Abstract
In this paper, we propose a steganalysis method that is able to identify the locations of stego bearing pixels in the binary image. In order to do that, our proposed method will calculate the residual between a given stego image and its estimated cover image. After that, we will compute the local entropy difference between these two versions of images as well. Finally, we will compute the mean of residual and mean of local entropy difference across multiple stego images. From these two means, the locations of stego bearing pixels can be identified. The presented empirical results demonstrate that our proposed method can identify the stego bearing locations of near perfect accuracy when sufficient stego images are supplied. Hence, our proposed method can be used to reveal which pixels in the binary image have been used to carry the secret message.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
He, J., Huang, J.: Steganalysis of Stochastic Modulation Steganography. Science in China Series F: Information Sciences 49(3), 273–285 (2006)
Ker, A.D.: Locating Steganographic Payload via WS Residuals. In: Proceedings of the 10th ACM Workshop on Multimedia and Security, pp. 27–32 (2008)
Fridrich, J., Goljan, M., Soukal, D., Holotyak, T.: Forensic Steganalysis: Determining the Stego Key in Spatial Domain Steganography. In: Proc. of SPIE on Electronic Imaging, vol. 5681, pp. 631–642 (2005)
Chiew, K.L., Pieprzyk, J.: Binary image steganographic techniques classification based on multi-class steganalysis. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds.) Information Security, Practice and Experience. LNCS, vol. 6047, pp. 341–358. Springer, Heidelberg (2010)
Davidson, I., Paul, G.: Locating Secret Messages in Images. In: Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 545–550 (2004)
Chiew, K.L., Pieprzyk, J.: Blind steganalysis: A countermeasure for binary image steganography. In: International Conference on Availability, Reliability and Security, pp. 653–658 (2010)
Kong, X.-W., Liu, W.-F., You, X.-G.: Secret Message Location Steganalysis Based on Local Coherences of Hue. In: Ho, Y.-S., Kim, H.-J. (eds.) PCM 2005. LNCS, vol. 3768, pp. 301–311. Springer, Heidelberg (2005)
Ker, A.D., Lubenko, I.: Feature reduction and payload location with WAM steganalysis. In: Media Forensics and Security, vol. 7254 (2009)
Schaefer, G., Stich, M.: UCID - An Uncompressed Colour Image Database. In: Proceeding of SPIE on Storage and Retrieval Methods and Applications for Multimedia, pp. 472–480 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chiew, K.L., Pieprzyk, J. (2010). Identifying Steganographic Payload Location in Binary Image. In: Qiu, G., Lam, K.M., Kiya, H., Xue, XY., Kuo, CC.J., Lew, M.S. (eds) Advances in Multimedia Information Processing - PCM 2010. PCM 2010. Lecture Notes in Computer Science, vol 6297. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15702-8_54
Download citation
DOI: https://doi.org/10.1007/978-3-642-15702-8_54
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15701-1
Online ISBN: 978-3-642-15702-8
eBook Packages: Computer ScienceComputer Science (R0)