Skip to main content

Identifying Steganographic Payload Location in Binary Image

  • Conference paper
  • 1462 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6297))

Abstract

In this paper, we propose a steganalysis method that is able to identify the locations of stego bearing pixels in the binary image. In order to do that, our proposed method will calculate the residual between a given stego image and its estimated cover image. After that, we will compute the local entropy difference between these two versions of images as well. Finally, we will compute the mean of residual and mean of local entropy difference across multiple stego images. From these two means, the locations of stego bearing pixels can be identified. The presented empirical results demonstrate that our proposed method can identify the stego bearing locations of near perfect accuracy when sufficient stego images are supplied. Hence, our proposed method can be used to reveal which pixels in the binary image have been used to carry the secret message.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. He, J., Huang, J.: Steganalysis of Stochastic Modulation Steganography. Science in China Series F: Information Sciences 49(3), 273–285 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  2. Ker, A.D.: Locating Steganographic Payload via WS Residuals. In: Proceedings of the 10th ACM Workshop on Multimedia and Security, pp. 27–32 (2008)

    Google Scholar 

  3. Fridrich, J., Goljan, M., Soukal, D., Holotyak, T.: Forensic Steganalysis: Determining the Stego Key in Spatial Domain Steganography. In: Proc. of SPIE on Electronic Imaging, vol. 5681, pp. 631–642 (2005)

    Google Scholar 

  4. Chiew, K.L., Pieprzyk, J.: Binary image steganographic techniques classification based on multi-class steganalysis. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds.) Information Security, Practice and Experience. LNCS, vol. 6047, pp. 341–358. Springer, Heidelberg (2010)

    Google Scholar 

  5. Davidson, I., Paul, G.: Locating Secret Messages in Images. In: Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 545–550 (2004)

    Google Scholar 

  6. Chiew, K.L., Pieprzyk, J.: Blind steganalysis: A countermeasure for binary image steganography. In: International Conference on Availability, Reliability and Security, pp. 653–658 (2010)

    Google Scholar 

  7. Kong, X.-W., Liu, W.-F., You, X.-G.: Secret Message Location Steganalysis Based on Local Coherences of Hue. In: Ho, Y.-S., Kim, H.-J. (eds.) PCM 2005. LNCS, vol. 3768, pp. 301–311. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Ker, A.D., Lubenko, I.: Feature reduction and payload location with WAM steganalysis. In: Media Forensics and Security, vol. 7254 (2009)

    Google Scholar 

  9. Schaefer, G., Stich, M.: UCID - An Uncompressed Colour Image Database. In: Proceeding of SPIE on Storage and Retrieval Methods and Applications for Multimedia, pp. 472–480 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chiew, K.L., Pieprzyk, J. (2010). Identifying Steganographic Payload Location in Binary Image. In: Qiu, G., Lam, K.M., Kiya, H., Xue, XY., Kuo, CC.J., Lew, M.S. (eds) Advances in Multimedia Information Processing - PCM 2010. PCM 2010. Lecture Notes in Computer Science, vol 6297. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15702-8_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15702-8_54

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15701-1

  • Online ISBN: 978-3-642-15702-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics