Abstract
At present, steganalysis research focuses on detecting the existence of a hidden message. However, extracting the hidden information, i.e., an extracting attack, is crucial in obtaining effective evidence in computer forensics. Due to the difficulty of an extracting attack, research in this field is limited. In steganography with a stego key, an extracting attack is equivalent to recovering the stego key. In this paper we study a method for recovering the stego key in least significant bit (LSB) steganography with a decompressed JPEG image as the cover image. Firstly, the recovery of the stego key is translated into a cryptanalysis problem for a sequential cipher. The method for recovering the stego key is based on estimating the modification positions. The minimum size of the data used to recover the stego key successfully is discussed. Secondly, when a decompressed JPEG image is used as the cover image, the probability of recovering the cover pixels using recompression is discussed. Recompression is used to compute the error of the estimated sequence. Finally, an algorithm to recover the stego key in LSB steganography with a decompressed JPEG image as the cover image is proposed. The experimental results for the steganographic software, Hide and Seek 4.1 and its variant, which is a typical representative of LSB steganography, show that the proposed method can successfully recover the stego key in LSB replacement and LSB matching, i.e., the extracting attack is successful, and it outperforms three previous methods in terms of computational complexity.
摘要
创新点
目前隐写分析的研究主要集中于隐藏消息的存在性检测。然而能否隐藏消息的提取, 即提取攻击, 对于计算机取证中能否获取重要证据起着重要作用。对于基于隐写密钥的隐写术, 提取攻击等价于恢复隐写密钥。本文的主要创新点如下: 首先, 将恢复隐写密钥转化为一个序列密码的密码分析问题, 得到了成功恢复隐写密钥所需的样本量。 然后, 利用重复压缩估计成功恢复载体像素的概率, 进而计算估计序列的误差值。 最后, 提出了以 JPEG 解压缩图像为载体的 LSB 隐写密钥恢复方法。
Similar content being viewed by others
References
Zhang W M, Li S Q. Information-theoretic analysis for the difficulty of extracting hidden information. Wuhan Univm J Nat Sci, 2005, 10: 315–318
Regalia P A. Cryptographic secrecy of steganographic matrix embedding. IEEE Trans Inf Forens Secur, 2008, 3: 786–791
Liu J F, Chen J Y, Zhang W M, et al. Cryptographic secrecy analysis of matrix embedding. In: Proceedings of the IEEE International Conference on Multimedia Information Networking and Security, Nanjing, 2010. 691–695
Chen J Y, Liu J F, Zhang W M, et al. Cryptographic secrecy analysis of matrix embedding. Int J Comput Intell Syst, 2013, 6: 639–647
Fridrich J, Goljan M, Soukal D. Searching for the stego-key. In: Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, 2004. 70–82
Fridrich J, Goljan M, Soukal D, et al. Forensic steganalysis: determining the stego key in spatial domain steganography. In: Proceedings of SPIE 5681, Security, Steganography, andWatermarking of Multimedia Contents VII, San Jose, 2005. 631–642
Zhang W M, Liu J F, Li S Q. Approaches for recovering key of LSB steganography (in Chinese). Acta Sci Nat Univ Sunyatseni, 2005, 44: 29–33
Zhang W M, Li S Q, Liu J F. Extracting attack to LSB steganography in spatial domain (in Chinese). Chin J Comput, 2007, 30: 1625–1631
Liu J, Tang G M. Stego key estimation in LSB steganography. J Multimedia, 2012, 7: 309–313
Zhang W M, Li S Q, Liu J F. Analysis for the equivalent keys of steganographic scheme CPT. Acta Electron Sin, 2007, 35: 2258–2261
Chen J Y, Zhu Y F, Zhang W M, et al. Chosen-key extracting attack to random LSB steganography. J Commun, 2010, 31: 73–80
Zhang J, Zhang D. Detection of LSB matching steganography in decompressed images. IEEE Signal Process Lett, 2010, 17: 141–144
Luo W Q, Wang Y G, Huang J W. Security analysis on spatial ±1 steganography for JPEG decompressed images. IEEE Signal Process Lett, 2011, 18: 39–42
Li X, Zhang T, Zhang Y, et al. A novel blind detector for additive noise steganography in JPEG decompressed images. Multimed Tools Appl, 2014, 68: 1051–1068
Li X, Zhang T, Zhang Y, et al. Quantitative steganalysis of spatial ±1 steganography in JPEG decompressed images. Multimed Tools Appl, 2014, 73: 1487–1506
Luo W Q, Huang J W, Qiu G P. JPEG error analysis and its applications to digital image forensics. IEEE Trans Inf Forens Secur, 2010, 5: 480–491
Liu J F, Tian Y G, Han T, et al. LSB steganographic payload location for JPEG-decompressed images. Digit Signal Process, 2015, 38: 66–76
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liu, J., Tian, Y., Han, T. et al. Stego key searching for LSB steganography on JPEG decompressed image. Sci. China Inf. Sci. 59, 32105 (2016). https://doi.org/10.1007/s11432-015-5367-x
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-015-5367-x