scispace - formally typeset
Search or ask a question

Showing papers on "Steganography published in 2010"


Journal ArticleDOI
TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.

1,572 citations


Journal ArticleDOI
TL;DR: A method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which is least significant bit (LSB) matching.
Abstract: This paper presents a method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which is least significant bit (LSB) matching. First, arguments are provided for modeling the differences between adjacent pixels using first-order and second-order Markov chains. Subsets of sample transition probability matrices are then used as features for a steganalyzer implemented by support vector machines. The major part of experiments, performed on four diverse image databases, focuses on evaluation of detection of LSB matching. The comparison to prior art reveals that the presented feature set offers superior accuracy in detecting LSB matching. Even though the feature set was developed specifically for spatial domain steganalysis, by constructing steganalyzers for ten algorithms for JPEG images, it is demonstrated that the features detect steganography in the transform domain as well.

940 citations


Book ChapterDOI
28 Jun 2010
TL;DR: A complete methodology for designing practical and highly-undetectable stegosystems for real digital media and explains why high-dimensional models might be problem in steganalysis, and introduces HUGO, a new embedding algorithm for spatial-domain digital images and its performance with LSB matching.
Abstract: This paper presents a complete methodology for designing practical and highly-undetectable stegosystems for real digital media. The main design principle is to minimize a suitably-defined distortion by means of efficient coding algorithm. The distortion is defined as a weighted difference of extended state-of-the-art feature vectors already used in steganalysis. This allows us to "preserve" the model used by steganalyst and thus be undetectable even for large payloads. This framework can be efficiently implemented even when the dimensionality of the feature set used by the embedder is larger than 107. The high dimensional model is necessary to avoid known security weaknesses. Although high-dimensional models might be problem in steganalysis, we explain, why they are acceptable in steganography. As an example, we introduce HUGO, a new embedding algorithm for spatial-domain digital images and we contrast its performance with LSB matching. On the BOWS2 image database and in contrast with LSB matching, HUGO allows the embedder to hide 7× longer message with the same level of security level.

808 citations


Journal ArticleDOI
TL;DR: An edge adaptive scheme which can select the embedding regions according to the size of secret message and the difference between two consecutive pixels in the cover image is proposed and can enhance the security significantly compared with typical LSB-based approaches as well as their edge adaptive ones, while preserving higher visual quality of stego images at the same time.
Abstract: The least-significant-bit (LSB)-based approach is a popular type of steganographic algorithms in the spatial domain. However, we find that in most existing approaches, the choice of embedding positions within a cover image mainly depends on a pseudorandom number generator without considering the relationship between the image content itself and the size of the secret message. Thus the smooth/flat regions in the cover images will inevitably be contaminated after data hiding even at a low embedding rate, and this will lead to poor visual quality and low security based on our analysis and extensive experiments, especially for those images with many smooth regions. In this paper, we expand the LSB matching revisited image steganography and propose an edge adaptive scheme which can select the embedding regions according to the size of secret message and the difference between two consecutive pixels in the cover image. For lower embedding rates, only sharper edge regions are used while keeping the other smoother regions as they are. When the embedding rate increases, more edge regions can be released adaptively for data hiding by adjusting just a few parameters. The experimental results evaluated on 6000 natural images with three specific and four universal steganalytic algorithms show that the new scheme can enhance the security significantly compared with typical LSB-based approaches as well as their edge adaptive ones, such as pixel-value-differencing-based approaches, while preserving higher visual quality of stego images at the same time.

594 citations


Journal ArticleDOI
TL;DR: A connection between steganography design by minimizing embedding distortion and statistical physics is made and practical tools, such as the thermodynamic integration for computing the rate-distortion bound and the Gibbs sampler for simulating the impact of optimal embedding schemes, are described.
Abstract: We make a connection between steganography design by minimizing embedding distortion and statistical physics. The unique aspect of this work and one that distinguishes it from prior art is that we allow the distortion function to be arbitrary, which permits us to consider spatially dependent embedding changes. We provide a complete theoretical framework and describe practical tools, such as the thermodynamic integration for computing the rate-distortion bound and the Gibbs sampler for simulating the impact of optimal embedding schemes and constructing practical algorithms. The proposed framework reduces the design of secure steganography in empirical covers to the problem of finding local potentials for the distortion function that correlate with statistical detectability in practice. By working out the proposed methodology in detail for a specific choice of the distortion function, we experimentally validate the approach and discuss various options available to the steganographer in practice.

257 citations


Journal ArticleDOI
TL;DR: The experimental results show that the proposed scheme not only achieves high embedding capacity but also enhances the quality of the stego image from the HVS by an edge detection technique.
Abstract: Steganography is the art and science of hiding data into information. The secret message is hidden in such a way that no one can apart from the sender or the intended recipient. The least significant bit (LSB) substitution mechanism is the most common steganographic technique for embedding a secret message in an image with high capacity, while the human visual system (HVS) would be unable to notice the hidden message in the cover image. In this paper, besides employing the LSB substitution technique as a fundamental stage, we take advantage of edge detection technique. The experimental results show that the proposed scheme not only achieves high embedding capacity but also enhances the quality of the stego image from the HVS by an edge detection technique. Moreover, based on that the secret message is replaced with different LSBs, our scheme can effectively resist the image steganalysis.

221 citations


Journal ArticleDOI
TL;DR: A new improved technique is proposed that takes the advantage of the 24 bits in each pixel in the RGB images using the two least significant bits of one channel to indicate existence of data in the other two channels to insert security randomness.
Abstract: Image based steganography utilize the images as cover media to hide secret data. The common technique used in this field replaces the least significant bits (LSB) of image pixels with intended secret bits. Several improvements to enhance the security of the LSB method have been presented earlier. This paper proposed a new improved technique that takes the advantage of the 24 bits in each pixel in the RGB images using the two least significant bits of one channel to indicate existence of data in the other two channels. The stego method does not depend on a separate key to take out the key management overhead. Instead, it is using the size of the secret data as selection criteria for the first indicator channel to insert security randomness. Our proposed technique is analyzed using security and capacity measures and compared to two other similar work. This proposed pixel indicator technique for RGB image steganography showed interesting promising result.

190 citations


Proceedings ArticleDOI
TL;DR: A fast and very versatile solution to minimizing embedding impact in steganography based on syndrome coding using linear convolutional codes with the optimal binary quantizer implemented using the Viterbi algorithm run in the dual domain is proposed.
Abstract: In this paper, we propose a practical approach to minimizing embedding impact in steganography based on syndrome coding and trellis-coded quantization and contrast its performance with bounds derived from appropriate rate-distortion bounds. We assume that each cover element can be assigned a positive scalar expressing the impact of making an embedding change at that element (single-letter distortion). The problem is to embed a given payload with minimal possible average embedding impact. This task, which can be viewed as a generalization of matrix embedding or writing on wet paper, has been approached using heuristic and suboptimal tools in the past. Here, we propose a fast and very versatile solution to this problem that can theoretically achieve performance arbitrarily close to the bound. It is based on syndrome coding using linear convolutional codes with the optimal binary quantizer implemented using the Viterbi algorithm run in the dual domain. The complexity and memory requirements of the embedding algorithm are linear w.r.t. the number of cover elements. For practitioners, we include detailed algorithms for finding good codes and their implementation. Finally, we report extensive experimental results for a large set of relative payloads and for different distortion profiles, including the wet paper channel.

165 citations


Journal ArticleDOI
TL;DR: An in-depth look at how digital images can be used as a carrier to hide messages is discussed and the performance of some of the steganography tools are analyzed.
Abstract: Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we will discuss how digital images can be used as a carrier to hide messages. This paper also analyses the performance of some of the steganography tools. Steganography is a useful tool that allows covert transmission of information over an over the communications channel. Combining secret image with the carrier image gives the hidden image. The hidden image is difficult to detect without retrieval. This paper will take an in-depth look at this technology by introducing the reader to various concepts of Steganography, a brief history of Steganography and a look at some of the Steganographic technique.

159 citations


Journal ArticleDOI
TL;DR: This paper classify and give an account of the various approaches that have been proposed for steganalysis, and some promising methods for statistical Steganalysis have also been identified.

156 citations


Journal Article
TL;DR: Analysis of Least Significant Bit (LSB) based Steganography and Discrete Cosine Transform (DCT) basedSteganography is presented, an implementation of both methods and their performance analysis has been done.
Abstract: This paper presents analysis of Least Significant Bit (LSB) based Steganography and Discrete Cosine Transform (DCT) based Steganography. LSB based Steganography embed the text message in least significant bits of digital picture. Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover file. Unfortunately, it is vulnerable to even a small image manipulation. Converting an image from a format like GIF or BMP, which reconstructs the original message exactly (lossless compression) to a JPEG, which does not (lossy compression), and then back could destroy the information hidden in the LSBs. DCT based Steganography embed the text message in least significant bits of the Discrete Cosine (DC) coefficient of digital picture. When information is hidden inside video, the program hiding the information usually performs the DCT. DCT works by slightly changing each of the images in the video, only to the extent that is not noticeable by the human eye. An implementation of both these methods and their performance analysis has been done in this paper.

Journal Article
TL;DR: The aim of this paper is to propose a modified high,capacity image steganography technique that depends on wavelet transform with acceptable levels of imperceptibility and distortion in the cover image and high level of overall security.
Abstract: Steganography is the art and science of concealing information in unremarkable cover media so as not to arouse an eavesdropper's suspicion. It is an application under information security field. Being classified under information security, steganography will be characterized by having set of measures that rely on strengths and counter measures (attacks) that are driven by weaknesses and vulnerabilities. Today, computer and network technologies provide easy,to,use communication channels for steganography. The aim of this paper is to propose a modified high,capacity image steganography technique that depends on wavelet transform with acceptable levels of imperceptibility and distortion in the cover image and high level of overall security.

Journal ArticleDOI
TL;DR: The essence of invertible image sharing approaches is that the revealed content of the secret image must be lossless and the distorted stego images must be able to be reverted to the original cover image, and this work transforms the secret pixels into the m-ary notational system and calculates the information data used to reconstruct original pixels from camouflaged pixels.

Book
09 Aug 2010
TL;DR: As one of the part of book categories, advanced statistical steganalysis always becomes the most wanted book.
Abstract: Background and Advances in Theory.- Principles of Modern Steganography and Steganalysis.- Towards a Theory of Cover Models.- Specific Advances in Steganalysis.- Detection of Model-Based Steganography with First-Order Statistics.- Models of Heterogeneous Covers for Quantitative Steganalysis.- Improved Weighted Stego Image Steganalysis.- Using Encoder Artefacts for Steganalysis of Compressed Audio Streams.- Synthesis.- General Discussion.

01 Jan 2010
TL;DR: A new steganography based on genetic algorithm is presented, embedding the secret message in LSB of the cover image, and the pixel values of the steg-image are modied by the genetic algorithm to keep their statistic characters hard to be detected by the RS analysis.
Abstract: With the extensive application of steganography, it is challenged by ste- ganalysis. The most notable steganalysis algorithm is the RS attack which detects the steg-message by the statistic analysis of pixel values. To ensure the security against the RS analysis, we presents a new steganography based on genetic algorithm in this paper. After embedding the secret message in LSB (least signicant bit) of the cover image, the pixel values of the steg-image are modied by the genetic algorithm to keep their statistic characters. Thus, the existence of the secret message is hard to be detected by the RS analysis. Meanwhile, better visual quality can be achieved by the proposed algorithm. The experimental results demonstrate the proposed algorithm's eectiveness in resistance to steganalysis with better visual quality. Keywords: steganography; steganalysis; genetic algorithm; RS algorithm

Proceedings ArticleDOI
01 Mar 2010
TL;DR: Experimental results reveal that the error block replacement with diagonal detail coefficients (CD) gives better PSNR than doing so with other coefficients, suggesting that the DWT based algorithm for image data hiding has been proposed that embeds the secret message in CH band of cover image.
Abstract: Steganography plays an important role in the field of information hiding. It is used in wide variety of applications such as internet security, authentication, copyright protection and information assurance etc. In Discrete Wavelet Transform (DWT) based steganography approaches the wavelet coefficients of the cover image are modified to embed the secret message. DWT based algorithm for image data hiding has been proposed in the recent past that embeds the secret message in CH band of cover image. This paper intends to observe the effect of embedding the secret message in different bands such as CH, CV and CD on the performance of stegano image in terms of Peak Signal to Noise Ratio (PSNR). Experimentation has been done using six different attacks. Experimental results reveal that the error block replacement with diagonal detail coefficients (CD) gives better PSNR than doing so with other coefficients.

Journal ArticleDOI
TL;DR: A novel technique for Image steganography based on Block-DCT, where DCT is used to transform original image (cover image) blocks from spatial domain to frequency domain, which shows that the algorithm has a high capacity and a good invisibility.
Abstract: Image steganography is the art of hiding information into a cover image. This paper presents a novel technique for Image steganography based on DWT, where DWT is used to transform original image (cover image) from spatial domain to frequency domain. Firstly two dimensional Discrete Wavelet Transform (2-D DWT) is performed on a gray level cover image of size M × N and Huffman encoding is performed on the secret messages/image before embedding. Then each bit of Huffman code of secret message/image is embedded in the high frequency coefficients resulted from Discrete Wavelet Transform. Image quality is to be improved by preserving the wavelet coefficients in the low frequency subband. The experimental results show that the algorithm has a high capacity and a good invisibility. Moreover PSNR of cover image with stego-image shows the better results in comparison with other existing steganography approaches. Furthermore, satisfactory security is maintained since the secret message/image cannot be extracted without knowing decoding rules and Huffman table.

Proceedings ArticleDOI
Piyush Marwaha1, Paresh Marwaha1
29 Jul 2010
TL;DR: An advanced system of encrypting data that combines the features of cryptography, steganography along with multimedia data hiding is proposed that will be more secure than any other these techniques alone and also as compared to Steganography and cryptography combined systems.
Abstract: In today's information age, information sharing and transfer has increased exponentially. The threat of an intruder accessing secret information has been an ever existing concern for the data communication experts. Cryptography and steganography are the most widely used techniques to overcome this threat. Cryptography involves converting a message text into an unreadable cipher. On the other hand, steganography embeds message into a cover media and hides its existence. Both these techniques provide some security of data neither of them alone is secure enough for sharing information over an unsecure communication channel and are vulnerable to intruder attacks. Although these techniques are often combined together to achieve higher levels of security but still there is a need of a highly secure system to transfer information over any communication media minimizing the threat of intrusion. In this paper we propose an advanced system of encrypting data that combines the features of cryptography, steganography along with multimedia data hiding. This system will be more secure than any other these techniques alone and also as compared to steganography and cryptography combined systems Visual steganography is one of the most secure forms of steganography available today. It is most commonly implemented in image files. However embedding data into image changes its color frequencies in a predictable way. To overcome this predictability, we propose the concept of multiple cryptography where the data will be encrypted into a cipher and the cipher will be hidden into a multimedia image file in encrypted format. We shall use traditional cryptographic techniques to achieve data encryption and visual steganography algorithms will be used to hide the encrypted data.

Journal ArticleDOI
TL;DR: This paper employs linear cellular automata, digital signatures, and hash functions to propose a novel (t,n)-threshold image sharing scheme with steganographic properties in which a double authentication mechanism is introduced which can detect tampering with probability 255/256.

Journal ArticleDOI
TL;DR: In this paper, a two-step approach was proposed to improve the capacity and robustness of data hiding in the audio file using a two steps approach, in which noise gate software logic was used to obtain a desired signal for embedding the secret message of the input host audio signal (carrier).
Abstract: In this study, we developed a novel method that is able to shift the limit for transparent data hiding in audio from the fourth LSB layer to the eighth LSB layer, thus the method has improved the capacity and robustness of data hiding in the audio file using a two steps approach. In the first step, noise gate software logic used to obtain a desired signal for embedding the secret message of the input host audio signal (carrier). In the second step, standard 8th LSB layer embedding has been done for this desired signal. Audio quality evaluation has used to evaluate our purposed method in two ways. First, objective test showed the algorithm succeeds in this task, while increasing SNR values of our algorithm comparing to SNR values obtained by standard LSB embedding in the 8th bits LSB layer and the comparison of the histogram audio excerpts has proved this also. Second, subjective listening test proved that high perceptual transparency is accomplished even if eight LSB of host audio signal are used for data hiding.

Book
24 Aug 2010
TL;DR: The main theoretical contribution of the book is a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers.
Abstract: Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. This research monograph focuses on the role of cover signals, the distinguishing feature that requires us to treat steganography and steganalysis differently from other secrecy techniques. The main theoretical contribution of the book is a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers. A further contribution is the emphasis on dealing with heterogeneity in cover distributions, crucial for security analyses. The author's work complements earlier approaches based on information, complexity, probability and signal processing theory, and he presents numerous practical implications. The scientific advances are supported by a survey of the classical steganography literature; a new proposal for a unified terminology and notation that is maintained throughout the book; a critical discussion of the results achieved and their limitations; and an assessment of the possibility of transferring elements of this research's empirical perspective to other domains in information security. The book is suitable for researchers working in cryptography and information security, practitioners in the corporate and national security domains, and graduate students specializing in multimedia security and data hiding.

Posted Content
TL;DR: The main goals for this paper are to recognize the researchers for the main fundamentals of steganography and to provide a general overview of the following subject areas: Steganography types, General Steganographers system, Characterization of Steganographic Systems and Classification of SteGANography Techniques.
Abstract: The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information .Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue, it become necessary to find appropriate protection because of the significance, accuracy and sensitivity of the information. Steganography considers one of the techniques which used to protect the important information. The main goals for this paper, to recognize the researchers for the main fundamentals of steganography. In this paper provides a general overview of the following subject areas: Steganography types, General Steganography system, Characterization of Steganography Systems and Classification of Steganography Techniques.

Proceedings ArticleDOI
07 Jul 2010
TL;DR: This paper investigates the relationship, if there any, between the PSNR and the subjective quality of stego images and adopts an adapted double stimulus continuous quality scale (DSCQS) method.
Abstract: Digital image steganography is the art of hiding information in other digital images. Moreover, image quality evaluation has many difficulties such as the amount of degradation or distortion induced in the reconstructed image. The peak signal-to-noise ratio (PSNR) is the most common metric used to evaluate the stego image quality. However, subjective evaluation is the most reliable method to measure the image quality. Therefore, we try to give an answer to the following question: “does the PSNR value of a stego image reflect its actual quality?”. However, JPEG steganography represents a distortion source in addition to the image compression. Therefore, this paper investigates the relationship, if there any, between the PSNR and the subjective quality of stego images. Four steganography methods and five grayscale images are used in this paper. Moreover, an adapted double stimulus continuous quality scale (DSCQS) method has been adopted. As a result, PSNR can not be reliably used because it has poor correlation with the mean opinion score (MOS). Moreover, conclusions derived from only PSNR values of different stego images are quite different from that derived from the MOS values. Additionally, MOS shows that a particular steganography method modifies different test images quality in different ways.

Journal ArticleDOI
TL;DR: The analytical results presented in the paper concern the influence of LACK’s hidden data insertion procedure on the method’'s impact on quality of voice transmission and its resistance to steganalysis.
Abstract: The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of network steganography and of VoIP steganography in particular. The analytical results presented in the paper concern the influence of LACK's hidden data insertion procedure on the method's impact on quality of voice transmission and its resistance to steganalysis.

Journal ArticleDOI
TL;DR: The video based Steganography has been discussed and the advantages of using the video file as a cover carrier for steganography have been proposed.
Abstract: The aim of this review is to study the methods of steganography using the video file as a cover carrier The steganography is the art of protecting the information through embedding data in medium carrier, for instants this study illustrate historically this art, as well as the study describes methods as a review for this art in the video file The video based steganography can be used as one video file, separated images in frames or images and audio files Since that, the use of the video based steganography can be more eligible than other multimedia files As a result of this study, the video based steganography has been discussed and the advantages of using the video file as a cover carrier for steganography have been proposed

Journal ArticleDOI
TL;DR: Various digital steganographic techniques are implemented which are capable of producing a secret-embedded image that is indistinguishable from the original image to the human eye.
Abstract: Digital communication has become an essential part of infrastructure now-a-days, a lot of applications are Internet-based and in some cases it is desired that the communication be made secret. Two techniques are available to achieve this goal: cryptography and steganography. In this paper, various digital steganographic techniques are implemented which are capable of producing a secret-embedded image that is indistinguishable from the original image to the human eye. A comparative analysis is made to demonstrate the effectiveness of the proposed methods. The effectiveness of the proposed methods has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR).

Journal ArticleDOI
TL;DR: This paper proposes a novel data hiding scheme that uses a simple modulus function to address all the performance criteria listed above and outperforms Mielikainen's and Zhang and Wang's schemes for gray-scale images.

Journal ArticleDOI
TL;DR: A novel way of encrypting digital images with password protection using 1D SHA-2 algorithm coupled with a compound forward transform is described, which proves that the method is efficient and secure from a cryptographic point of view.

Journal ArticleDOI
TL;DR: The aim of this study is to review the strength and weakness for the possible multimedia cover for the steganography approaches and the security level of each approach and how is probable to combine the Steganography and cryptography.
Abstract: The aim of this study is to review the strength and weakness for the possible multimedia cover for the steganography approaches. In addition, the security level of each approach and how is probable to combine the steganography and cryptography. Steganography is an art on which the data can be hide in other data as cover, the multimedia files is the commonly used for hiding data. The main aspects of the steganography is the capacity and security, where the capacity refer to how much data can be hidden in the cover carrier, while the security concern with the ability of disclose or altering the data by unauthorized party. The multimedia files, such as, image, video, audio and text are the possible covers for hiding secure information or data. Each of these covers has advantages and disadvantages; as a result of this study we will discuss the possibility to use these files as a cover. In the last part of this study, we suggest a further direction to improve the capacity and security aspects.

Journal ArticleDOI
TL;DR: Experimental results show that the proposed scheme is superior to many existing reversible data hiding schemes introduced in the literature and quite simple because it primarily uses additions and subtractions.