Skip to main content
Top
Published in: Annals of Telecommunications 5-6/2019

16-11-2018

Universal secret payload location identification in spatial LSB stego images

Authors: S. T. Veena, S. Arivazhagan

Published in: Annals of Telecommunications | Issue 5-6/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Locating steganographic payload is an important aspect of active steganalysis which deals with finding the pixel locations of the embedded secret message (payload) in the stego image. The residual-based payload location detectors are well suited for this purpose. In this paper, an improved universal, blind method of precisely identifying locations in the spatial domain using enhanced weighted residuals with only a few known stego images is proposed. This is done by estimating the cover from the available stego image using the proposed novel locally weighted bivariate shrinkage function in the transform domain. The enhanced weighted residuals ensure that the proposed method is universally applicable for detecting payload locations in spatial least significant bit stego images. The added advantage of the proposed method is that it does not require any prior knowledge of the cover source or the embedding algorithm to determine the exact locations. Experiments conducted on five spatial LSB domain algorithms show that the payload locations can be precisely estimated with a minimum accuracy of 90% with 100 known stego images.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Pevnỳ T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215–224CrossRef Pevnỳ T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215–224CrossRef
2.
go back to reference Fridrich J, Kodovský J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7(3):868–882CrossRef Fridrich J, Kodovský J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7(3):868–882CrossRef
3.
go back to reference Holub V, Fridrich J (2013) Random projections of residuals for digital image steganalysis. IEEE Transactions on Information Forensics and Security 8(12):1996–2006CrossRef Holub V, Fridrich J (2013) Random projections of residuals for digital image steganalysis. IEEE Transactions on Information Forensics and Security 8(12):1996–2006CrossRef
4.
go back to reference Gkizeli M, Pados D A, Medley M J (2007) Optimal signature design for spread-spectrum steganography. IEEE Trans Image Process 16(2):391–405MathSciNetCrossRef Gkizeli M, Pados D A, Medley M J (2007) Optimal signature design for spread-spectrum steganography. IEEE Trans Image Process 16(2):391–405MathSciNetCrossRef
5.
go back to reference Valizadeh A, Wang Z J (2011) Correlation-and-bit-aware spread spectrum embedding for data hiding. IEEE Trans Inf Forensic Secur 6(2):267–282CrossRef Valizadeh A, Wang Z J (2011) Correlation-and-bit-aware spread spectrum embedding for data hiding. IEEE Trans Inf Forensic Secur 6(2):267–282CrossRef
6.
go back to reference Mayer J (2011) Improved spread spectrum multibit watermarking. In: IEEE International Workshop on Information Forensics and Security,(WIFS) (2011), pp 1–6 Mayer J (2011) Improved spread spectrum multibit watermarking. In: IEEE International Workshop on Information Forensics and Security,(WIFS) (2011), pp 1–6
7.
go back to reference Gkizeli M, Pados DA, Batalama SN, Medley MJ (2005) Blind iterative recovery of spread-spectrum steganographic messages. In: IEEE International Conference on Image Processing, vol 2 (2005), vol 2, pp II–1098–101 Gkizeli M, Pados DA, Batalama SN, Medley MJ (2005) Blind iterative recovery of spread-spectrum steganographic messages. In: IEEE International Conference on Image Processing, vol 2 (2005), vol 2, pp II–1098–101
8.
go back to reference Li M, Kulhandjian M K, Pados D A, Batalama S N, Medley M J (2013) Extracting spread-spectrum hidden data from digital media. IEEE Trans Inf Forensic Secur 8(7):1201–1210CrossRef Li M, Kulhandjian M K, Pados D A, Batalama S N, Medley M J (2013) Extracting spread-spectrum hidden data from digital media. IEEE Trans Inf Forensic Secur 8(7):1201–1210CrossRef
9.
go back to reference Li M, Liu Q (2015) Steganalysis of ss steganography: hidden data identification and extraction. Circ Syst Sign Process 34(10):3305–3324CrossRef Li M, Liu Q (2015) Steganalysis of ss steganography: hidden data identification and extraction. Circ Syst Sign Process 34(10):3305–3324CrossRef
10.
go back to reference Fridrich J, Goljan M, Soukal D, Holotyak T (2005) Forensic steganalysis: determining the stego key in spatial domain steganography. In: Electronic Imaging (International Society for Optics and Photonics 2005), pp 631–642 Fridrich J, Goljan M, Soukal D, Holotyak T (2005) Forensic steganalysis: determining the stego key in spatial domain steganography. In: Electronic Imaging (International Society for Optics and Photonics 2005), pp 631–642
12.
go back to reference Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensic Secur 5(2):201–214CrossRef Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensic Secur 5(2):201–214CrossRef
13.
go back to reference Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of the International Workshop on Information Hiding (Springer 2010), pp 161–177 Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of the International Workshop on Information Hiding (Springer 2010), pp 161–177
14.
go back to reference Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: International Workshop on Information Forensics and Security (IEEE 2012), pp 234–239 Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: International Workshop on Information Forensics and Security (IEEE 2012), pp 234–239
15.
go back to reference Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on Information hiding and multimedia security (ACM 2013), pp 59–68 Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on Information hiding and multimedia security (ACM 2013), pp 59–68
16.
go back to reference Sharp T (2001) An implementation of key-based digital signal steganography. In: Moskowitz I (ed) Information Hiding, Lecture Notes in Computer Science, vol. 2137, (2001). Springer, Berlin Heidelberg, pp 13–26 Sharp T (2001) An implementation of key-based digital signal steganography. In: Moskowitz I (ed) Information Hiding, Lecture Notes in Computer Science, vol. 2137, (2001). Springer, Berlin Heidelberg, pp 13–26
17.
go back to reference Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287CrossRef Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287CrossRef
18.
go back to reference Ker AD, Lubenko I (2009) Feature reduction and payload location with WAM steganalysis. In: IS&T/SPIE Electronic Imaging (International Society for Optics and Photonics, 2009), pp 7254–7254–13 Ker AD, Lubenko I (2009) Feature reduction and payload location with WAM steganalysis. In: IS&T/SPIE Electronic Imaging (International Society for Optics and Photonics, 2009), pp 7254–7254–13
19.
go back to reference Luo Y, Li X, Yang B (2011) Locating steganographic payload for LSB matching embedding. In: Proceedings of the International Conference on Multimedia and Expo (IEEE 2011), pp 1–6 Luo Y, Li X, Yang B (2011) Locating steganographic payload for LSB matching embedding. In: Proceedings of the International Conference on Multimedia and Expo (IEEE 2011), pp 1–6
20.
go back to reference Quach TT (2011) On locating steganographic payload using residuals. In: Proceedings of the Media Watermarking, Security, and Forensics XIII (SPIE, 2011), pp 7880–7880–7 Quach TT (2011) On locating steganographic payload using residuals. In: Proceedings of the Media Watermarking, Security, and Forensics XIII (SPIE, 2011), pp 7880–7880–7
21.
go back to reference Gui X, Li X, Yang B (2012) Improved payload location for LSB matching steganography. In: Proceedings of the 19th International Conference on Image Processing (IEEE 2012), pp 1125–1128 Gui X, Li X, Yang B (2012) Improved payload location for LSB matching steganography. In: Proceedings of the 19th International Conference on Image Processing (IEEE 2012), pp 1125–1128
22.
go back to reference Quach TT (2014) Cover estimation and payload location using Markov random fields. In: IS&T/SPIE Electronic Imaging (International Society for Optics and Photonics, 2014), pp 9028–9028–9 Quach TT (2014) Cover estimation and payload location using Markov random fields. In: IS&T/SPIE Electronic Imaging (International Society for Optics and Photonics, 2014), pp 9028–9028–9
23.
go back to reference Provos N, Honeyman P (2001) Detecting steganographic content on the internet. Tech. rep., Center for Information Technology Integration Provos N, Honeyman P (2001) Detecting steganographic content on the internet. Tech. rep., Center for Information Technology Integration
24.
go back to reference Ker A D (2008) Locating steganographic payload via WS residuals. In: Proceedings of the 10th ACM workshop on Multimedia and security (ACM 2008), pp 27–32 Ker A D (2008) Locating steganographic payload via WS residuals. In: Proceedings of the 10th ACM workshop on Multimedia and security (ACM 2008), pp 27–32
25.
go back to reference Quach T T (2011) Optimal cover estimation methods and steganographic payload location. IEEE Trans Inf Forensic Secur 6(4):1214–1222CrossRef Quach T T (2011) Optimal cover estimation methods and steganographic payload location. IEEE Trans Inf Forensic Secur 6(4):1214–1222CrossRef
26.
go back to reference Lubenko I, Ker AD (2011) Steganalysis using logistic regression. In: IS&T/SPIE Electronic Imaging (International Society for Optics and Photonics, 2011), pp 7880–7880–11 Lubenko I, Ker AD (2011) Steganalysis using logistic regression. In: IS&T/SPIE Electronic Imaging (International Society for Optics and Photonics, 2011), pp 7880–7880–11
27.
go back to reference Sendur L, Selesnick I W (2002) Bivariate shrinkage functions for wavelet-based denoising exploiting interscale dependency. IEEE Trans Signal Process 50(11):2744–2756CrossRef Sendur L, Selesnick I W (2002) Bivariate shrinkage functions for wavelet-based denoising exploiting interscale dependency. IEEE Trans Signal Process 50(11):2744–2756CrossRef
28.
go back to reference Veena S T, Arivazhagan S (2018) Quantitative steganalysis of spatial LSB based stego images using reduced instances and features. Pattern Recogn Lett 105(C):39–49CrossRef Veena S T, Arivazhagan S (2018) Quantitative steganalysis of spatial LSB based stego images using reduced instances and features. Pattern Recogn Lett 105(C):39–49CrossRef
29.
go back to reference Kingsbury N (2000) A dual-tree complex wavelet transform with improved orthogonality and symmetry properties. In: Proceedings of International Conference on Image Processing, vol 2 (IEEE 2000), vol 2, pp 375–378 Kingsbury N (2000) A dual-tree complex wavelet transform with improved orthogonality and symmetry properties. In: Proceedings of International Conference on Image Processing, vol 2 (IEEE 2000), vol 2, pp 375–378
30.
go back to reference Zong H, Liu Fl, Luo Xy (2012) Blind image steganalysis based on wavelet coefficient correlation. Digit Investig 9(1):58–68CrossRef Zong H, Liu Fl, Luo Xy (2012) Blind image steganalysis based on wavelet coefficient correlation. Digit Investig 9(1):58–68CrossRef
32.
go back to reference Rao M V G, Venu G, Vathsal S (2009) Local adaptive bivariate shrinkage function for medicalimage denoising. Int J Electr Eng 1(1):59–65 Rao M V G, Venu G, Vathsal S (2009) Local adaptive bivariate shrinkage function for medicalimage denoising. Int J Electr Eng 1(1):59–65
33.
go back to reference Ker AD, Böhme R (2008) Revisiting weighted stego-image steganalysis. In: Electronic Imaging 2008 (International Society for Optics and Photonics, 2008), pp 681,905–681,905–17 Ker AD, Böhme R (2008) Revisiting weighted stego-image steganalysis. In: Electronic Imaging 2008 (International Society for Optics and Photonics, 2008), pp 681,905–681,905–17
34.
go back to reference Bas P, Filler T, Pevný T (2011) Break our steganographic system: the ins and outs of organizing boss. In: Proceedings of the 13th International Conference on Information Hiding. Springer, Berlin, Heidelberg, pp 59–70 Bas P, Filler T, Pevný T (2011) Break our steganographic system: the ins and outs of organizing boss. In: Proceedings of the 13th International Conference on Information Hiding. Springer, Berlin, Heidelberg, pp 59–70
Metadata
Title
Universal secret payload location identification in spatial LSB stego images
Authors
S. T. Veena
S. Arivazhagan
Publication date
16-11-2018
Publisher
Springer International Publishing
Published in
Annals of Telecommunications / Issue 5-6/2019
Print ISSN: 0003-4347
Electronic ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-018-0676-x

Other articles of this Issue 5-6/2019

Annals of Telecommunications 5-6/2019 Go to the issue