Abstract
This paper investigates the detection of information hidden by the Least Significant Bit (LSB) matching scheme. In a theoretical context of known image media parameters, two important results are presented. First, the use of hypothesis testing theory allows us to design the Most Powerful (MP) test. Second, a study of the MP test gives us the opportunity to analytically calculate its statistical performance in order to warrant a given probability of false-alarm. In practice when detecting LSB matching, the unknown image parameters have to be estimated. Based on the local estimator used in the Weighted Stego-image (WS) detector, a practical test is presented. A numerical comparison with state-of-the-art detectors shows the good performance of the proposed tests and highlights the relevance of the proposed methodology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Böhme, R.: Advanced Statistical Steganalysis, 1st edn. Springer Publishing Company, Incorporated (2010)
Böhme, R., Ker, A.D.: A two-factor error model for quantitative steganalysis. In: Security, Steganography, and Watermarking of Multimedia Contents VIII. Proc. of the SPIE, vol. 6072 (2006)
BOSS contest: Break Our Steganographic System (2010), http://www.agents.cz/boss/
Cai, K., Li, X., Zeng, T., Yang, B., Lu, X.: Reliable histogram features for detecting LSB matching. In: 2010 17th IEEE International Conference on Image Processing, ICIP, pp. 1761–1764 (September 2010)
Cancelli, G., Doerr, G., Barni, M., Cox, I.: A comparative study of ±1 steganalyzers. In: 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 791–796 (October 2008)
Cancelli, G., Doerr, G., Cox, I., Barni, M.: Detection of ±1 LSB steganography based on the amplitude of histogram local extrema. In: 15th IEEE International Conference on Image Processing, ICIP 2008, pp. 1288–1291 (October 2008)
Cogranne, R., Zitzmann, C., Fillatre, L., Retraint, F., Nikiforov, I., Cornu, P.: A Cover Image Model For Reliable Steganalysis. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 178–192. Springer, Heidelberg (2011)
Cogranne, R., Zitzmann, C., Fillatre, L., Nikiforov, I., Retraint, F., Cornu, P.: Reliable detection of hidden information based on a non-linear local model. In: Proc. of IEEE Workshop on Statistical Signal Processing, pp. 493–496 (2011)
Cogranne, R., Zitzmann, C., Fillatre, L., Retraint, F., Nikiforov, I., Cornu, P.: Statistical decision by using quantized observations. In: IEEE International Symposium on Information Theory, pp. 1135–1139 (2011)
Cogranne, R., Zitzmann, C., Nikiforov, I., Retraint, F., Fillatre, L., Cornu, P.: Statistical Detection of LSB Matching in the Presence of Nuisance Parameters. In: Proc. of IEEE Workshop on Accepted for Publication in Statistical Signal Processing (2012)
Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann (2007)
Dabeer, O., Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.: Detection of hiding in the least significant bit. IEEE Transactions on Signal Processing 52(10), 3046–3058 (2004)
Foi, A., Trimeche, M., Katkovnik, V., Egiazarian, K.: Practical Poissonian-Gaussian noise modeling and fitting for single-image raw-data. IEEE Transactions on Image Processing 17(10), 1737–1754 (2008)
Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: Security, Steganography, and Watermarking of Multimedia Contents VI. Proc. of the SPIE, vol. 5306 (2004)
Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications, 1st edn. Cambridge University Press (2009)
Gloe, T., Böhme, R.: The ‘Dresden Image Database’ for benchmarking digital image forensics. In: Proceedings of the 25th Symposium On Applied Computing, ACM SAC 2010, vol. 2, pp. 1585–1591 (2010)
Goljan, M., Fridrich, J., Holotyak, T.: New blind steganalysis and its implications. In: Security, Steganography, and Watermarking of Multimedia Contents VIII. Proc. of the SPIE, vol. 6072 (2006)
Harmsen, J., Pearlman, W.: Higher-order statistical steganalysis of palette images. In: Security, Steganography, and Watermarking of Multimedia Contents V. Proc. of the SPIE, vol. 5020 (2005)
Ker, A.: Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters 12(6), 441–444 (2005)
Ker, A.D.: A capacity result for batch steganography. Signal Processing Letters 14(8), 525–528 (2007)
Ker, A.D., Böhme, R.: Revisiting weighted stego-image steganalysis. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Proc. of the SPIE, vol. 6819 (2008)
Lehman, E., Romano, J.: Testing Statistical Hypotheses, 2nd, 3rd edn. Springer (2005)
Lyu, S., Farid, H.: Steganalysis using higher-order image statistics. IEEE Transactions on Information Forensics and Security 1(1), 111–119 (2006)
Scott, C.: Performance measures for Neyman-Pearson classification. IEEE Trans. Inform. Theory 53(8), 2852–2863 (2007)
Zhang, J., Cox, I., Doerr, G.: Steganalysis for LSB matching in images with high-frequency noise. In: IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007, pp. 385–388 (October 2007)
Zitzmann, C., Cogranne, R., Retraint, F., Nikiforov, I., Fillatre, L., Cornu, P.: Statistical Decision Methods in Hidden Information Detection. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 163–177. Springer, Heidelberg (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cogranne, R., Zitzmann, C., Retraint, F., Nikiforov, I., Fillatre, L., Cornu, P. (2013). Statistical Detection of LSB Matching Using Hypothesis Testing Theory. In: Kirchner, M., Ghosal, D. (eds) Information Hiding. IH 2012. Lecture Notes in Computer Science, vol 7692. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36373-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-36373-3_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36372-6
Online ISBN: 978-3-642-36373-3
eBook Packages: Computer ScienceComputer Science (R0)