A Cover Image Model For Reliable Steganalysis

  • Rémi Cogranne
  • Cathel Zitzmann
  • Lionel Fillatre
  • Florent Retraint
  • Igor Nikiforov
  • Philippe Cornu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6958)


This paper investigates reliable steganalysis of natural cover images using a local non-linear parametric model. In the framework of hypothesis testing theory, the use of the model permits to warrant predictable results under false alarm constraint.


False Alarm Rate Point Spread Function Cover Image Secret Message Image Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bruni, C., De Santi, A., Koch, G., Sinisgalli, C.: Identification of discontinuities in blurred noisy signals. IEEE Trans. on Circuit and systems-I 44(5), 422–433 (1997)CrossRefzbMATHGoogle Scholar
  2. 2.
    Böhme, R.: Advanced Statistical Steganalysis, 1st edn. Springer Publishing Company, Incorporated, Heidelberg (2010)CrossRefzbMATHGoogle Scholar
  3. 3.
    Böhme, R.: Assessment of Steganalytic Methods Using Multiple Regression Models. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 278–295. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    BOSS Contest: Break Our Steganographic System (2010),
  5. 5.
    Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann, San Francisco (2007)Google Scholar
  6. 6.
    Dabeer, O., Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.: Detection of hiding in the least significant bit. IEEE Transactions on Signal Processing 52(10), 3046–3058 (2004)MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: Proc.of SPIE Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 23–34 (2004)Google Scholar
  8. 8.
    Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications, 1st edn. Cambridge University Press, Cambridge (2009)CrossRefzbMATHGoogle Scholar
  9. 9.
    Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in color and grayscale images. IEEE Multimedia 8, 22–28 (2001)CrossRefGoogle Scholar
  10. 10.
    Goodman, J.W.: Introduction to Fourier Optics, 3rd edn. Roberts & Company Publishers, Englewood (2005)Google Scholar
  11. 11.
    Ker, A.D.: Locating steganographic payload via WS residuals. In: ACM Proceedings of 10th Multimedia and Security Workshop, pp. 27–31 (2008)Google Scholar
  12. 12.
    Ker, A.D., Böhme, R.: Revisiting weighted stego-image steganalysis. In: Proc. of SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, pp. 501–517 (2008)Google Scholar
  13. 13.
    Ker, A.D.: A Capacity Result for Batch Steganography. IEEE Signal Processing Letters 14(8), 525–528 (2007)CrossRefGoogle Scholar
  14. 14.
    Lehman, E.: Testing Statistical Hypotheses, 2nd edn. Chapman & Hall, Boca Raton (1986)CrossRefGoogle Scholar
  15. 15.
    Mumford, D., Shah, J.: Optimal approximations by piecewise smooth functions and associated variational problems. Communications on Pure and Applied Mathematics (5), 577–685 (1989)MathSciNetCrossRefzbMATHGoogle Scholar
  16. 16.
    Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics 5(1), 167–189 (2005)CrossRefGoogle Scholar
  17. 17.
    Schaefer, G., Stich, M.: UCID - an uncompressed colour image database. In: SPIE Proceedings, vol. 5307, pp. 472–480,
  18. 18.
    Seber, G., Wild, C.: Nonlinear Regression. Wiley, Chichester (1989)CrossRefzbMATHGoogle Scholar
  19. 19.
    Wang, Y., Moulin, P.: Steganalysis of block-DCT image steganography. In: 2003 IEEE Workshop on Statistical Signal Processing (2003)Google Scholar
  20. 20.
    Wang, Y., Moulin, P.: Statistical modelling and steganalysis of DFT-based image steganography, vol. 6072, p. 607202. SPIE, CA (2006)Google Scholar
  21. 21.
    Westfeld, A., Andreas, P.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  22. 22.
    Zitzmann, C., Cogranne, R., Retraint, F., Nikiforov, I., Fillatre, L., Cornu, P.: Statistical Decision Methods in Hidden Information Detection. In: Filler, T., et al. (eds.) IH 2011. LNCS, vol. 6958, pp. 163–177. Springer-, Heidelberg (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Rémi Cogranne
    • 1
  • Cathel Zitzmann
    • 1
  • Lionel Fillatre
    • 1
  • Florent Retraint
    • 1
  • Igor Nikiforov
    • 1
  • Philippe Cornu
    • 1
  1. 1.ICD - LM2S - Université de Technologie de Troyes - UMR STMR CNRSTroyes cedexFrance

Personalised recommendations