Advertisement

A New Steganography Based on χ2 Technic

  • Zainab Famili
  • Karim Faez
  • Abbas Fadavi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5856)

Abstract

In this paper, we proposed a new method for Steganography based on deceiving χ 2 algorithm. Since the cover image coefficients and stego image coefficients histograms have sensible difference for purposes of statistical properties, statistical analysis of χ 2-test reveals the existence of hidden messages inside stego image .We are introducing the idea for hiding messages in the cover image. It causes that DCT (Discrete Cosine Transforms) coefficient histogram not having remarkable modification before and after embedding message. As a result, the identifying of hidden message inside an image is impossible for an eavesdropper through χ 2-test. In fact, the proposed method increases the Steganography security against χ 2-test, but the capacity of embedding messages decreases to half.

Keywords

Steganography cover image stego image χ2-test 

References

  1. 1.
    Zhang, T., Ping, X.: A Fast and Effective Steganalytic Technique against JSteg-like Algorithms. In: Proc. 8th ACM Symp. Applied Computing. ACM Press, New York (2003)Google Scholar
  2. 2.
    Judge, J.C.: Steganography: Past, Present, Future, SANS white paper November 30 (2001), http://www.Sans.org/rr/papers/
  3. 3.
    Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Security and Privacy 1(3), 32–44 (2003)CrossRefGoogle Scholar
  4. 4.
    Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the Unseen. Computer 31(2), 26–34 (1998)CrossRefGoogle Scholar
  5. 5.
    Anderson, R.J., Petitcolas, F.A.P.: On the Limits of Steganography. J. Selected Areas in Comm. 16(4), 474–481 (1998)CrossRefGoogle Scholar
  6. 6.
    Liu, Q., Sung, A.H., Ribeiro, B., Wei, M., Chen, Z., Xu, J.: Image complexity and feature mining for steganalysis of least significant bit matching steganography. Information Sciences 178(1), 21–36 (2008)CrossRefGoogle Scholar
  7. 7.
    Kurak, C., McHugh, J.: A cautionary note on image downgrading. In: Proceedings of the 8th Computer Security Application Conference, pp. 153–159 (1992)Google Scholar
  8. 8.
    Katzenbeisser, S., Petitcolas, F.A.P.: On Defining Security in Steganographic Systems. In: Proceedings of SPIE: Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California, vol. 4675 (2002)Google Scholar
  9. 9.
    Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  10. 10.
    Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Trans. Information Theory 47(4), 1423–1443 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  12. 12.
    Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding – A Survey. Proceeding of IEEE 87(7), 1062–1078 (1999)CrossRefGoogle Scholar
  13. 13.
    Fridrich, J., Goljan, M.: Practical Steganalysis-State of the Art. In: Proc. SPIE Photonics Imaging 2002, Security and Watermarking of Multimedia Contents, vol. 4675, pp. 1–13. SPIE Press (2002)Google Scholar
  14. 14.
    Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Trans. Information Theory 47(4), 1423–1443 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  15. 15.
    Wallace, G.W.: The JPEG Still Picture Compression Standard. Communications of the ACM 34(4), 30–44 (1991)CrossRefGoogle Scholar
  16. 16.
    Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  17. 17.
    Provos, N.: Defending Against Statistical Steganalysis. In: Proc. 10th Usenix Security Symp., pp. 323–335. Usenix Assoc. (2001)Google Scholar
  18. 18.
    Gonzalez, Woods: Digital Image ProcessingGoogle Scholar
  19. 19.
    Provos, N., Honeyman, P.: Detecting Steganographic Content on the Internet. In: Proc. 2002 Network and Distributed System Security Symp. Internet Soc. (2002)Google Scholar
  20. 20.
    RSA Data Security. The RC4 Encryption Algorithm (March 1992)Google Scholar
  21. 21.
    Schneier, B.: Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191–204. Springer, Heidelberg (1994)Google Scholar
  22. 22.
    Provos, N.: Defending Against Statistical Steganalysis. In: Proceedings of the 10th USENIX Security Symposium, August 2001, pp. 323–335 (2001)Google Scholar
  23. 23.
    Westfeld, A.: F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Zainab Famili
    • 1
  • Karim Faez
    • 2
  • Abbas Fadavi
    • 3
  1. 1.Department of Electrical, Computer and IT Eng.Azad UniversityQazvinIran
  2. 2.Department of Electrical Eng.Amirkabir University of TechTehranIran
  3. 3.Department of Electrical Eng.Azad UniversityGarmsarIran

Personalised recommendations