Skip to main content

Steganalysis of LSB Matching Revisited for Consecutive Pixels Using B-Spline Functions

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7128))

Abstract

Least significant bit matching revisited steganography (LSBMR) is a significant improvement of the well-known least significant bit matching algorithm. In this paper, we point out that LSBMR for consecutive pixels and its descendants, including the edge adaptive image steganography based on LSBMR, introduces intrinsic statistical imbalance in secret data embedding process, which results in the imbalance of the power of the additive stegonoise. This intrinsic imbalance can be used to construct a dimensionless discriminator using B-spline smoothing. Experimental results show that the proposed steganalytic method is a reliable detector against LSBMR for consecutive pixels and the edge adaptive image steganography based on LSBMR when block size is 1. An embedding rate estimator based on B-spline functions which can roughly estimate the embedding rate is proposed as well.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cancelli, G., Doerr, G., Barni, M., Cox, I.: A comparative study of ±1 steganalyzers. In: 2008 IEEE 10th Workshop on Multimedia Signal Processing 2008, pp. 791–796 (2008)

    Google Scholar 

  2. Goljan, M., Fridrich, J., Holotyak, T.: New blind steganalysis and its implications. In: Proc. SPIE on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, vol. 6072, pp. 1–13 (2006)

    Google Scholar 

  3. Harmsen, J.J., Pearlman, W.A.: Steganalysis of additive noise modelable information hiding. In: Proc. SPIE on Security and Watermarking of Multimedia Contents, Santa Clara, CA, USA, vol. 5020, pp. 131–142 (2003)

    Google Scholar 

  4. Huang, F., Li, B., Huang, J.: Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels. In: 14th IEEE International Conference on Image Processing, ICIP 2007, pp. 401–404 (2007)

    Google Scholar 

  5. Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters 12(6), 441–444 (2005)

    Article  Google Scholar 

  6. Li, X., Yang, B., Cheng, D., Zeng, T.: A generalization of LSB matching. IEEE Signal Processing Letters 16(2), 69–72 (2009)

    Article  Google Scholar 

  7. Li, X., Zheng, T., Yang, B.: Detecting LSB matching by applying calibration technique for difference image. In: Proc. 10th ACM Workshop on Multimedia and Security, Oxford, U.K, pp. 133–138 (2008)

    Google Scholar 

  8. Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Security 5(2), 201–214 (2010)

    Article  MathSciNet  Google Scholar 

  9. Mielikainen, J.: LSB matching revisited. IEEE Signal Processing Letters 13(5), 285–287 (2006)

    Article  Google Scholar 

  10. Reinsch, C.H.: Smoothing by spline functions. Numerische Mathematik 10, 177–183 (1967)

    Article  MathSciNet  MATH  Google Scholar 

  11. Sharp, T.: An Implementation of Key-Based Digital Signal Steganography. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 13–26. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  12. Unser, M.: B-spline signal processing: part I–theory. IEEE Trans. Signal Process. 41(2), 821–833 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  13. Wahba, G.: Smoothing noisy data with spline functions. Numerische Mathematik 24, 383–393 (1975)

    Article  MathSciNet  MATH  Google Scholar 

  14. Wong, P.W., Chen, H., Tang, Z.: On steganalysis of plus-minus one embedding of continuous-tone images. In: Proc. SPIE on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, vol. 5681, pp. 643–652 (2005)

    Google Scholar 

  15. Xu, H., Wang, J., Kim, H.J.: Near-optimal solution to pair-wise LSB matching via an immune programming strategy. Information Sciences 180(8), 1201–1217 (2010)

    Article  Google Scholar 

  16. Xuan, G., Shi, Y.Q., Gao, J., Zou, D., Yang, C., Zhang, Z., Chai, P., Chen, C.-H., Chen, W.: Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 262–277. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  17. Zhang, J., Zhang, D.: Detection of LSB matching steganography in decompressed images. IEEE Signal Processing Letters 17(2), 141–144 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tan, S. (2012). Steganalysis of LSB Matching Revisited for Consecutive Pixels Using B-Spline Functions. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32205-1_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32204-4

  • Online ISBN: 978-3-642-32205-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics