scispace - formally typeset
Search or ask a question

Showing papers on "Steganography tools published in 2002"


Proceedings ArticleDOI
TL;DR: In this article, the authors classify and review current stego-detection algorithms that can be used to trace popular steganographic products and present some new results regarding their previously proposed detection of LSB embedding using sensitive dual statistics.
Abstract: Steganography is the art of hiding the very presence of communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a great deal of attention both from law enforcement and the media. In our paper, we classify and review current stego-detection algorithms that can be used to trace popular steganographic products. We recognize several qualitatively different approaches to practical steganalysis - visual detection, detection based on first order statistics (histogram analysis), dual statistics methods that use spatial correlations in images and higher-order statistics (RS steganalysis), universal blind detection schemes, and special cases, such as JPEG compatibility steganalysis. We also present some new results regarding our previously proposed detection of LSB embedding using sensitive dual statistics. The recent steganalytic methods indicate that the most common paradigm in image steganography - the bit-replacement or bit substitution - is inherently insecure with safe capacities far smaller than previously thought.

369 citations


Journal ArticleDOI
TL;DR: A novel steganography scheme capable of concealing a piece of critical information in a host message which is a binary image (e.g., a facsimile) and used as secret keys to protect the hidden information.
Abstract: This letter presents a novel steganography scheme capable of concealing a piece of critical information in a host message which is a binary image (e.g., a facsimile). A binary matrix and a weight matrix are used as secret keys to protect the hidden information. Given a host image of size m/spl times/n, the proposed scheme can conceal as many as /spl lfloor/log/sub 2/ (mn+1)/spl rfloor/ bits of data in the image by changing, at most, two bits in the host image. This scheme can provide a higher security, embed more information, and maintain a higher quality of the host image than available schemes.

230 citations


Journal ArticleDOI
TL;DR: The proposed steganography enables us to use lossy compressed images as dummy files in bit-plane-based steganographic algorithms and achieves large embedding rates with little noticeable degradation in image quality.

80 citations


Journal ArticleDOI
TL;DR: The proposed method is based on a seamless integration of the two schemes without compromising their desirable features and makes feasible the deployment of the merits of a BPCS steganography technique in a practical scenario where images are compressed before being transmitted over the network.
Abstract: This letter presents a steganography method based on a JPEG2000 lossy compression scheme and bit-plane complexity segmentation (BPCS) steganography. It overcomes the lack of robustness of bit-plane-based steganography methods with respect to lossy compression of a dummy image: a critical shortcoming that has hampered deployment in a practical scenario. The proposed method is based on a seamless integration of the two schemes without compromising their desirable features and makes feasible the deployment of the merits of a BPCS steganography technique in a practical scenario where images are compressed before being transmitted over the network. Embedding rates of around 15% of the compressed image size were achieved for preembedding 1.0-bpp compressed images with no noticeable degradation in image quality.

74 citations


Proceedings ArticleDOI
26 Aug 2002
TL;DR: A novel text cryptosystem is proposed, which hides secret information into a publicly accessed color image by a quantization-based strategy, so the transportation of the secret information will not attract the attention of illegal eavesdropper.
Abstract: A novel text cryptosystem is proposed. The secret information is hidden into a publicly accessed color image by a quantization-based strategy, so the transportation of the secret information will not attract the attention of illegal eavesdropper. With our approach, the secret information is embedded in the wavelet domain of every chrominance component, so the hiding capacity is larger than the similar steganography software. The embedded sequence can be reliably extracted without resorting to the original image. Simulation results show that the proposed method is robust against commonly used image processing techniques.

44 citations


Proceedings ArticleDOI
TL;DR: A mathematical approach to steganalysis is presented, which concludes that a common belief, namely, spread spectrum steganography/watermarking is secure because of the low strength, noise-like message carrier is not valid anymore within the current context.
Abstract: A mathematical approach to steganalysis is presented in this paper with linear steganography being the main focus. A mathematically formal definition of steganalysis is given followed by definitions for passive and active steganalysis. The steganalysis problem is formulated as blind system identification and conditions for identifiability (successful steganalysis) are derived. A procedure to systematically exploit any available spatial and temporal diversity information for efficient steganalysis is also discussed. Experimental results are given for steganalysis of Gaussian distributed, spread spectrum image steganography and watermarking. The proposed technique is observed to produce impressive results for a variety of performance measures. Based on the results we conclude that a common belief, namely, spread spectrum steganography/watermarking is secure because of the low strength, noise-like message carrier is not valid anymore within the current context. Therefore, new questions regarding steganography security that differ from the standard information theoretic notion are raised and some answers are provided.

38 citations


Proceedings ArticleDOI
09 Dec 2002
TL;DR: This paper proposes a new form of multimedia steganography called data masking, which process the entire secret message using an inverse Wiener filter to make it look like a multimedia object itself and shows that this approach can potentially give a covert channel capacity, which is an order of magnitude higher than traditional Steganography.
Abstract: It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical test and capture them for further cryptanalysis. Hence, the communicating entities can use steganography to achieve covertness. In this paper, we propose a new form of multimedia steganography called data masking. Instead of embedding a secret message into a multimedia object, as in traditional multimedia steganography, we process the entire secret message using an inverse Wiener filter to make it look like a multimedia object itself. Thereby we foil an eavesdropper who is primarily applying statistical tests to detect encrypted communication channels. We show that our approach can potentially give a covert channel capacity, which is an order of magnitude higher than traditional steganography.

24 citations


Book ChapterDOI
07 Oct 2002
TL;DR: In this paper, a steganography method based on JPEG2000 lossy compression scheme and bitplane complexity segmentation (BPCS) is presented, which enables us to use JPEG 2000 lossy compressed images as dummy files for embedding secret data.
Abstract: This paper presents a steganography method based on JPEG2000 lossy compression scheme and bit-plane complexity segmentation (BPCS) steganography. In JPEG2000 compression, wavelet coefficients of an image are quantized into a bit-plane structure and therefore BPCS steganography can be applied in the wavelet domain. The proposed JPEG2000-BPCS steganography was implemented using JJ2000 Java software of JPEG2000 compression, with which the program module for BPCS steganography was integrated. The proposed steganography enables us to use JPEG2000 lossy compressed images as dummy files for embedding secret data. Embedding rates of around 15% of the compressed image size were achieved for pre-embedding 1.0bpp compressed images with no visually noticeable degradation in image quality.

21 citations


Proceedings ArticleDOI
07 Aug 2002
TL;DR: Random bit-sequences generated by linear feedback shift registers (LFSR) within the pixel-byte (instead of just the LSB) are proposed for the purpose of steganography to result in better hiding of the data and hence more secure data transmission.
Abstract: Steganography is the art (as well as the science) of hiding information inside other innocuous data such that the very existence of the secret message is concealed from the eyes of the world. One of the techniques used in steganography to hide data behind images is called the least-significant bit (LSB) insertion wherein the LSB of each byte of the pixel of the image's raster data is replaced with the single bit of the data to be hidden. This is based on the premise that the total number of bit-changes in the image's raster data will be so small that the resulting stego-image will be indistinguishable to the human eye from the original image. In this paper, we propose to use random bit-sequences generated by linear feedback shift registers (LFSR) within the pixel-byte (instead of just the LSB) for the purpose of steganography. It is believed that such changes within any given pixel of the image will result in better hiding of the data and hence more secure data transmission.

20 citations


Journal ArticleDOI
TL;DR: Steganography Based Information Protection Method, a new method for strengthening the security of information through a combination of signal processing, cryptography and steganography, provides high security and the information is safe from various attacks.
Abstract: We propose a new method for strengthening the security of information through a combination of signal processing, cryptography and steganography. Cryptography provides the security by concealing the contents and steganography provides security by concealing existence of information being communicated. Signal processing adds additional security by compressing and transforming the Information. The proposed method, viz. Steganography Based Information Protection Method (SBIPM), consists of scanning, coding, encryption, reshaping, cover processing and embedding steps. The scanning, coding, and encryption steps make the information unintelligible so that one cannot extract plain message. Embedding make the message invisible so that one cannot detect it. Reshaping spreads the message so that embedded message can be detected from distorted steganos by authorized receivers. Cover processing makes detection of embedded message more difficult since the distortion is either due to noise addition or due to message embedding. Simulation and steganlysis results show that the method provides high security and the information is safe from various attacks.

13 citations


ReportDOI
16 Aug 2002
TL;DR: The conclusion is that this method of steganography is undetectable by current pragmatic statistical stego detection techniques, primarily because it alters a very small number of pixels.
Abstract: : In this report we analyze in detail a method of image steganography developed by NRL. Our conclusion is that this method of steganography is undetectable by current pragmatic statistical stego detection techniques, primarily because it alters a very small number of pixels. The small size of the embedded message is the key to the lack of detection, provided that a non-anomalous cover image is used.


Journal ArticleDOI
TL;DR: A software tool named as “Fax Image Analysis Tool (FIAT)” based on Pure Steganography Model is developed and implemented to conceal a text or fax message in some other dummy fax document to conceal the existence of the secret message in communication.
Abstract: Steganography is the art and science of communicating in a way which hides the existence of the secret message in communication. Steganography is being used for hiding information in the text or images. This paper describes the use of this technique in the area of Group 3 fax communication. We have developed a software tool named as “Fax Image Analysis Tool (FIAT)” based on Pure Steganography Model to conceal a text or fax message in some other dummy fax document. A steganographic method suitable for Fax data, based on the principles of Substitution Steganographic Techniques, has been developed and implemented. Features to open a Fax file, analyse it and display the fax image along with corresponding bit stream of fax image have also been provided. These features can be used for steganalysis purposes.

Journal ArticleDOI
TL;DR: Different approaches to steganography investigation with focus on digital images are presented and experimental results regarding visual and statistical attacks for Steganography detection are presented.
Abstract: In this paper we present different approaches to steganography investigation with focus on digital images. We look at steganography tools along with their specific signatures. We present experimental results regarding visual and statistical attacks for steganography detection. We report about emerging directions in this area of research and tips for monitoring steganographic communications.

06 Jul 2002
TL;DR: The use of digital steganography as an alternative to cryptography is suggested, especially in countries where cryptography is outlawed, and various forms of attacks are applied on the steganographic tool, including the detection, extraction and disabling of a hidden message in a digital image.
Abstract: Steganography is the art of passing information in a manner that the very existence of the message is unknown. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. Unfortunately, there has not been any significant research into steganography, although it is a science that dates back to ancient times. The primary purpose of this project is to increase the sum of knowledge in the field of steganography. First of all, the use of digital steganography as an alternative to cryptography is suggested, especially in countries where cryptography is outlawed. An investigation into digital steganography is conducted, reviewing possible ways of embedding secret messages into digital media, like images and audio. Moreover, the design and implementation of a steganographic tool which embeds information into digital images is analysed extensively. Next, we experiment on steganography, trying to determine the limitations and flexibility of the steganographic tool implemented. For this purpose, various forms of attacks are applied on the steganographic tool, including the detection, extraction and disabling of a hidden message in a digital image. The results of the experiments are discussed in depth, stating clearly the weaknesses of the implemented steganographic tool.