Skip to main content
Log in

Steganalysis of SS Steganography: Hidden Data Identification and Extraction

  • Published:
Circuits, Systems, and Signal Processing Aims and scope Submit manuscript

Abstract

We consider the problem of steganalysis of multi-carrier spread-spectrum steganography in which secret data are embedded over a wide band in a spectrum (transform) domain of a digital medium. The objective is first to identify the presence or absence of hidden data in a given image (i.e., passive steganalysis). Unlike conventional feature-based passive steganalysis algorithms, we describe an unsupervised (blind) low-complexity approach based on iterative generalized least-squares principles that may enable rapid high-volume image processing. Extensive experiments on image sets and comparisons with existing passive steganalysis techniques demonstrate most satisfactory classification performance measured in probability of correct detection versus induced false alarm rate. If the existence of hidden data is identified, we then aim to detect the number of carriers (messages) and blindly extract the hidden data without the knowledge of the original host nor the embedding carriers. This task is also known as active/forensic steganalysis. Experimental studies on images show that the developed algorithm can achieve recovery probability of error close to what may be attained with known embedding carriers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. Active steganalysis is also referred to as forensic steganalysis [11].

  2. Most conventional SS embedding schemes [2, 6, 9, 16, 25, 30, 36] consider single message embedding which is a special case of the multi-message SS embedding.

  3. Additive white Gaussian noise is frequently viewed as a suitable (most entropic) model for general quantization errors, channel transmission disturbances, and/or image processing attacks [5].

References

  1. İ. Avcıbaş, N. Memon, B. Sankur, Steganalysis using image quality metrics. IEEE Trans. Image Process. 12, 221–229 (2003)

    Article  MathSciNet  Google Scholar 

  2. M. Barni, F. Bartolini, A. De Rosa, A. Piva, A new decoder for the optimum recovery of nonadditive watermarks. IEEE Trans. Image Process. 10, 755–766 (2001)

    Article  Google Scholar 

  3. C. Cachin, An information-theoretic model for steganography, in Proc. 2nd Int. Workshop Inf. Hiding, (Portland, OR, Apr. 1998), pp. 306–318

  4. J.F. Cardoso, High-order contrasts for independent component analysis. Neural Computation 11, 157–192 (1999)

    Article  Google Scholar 

  5. T.M. Cover, J.A. Thomas, Elements of Information Theory, 2nd edn. (John Wiley, Hoboken, 2006)

    MATH  Google Scholar 

  6. I.J. Cox, J. Kilian, F.T. Leighton, T. Shannon, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 1673–1687 (1997)

    Article  Google Scholar 

  7. R.O. Duda, P.E. Hart, D.G. Stork, Pattern Classification, 2nd edn. (Wiley, Hoboken, 2000)

    Google Scholar 

  8. H. Farid, Detecting hidden messages using higher-order statistical models, in itProc. IEEE Intern. Conf. Image Process. (ICIP), (New York, Sept. 2002), pp. 905–908

  9. C. Fei, D. Kundur, R.H. Kwong, Analysis and design of watermarking algorithms for improved resistance to compression. IEEE Trans. Image Process. 13, 126–144 (2004)

    Article  Google Scholar 

  10. T. Filler, T. Pevny, P. Bas. BOSS, Break Our Steganography System. http://www.agents.cz/boss/

  11. J. Fridrich, Steganography in Digital Media, Principles, Algorithms, and Applications (Cambridge University Press, Cambridge, 2010)

  12. M. Gkizeli, D.A. Pados, S.N. Batalama, M.J. Medley, Blind iterative recovery of spread-spectrum steganographic messages, in Proc. IEEE Intern. Conf. Image Process. (ICIP), (Genova, Sept. 2005), vol. 2, pp. 11–14

  13. M. Gkizeli, D.A. Pados, M.J. Medley, SINR, bit error rate, and Shannon capacity optimized spread-spectrum steganography, in Proc. IEEE Intern. Conf. Image Process. (ICIP), (Singapore, Oct. 2004), vol. 2, pp. 1561–1564

  14. M. Gkizeli, D.A. Pados, M.J. Medley, Optimal carrier design for spread-spectrum steganography. IEEE Trans. Image Process. 16, 391–405 (2007)

    Article  MathSciNet  Google Scholar 

  15. G. Gul, F. Kurugollu, SVD-based universal spatial domain image steganalysis. IEEE Trans. Inf. Forens. Secur. 5, 349–353 (2010)

    Article  Google Scholar 

  16. J. Hernandez, M. Amado, F. Perez-Gonzalez, DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Trans. Image Process. 9, 55–68 (2000)

    Article  Google Scholar 

  17. A. Hyvärinen, E. Oja, A fast fixed-point algorithm for independent component analysis. Neural Computation 9, 1483–1492 (1997)

    Article  Google Scholar 

  18. N.F. Johnson, S. Katzenbeisser, A survey of steganographic techniques, in Information Hiding, ed. by S. Katzenbeisser, F. Peticolas (Artech House, Norwood, 2000), pp. 43–78

    Google Scholar 

  19. M. Li, S. N. Batalama, and D. A. Pados, Population size identification for CDMA eavesdropping, in Proc. IEEE Military Commun. Conf. (MILCOM), (Orlando, FL, Oct. 2007), pp. 1–6

  20. M. Li, S. N. Batalama, D. A. Pados, and J. D. Matyjas, Multiuser CDMA signal extraction, in Proc. IEEE Military Commun. Conf. (MILCOM), (Washington D.C., Oct. 2006), pp. 1–5

  21. T. Li, N.D. Sidiropoulos, Blind digital signal separation using successive interference cancellation iterative least squares. IEEE Trans. Signal Process. 48, 3146–3152 (2000)

    Article  Google Scholar 

  22. M. Li, M. Kulhandjian, D.A. Pados, S.N. Batalama, M.J. Medley, Extracting spread-spectrum hidden data from digital media. IEEE Trans. Inf. Forens. Secur 8(7), 1201–1210 (2013)

    Article  Google Scholar 

  23. W. Lie, G. Lin, A feature-based classification technique for blind image steganalysis. IEEE Trans. Multimed. 7, 1007–1020 (2005)

    Article  Google Scholar 

  24. S. Lyu, H. Farid, Steganalysis using higher-order image statistics. IEEE Trans. Inf. Forens. Secur. 1, 111–119 (2006)

    Article  Google Scholar 

  25. H.S. Malvar, D.A. Florencio, Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans. Signal Process. 51, 898–905 (2003)

    Article  MathSciNet  Google Scholar 

  26. D.G. Manolakis, V.K. Ingle, S.M. Kogon, Statistical and Adaptive Signal Processing: Spectral Estimation, Signal Modeling, Adaptive Filtering and Array Processing (McGraw-Hill, Boston, 2000)

    Google Scholar 

  27. C.D. Meyer, Matrix Analysis and Applied Linear Algebra (SIAM, Philadelphia, 2000)

    Book  MATH  Google Scholar 

  28. L. Pérez-Freire, F. Pérez-González, Spread-spectrum watermarking security. IEEE Trans. Inf. Forens. Secur. 4, 2–24 (2009)

    Article  Google Scholar 

  29. T. Pevny, P. Bas, J. Fridrich, Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forens. Secur. 5, 215–224 (2010)

    Article  Google Scholar 

  30. C. Qiang, T.S. Huang, An additive approach to transform-domain information hiding and optimum detection structure. IEEE Trans. Multimed. 3, 273–284 (2001)

    Article  Google Scholar 

  31. G. J. Simmons, The prisoner’s problem and the subliminal channel, in Advances in Cryptology: Proc. CRYPTO’83, (New York: Plenum, 1984), pp. 51–67

  32. S. Talwar, A. Paulraj, Blind separation of synchronous co-channel digital signals using an antenna array—part II: performance analysis. IEEE Trans. Signal Process. 45, 706–718 (1997)

  33. S. Talwar, M. Viberg, A. Paulraj, Blind separation of synchronous co-channel digital signals using an antenna array—part I: algorithms. IEEE Trans. Signal Process. 44, 1184–1197 (1996)

  34. The federal plan for cyber security and information assurance research and development, reported by the interagency working group on cyber security and information assurance, (Apr. 2006)

  35. S. Trivedi, R. Chandramouli, Secret key estimation in sequential steganography. IEEE Trans. Signal Process. 53, 746–757 (2005)

    Article  MathSciNet  Google Scholar 

  36. A. Valizadeh, Z.J. Wang, Correlation-and-bit-aware spread spectrum embedding for data hiding. IEEE Trans. Inf. Forens. Secur. 6, 267–282 (2011)

    Article  Google Scholar 

  37. Y. Wang, P. Moulin, Steganalysis of block-DCT image steganography, in Proc. IEEE Workshop on Statistical Signal Process., (Saint-Louis, MO, Sept, 2003), pp. 339–342

  38. S. Wang, H. Wang, Cyber warfare: steganography vs. steganalysis. Commun. ACM 47, 76–82 (2004)

    Article  Google Scholar 

  39. Y. Wang, P. Moulin, Optimized feature extraction for learning-based image steganalysis. IEEE Trans. Inf. Forens. Secur. 2, 31–45 (2007)

    Article  Google Scholar 

  40. M. Wax, Detection and localization of multiple sources via the stochastic signals model. IEEE Trans. Signal Process. 39, 2450–2456 (1991)

  41. M. Wax, T. Kailath, Detection of signals by information theroretic criteria. IEEE Trans. Acoust. Speech Signal Process. 33, 387–392 (1985)

    Article  MathSciNet  Google Scholar 

  42. Y. Yao, H.V. Poor, Eavesdropping in the synchronous CDMA channel: an EM-based approach. IEEE Trans. Signal Process. 49, 1748–1756 (2001)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ming Li.

Additional information

This work was supported by the Fundamental Research Funds for the Central Universities (Grant No. DUT14RC(3)103). This paper was presented in part at the IEEE Int. Conf. Image Process. (ICIP), Brussels, Belgium, Sept. 2011.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, M., Liu, Q. Steganalysis of SS Steganography: Hidden Data Identification and Extraction. Circuits Syst Signal Process 34, 3305–3324 (2015). https://doi.org/10.1007/s00034-015-0007-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00034-015-0007-7

Keywords

Navigation