Skip to main content
Erschienen in: Annals of Telecommunications 5-6/2019

16.11.2018

Universal secret payload location identification in spatial LSB stego images

verfasst von: S. T. Veena, S. Arivazhagan

Erschienen in: Annals of Telecommunications | Ausgabe 5-6/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Locating steganographic payload is an important aspect of active steganalysis which deals with finding the pixel locations of the embedded secret message (payload) in the stego image. The residual-based payload location detectors are well suited for this purpose. In this paper, an improved universal, blind method of precisely identifying locations in the spatial domain using enhanced weighted residuals with only a few known stego images is proposed. This is done by estimating the cover from the available stego image using the proposed novel locally weighted bivariate shrinkage function in the transform domain. The enhanced weighted residuals ensure that the proposed method is universally applicable for detecting payload locations in spatial least significant bit stego images. The added advantage of the proposed method is that it does not require any prior knowledge of the cover source or the embedding algorithm to determine the exact locations. Experiments conducted on five spatial LSB domain algorithms show that the payload locations can be precisely estimated with a minimum accuracy of 90% with 100 known stego images.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Pevnỳ T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215–224CrossRef Pevnỳ T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215–224CrossRef
2.
Zurück zum Zitat Fridrich J, Kodovský J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7(3):868–882CrossRef Fridrich J, Kodovský J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7(3):868–882CrossRef
3.
Zurück zum Zitat Holub V, Fridrich J (2013) Random projections of residuals for digital image steganalysis. IEEE Transactions on Information Forensics and Security 8(12):1996–2006CrossRef Holub V, Fridrich J (2013) Random projections of residuals for digital image steganalysis. IEEE Transactions on Information Forensics and Security 8(12):1996–2006CrossRef
4.
Zurück zum Zitat Gkizeli M, Pados D A, Medley M J (2007) Optimal signature design for spread-spectrum steganography. IEEE Trans Image Process 16(2):391–405MathSciNetCrossRef Gkizeli M, Pados D A, Medley M J (2007) Optimal signature design for spread-spectrum steganography. IEEE Trans Image Process 16(2):391–405MathSciNetCrossRef
5.
Zurück zum Zitat Valizadeh A, Wang Z J (2011) Correlation-and-bit-aware spread spectrum embedding for data hiding. IEEE Trans Inf Forensic Secur 6(2):267–282CrossRef Valizadeh A, Wang Z J (2011) Correlation-and-bit-aware spread spectrum embedding for data hiding. IEEE Trans Inf Forensic Secur 6(2):267–282CrossRef
6.
Zurück zum Zitat Mayer J (2011) Improved spread spectrum multibit watermarking. In: IEEE International Workshop on Information Forensics and Security,(WIFS) (2011), pp 1–6 Mayer J (2011) Improved spread spectrum multibit watermarking. In: IEEE International Workshop on Information Forensics and Security,(WIFS) (2011), pp 1–6
7.
Zurück zum Zitat Gkizeli M, Pados DA, Batalama SN, Medley MJ (2005) Blind iterative recovery of spread-spectrum steganographic messages. In: IEEE International Conference on Image Processing, vol 2 (2005), vol 2, pp II–1098–101 Gkizeli M, Pados DA, Batalama SN, Medley MJ (2005) Blind iterative recovery of spread-spectrum steganographic messages. In: IEEE International Conference on Image Processing, vol 2 (2005), vol 2, pp II–1098–101
8.
Zurück zum Zitat Li M, Kulhandjian M K, Pados D A, Batalama S N, Medley M J (2013) Extracting spread-spectrum hidden data from digital media. IEEE Trans Inf Forensic Secur 8(7):1201–1210CrossRef Li M, Kulhandjian M K, Pados D A, Batalama S N, Medley M J (2013) Extracting spread-spectrum hidden data from digital media. IEEE Trans Inf Forensic Secur 8(7):1201–1210CrossRef
9.
Zurück zum Zitat Li M, Liu Q (2015) Steganalysis of ss steganography: hidden data identification and extraction. Circ Syst Sign Process 34(10):3305–3324CrossRef Li M, Liu Q (2015) Steganalysis of ss steganography: hidden data identification and extraction. Circ Syst Sign Process 34(10):3305–3324CrossRef
10.
Zurück zum Zitat Fridrich J, Goljan M, Soukal D, Holotyak T (2005) Forensic steganalysis: determining the stego key in spatial domain steganography. In: Electronic Imaging (International Society for Optics and Photonics 2005), pp 631–642 Fridrich J, Goljan M, Soukal D, Holotyak T (2005) Forensic steganalysis: determining the stego key in spatial domain steganography. In: Electronic Imaging (International Society for Optics and Photonics 2005), pp 631–642
12.
Zurück zum Zitat Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensic Secur 5(2):201–214CrossRef Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensic Secur 5(2):201–214CrossRef
13.
Zurück zum Zitat Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of the International Workshop on Information Hiding (Springer 2010), pp 161–177 Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of the International Workshop on Information Hiding (Springer 2010), pp 161–177
14.
Zurück zum Zitat Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: International Workshop on Information Forensics and Security (IEEE 2012), pp 234–239 Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: International Workshop on Information Forensics and Security (IEEE 2012), pp 234–239
15.
Zurück zum Zitat Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on Information hiding and multimedia security (ACM 2013), pp 59–68 Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on Information hiding and multimedia security (ACM 2013), pp 59–68
16.
Zurück zum Zitat Sharp T (2001) An implementation of key-based digital signal steganography. In: Moskowitz I (ed) Information Hiding, Lecture Notes in Computer Science, vol. 2137, (2001). Springer, Berlin Heidelberg, pp 13–26 Sharp T (2001) An implementation of key-based digital signal steganography. In: Moskowitz I (ed) Information Hiding, Lecture Notes in Computer Science, vol. 2137, (2001). Springer, Berlin Heidelberg, pp 13–26
17.
Zurück zum Zitat Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287CrossRef Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287CrossRef
18.
Zurück zum Zitat Ker AD, Lubenko I (2009) Feature reduction and payload location with WAM steganalysis. In: IS&T/SPIE Electronic Imaging (International Society for Optics and Photonics, 2009), pp 7254–7254–13 Ker AD, Lubenko I (2009) Feature reduction and payload location with WAM steganalysis. In: IS&T/SPIE Electronic Imaging (International Society for Optics and Photonics, 2009), pp 7254–7254–13
19.
Zurück zum Zitat Luo Y, Li X, Yang B (2011) Locating steganographic payload for LSB matching embedding. In: Proceedings of the International Conference on Multimedia and Expo (IEEE 2011), pp 1–6 Luo Y, Li X, Yang B (2011) Locating steganographic payload for LSB matching embedding. In: Proceedings of the International Conference on Multimedia and Expo (IEEE 2011), pp 1–6
20.
Zurück zum Zitat Quach TT (2011) On locating steganographic payload using residuals. In: Proceedings of the Media Watermarking, Security, and Forensics XIII (SPIE, 2011), pp 7880–7880–7 Quach TT (2011) On locating steganographic payload using residuals. In: Proceedings of the Media Watermarking, Security, and Forensics XIII (SPIE, 2011), pp 7880–7880–7
21.
Zurück zum Zitat Gui X, Li X, Yang B (2012) Improved payload location for LSB matching steganography. In: Proceedings of the 19th International Conference on Image Processing (IEEE 2012), pp 1125–1128 Gui X, Li X, Yang B (2012) Improved payload location for LSB matching steganography. In: Proceedings of the 19th International Conference on Image Processing (IEEE 2012), pp 1125–1128
22.
Zurück zum Zitat Quach TT (2014) Cover estimation and payload location using Markov random fields. In: IS&T/SPIE Electronic Imaging (International Society for Optics and Photonics, 2014), pp 9028–9028–9 Quach TT (2014) Cover estimation and payload location using Markov random fields. In: IS&T/SPIE Electronic Imaging (International Society for Optics and Photonics, 2014), pp 9028–9028–9
23.
Zurück zum Zitat Provos N, Honeyman P (2001) Detecting steganographic content on the internet. Tech. rep., Center for Information Technology Integration Provos N, Honeyman P (2001) Detecting steganographic content on the internet. Tech. rep., Center for Information Technology Integration
24.
Zurück zum Zitat Ker A D (2008) Locating steganographic payload via WS residuals. In: Proceedings of the 10th ACM workshop on Multimedia and security (ACM 2008), pp 27–32 Ker A D (2008) Locating steganographic payload via WS residuals. In: Proceedings of the 10th ACM workshop on Multimedia and security (ACM 2008), pp 27–32
25.
Zurück zum Zitat Quach T T (2011) Optimal cover estimation methods and steganographic payload location. IEEE Trans Inf Forensic Secur 6(4):1214–1222CrossRef Quach T T (2011) Optimal cover estimation methods and steganographic payload location. IEEE Trans Inf Forensic Secur 6(4):1214–1222CrossRef
26.
Zurück zum Zitat Lubenko I, Ker AD (2011) Steganalysis using logistic regression. In: IS&T/SPIE Electronic Imaging (International Society for Optics and Photonics, 2011), pp 7880–7880–11 Lubenko I, Ker AD (2011) Steganalysis using logistic regression. In: IS&T/SPIE Electronic Imaging (International Society for Optics and Photonics, 2011), pp 7880–7880–11
27.
Zurück zum Zitat Sendur L, Selesnick I W (2002) Bivariate shrinkage functions for wavelet-based denoising exploiting interscale dependency. IEEE Trans Signal Process 50(11):2744–2756CrossRef Sendur L, Selesnick I W (2002) Bivariate shrinkage functions for wavelet-based denoising exploiting interscale dependency. IEEE Trans Signal Process 50(11):2744–2756CrossRef
28.
Zurück zum Zitat Veena S T, Arivazhagan S (2018) Quantitative steganalysis of spatial LSB based stego images using reduced instances and features. Pattern Recogn Lett 105(C):39–49CrossRef Veena S T, Arivazhagan S (2018) Quantitative steganalysis of spatial LSB based stego images using reduced instances and features. Pattern Recogn Lett 105(C):39–49CrossRef
29.
Zurück zum Zitat Kingsbury N (2000) A dual-tree complex wavelet transform with improved orthogonality and symmetry properties. In: Proceedings of International Conference on Image Processing, vol 2 (IEEE 2000), vol 2, pp 375–378 Kingsbury N (2000) A dual-tree complex wavelet transform with improved orthogonality and symmetry properties. In: Proceedings of International Conference on Image Processing, vol 2 (IEEE 2000), vol 2, pp 375–378
30.
Zurück zum Zitat Zong H, Liu Fl, Luo Xy (2012) Blind image steganalysis based on wavelet coefficient correlation. Digit Investig 9(1):58–68CrossRef Zong H, Liu Fl, Luo Xy (2012) Blind image steganalysis based on wavelet coefficient correlation. Digit Investig 9(1):58–68CrossRef
32.
Zurück zum Zitat Rao M V G, Venu G, Vathsal S (2009) Local adaptive bivariate shrinkage function for medicalimage denoising. Int J Electr Eng 1(1):59–65 Rao M V G, Venu G, Vathsal S (2009) Local adaptive bivariate shrinkage function for medicalimage denoising. Int J Electr Eng 1(1):59–65
33.
Zurück zum Zitat Ker AD, Böhme R (2008) Revisiting weighted stego-image steganalysis. In: Electronic Imaging 2008 (International Society for Optics and Photonics, 2008), pp 681,905–681,905–17 Ker AD, Böhme R (2008) Revisiting weighted stego-image steganalysis. In: Electronic Imaging 2008 (International Society for Optics and Photonics, 2008), pp 681,905–681,905–17
34.
Zurück zum Zitat Bas P, Filler T, Pevný T (2011) Break our steganographic system: the ins and outs of organizing boss. In: Proceedings of the 13th International Conference on Information Hiding. Springer, Berlin, Heidelberg, pp 59–70 Bas P, Filler T, Pevný T (2011) Break our steganographic system: the ins and outs of organizing boss. In: Proceedings of the 13th International Conference on Information Hiding. Springer, Berlin, Heidelberg, pp 59–70
Metadaten
Titel
Universal secret payload location identification in spatial LSB stego images
verfasst von
S. T. Veena
S. Arivazhagan
Publikationsdatum
16.11.2018
Verlag
Springer International Publishing
Erschienen in
Annals of Telecommunications / Ausgabe 5-6/2019
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-018-0676-x

Weitere Artikel der Ausgabe 5-6/2019

Annals of Telecommunications 5-6/2019 Zur Ausgabe

Neuer Inhalt