inside stego image .We are introducing the idea for hiding messages in the cover image. It causes that DCT (Discrete Cosine Transforms) coefficient histogram not having remarkable modification before and after embedding message. As a result, the identifying of hidden message inside an image is impossible for an eavesdropper through χ 2-test. In fact, the proposed method increases the Steganography security against χ 2-test, but the capacity of embedding messages decreases to half.
Keywords
References
Zhang, T., Ping, X.: A Fast and Effective Steganalytic Technique against JSteg-like Algorithms. In: Proc. 8th ACM Symp. Applied Computing. ACM Press, New York (2003)
Judge, J.C.: Steganography: Past, Present, Future, SANS white paper November 30 (2001), http://www.Sans.org/rr/papers/
Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Security and Privacy 1(3), 32–44 (2003)
Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the Unseen. Computer 31(2), 26–34 (1998)
Anderson, R.J., Petitcolas, F.A.P.: On the Limits of Steganography. J. Selected Areas in Comm. 16(4), 474–481 (1998)
Liu, Q., Sung, A.H., Ribeiro, B., Wei, M., Chen, Z., Xu, J.: Image complexity and feature mining for steganalysis of least significant bit matching steganography. Information Sciences 178(1), 21–36 (2008)
Kurak, C., McHugh, J.: A cautionary note on image downgrading. In: Proceedings of the 8th Computer Security Application Conference, pp. 153–159 (1992)
Katzenbeisser, S., Petitcolas, F.A.P.: On Defining Security in Steganographic Systems. In: Proceedings of SPIE: Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California, vol. 4675 (2002)
Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)
Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Trans. Information Theory 47(4), 1423–1443 (2001)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding – A Survey. Proceeding of IEEE 87(7), 1062–1078 (1999)
Fridrich, J., Goljan, M.: Practical Steganalysis-State of the Art. In: Proc. SPIE Photonics Imaging 2002, Security and Watermarking of Multimedia Contents, vol. 4675, pp. 1–13. SPIE Press (2002)
Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Trans. Information Theory 47(4), 1423–1443 (2001)
Wallace, G.W.: The JPEG Still Picture Compression Standard. Communications of the ACM 34(4), 30–44 (1991)
Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Provos, N.: Defending Against Statistical Steganalysis. In: Proc. 10th Usenix Security Symp., pp. 323–335. Usenix Assoc. (2001)
Gonzalez, Woods: Digital Image Processing
Provos, N., Honeyman, P.: Detecting Steganographic Content on the Internet. In: Proc. 2002 Network and Distributed System Security Symp. Internet Soc. (2002)
RSA Data Security. The RC4 Encryption Algorithm (March 1992)
Schneier, B.: Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191–204. Springer, Heidelberg (1994)
Provos, N.: Defending Against Statistical Steganalysis. In: Proceedings of the 10th USENIX Security Symposium, August 2001, pp. 323–335 (2001)
Westfeld, A.: F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Famili, Z., Faez, K., Fadavi, A. (2009). A New Steganography Based on χ 2 Technic. In: Bayro-Corrochano, E., Eklundh, JO. (eds) Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. CIARP 2009. Lecture Notes in Computer Science, vol 5856. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10268-4_124
Download citation
DOI: https://doi.org/10.1007/978-3-642-10268-4_124
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10267-7
Online ISBN: 978-3-642-10268-4
eBook Packages: Computer ScienceComputer Science (R0)