Advertisement

Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Stego key searching for LSB steganography on JPEG decompressed image

基于 JPEG 解压缩图像的 LSB 隐写密钥搜索方法

Abstract

At present, steganalysis research focuses on detecting the existence of a hidden message. However, extracting the hidden information, i.e., an extracting attack, is crucial in obtaining effective evidence in computer forensics. Due to the difficulty of an extracting attack, research in this field is limited. In steganography with a stego key, an extracting attack is equivalent to recovering the stego key. In this paper we study a method for recovering the stego key in least significant bit (LSB) steganography with a decompressed JPEG image as the cover image. Firstly, the recovery of the stego key is translated into a cryptanalysis problem for a sequential cipher. The method for recovering the stego key is based on estimating the modification positions. The minimum size of the data used to recover the stego key successfully is discussed. Secondly, when a decompressed JPEG image is used as the cover image, the probability of recovering the cover pixels using recompression is discussed. Recompression is used to compute the error of the estimated sequence. Finally, an algorithm to recover the stego key in LSB steganography with a decompressed JPEG image as the cover image is proposed. The experimental results for the steganographic software, Hide and Seek 4.1 and its variant, which is a typical representative of LSB steganography, show that the proposed method can successfully recover the stego key in LSB replacement and LSB matching, i.e., the extracting attack is successful, and it outperforms three previous methods in terms of computational complexity.

摘要

创新点

目前隐写分析的研究主要集中于隐藏消息的存在性检测。然而能否隐藏消息的提取, 即提取攻击, 对于计算机取证中能否获取重要证据起着重要作用。对于基于隐写密钥的隐写术, 提取攻击等价于恢复隐写密钥。本文的主要创新点如下: 首先, 将恢复隐写密钥转化为一个序列密码的密码分析问题, 得到了成功恢复隐写密钥所需的样本量。 然后, 利用重复压缩估计成功恢复载体像素的概率, 进而计算估计序列的误差值。 最后, 提出了以 JPEG 解压缩图像为载体的 LSB 隐写密钥恢复方法。

This is a preview of subscription content, log in to check access.

References

  1. 1

    Zhang W M, Li S Q. Information-theoretic analysis for the difficulty of extracting hidden information. Wuhan Univm J Nat Sci, 2005, 10: 315–318

  2. 2

    Regalia P A. Cryptographic secrecy of steganographic matrix embedding. IEEE Trans Inf Forens Secur, 2008, 3: 786–791

  3. 3

    Liu J F, Chen J Y, Zhang W M, et al. Cryptographic secrecy analysis of matrix embedding. In: Proceedings of the IEEE International Conference on Multimedia Information Networking and Security, Nanjing, 2010. 691–695

  4. 4

    Chen J Y, Liu J F, Zhang W M, et al. Cryptographic secrecy analysis of matrix embedding. Int J Comput Intell Syst, 2013, 6: 639–647

  5. 5

    Fridrich J, Goljan M, Soukal D. Searching for the stego-key. In: Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, 2004. 70–82

  6. 6

    Fridrich J, Goljan M, Soukal D, et al. Forensic steganalysis: determining the stego key in spatial domain steganography. In: Proceedings of SPIE 5681, Security, Steganography, andWatermarking of Multimedia Contents VII, San Jose, 2005. 631–642

  7. 7

    Zhang W M, Liu J F, Li S Q. Approaches for recovering key of LSB steganography (in Chinese). Acta Sci Nat Univ Sunyatseni, 2005, 44: 29–33

  8. 8

    Zhang W M, Li S Q, Liu J F. Extracting attack to LSB steganography in spatial domain (in Chinese). Chin J Comput, 2007, 30: 1625–1631

  9. 9

    Liu J, Tang G M. Stego key estimation in LSB steganography. J Multimedia, 2012, 7: 309–313

  10. 10

    Zhang W M, Li S Q, Liu J F. Analysis for the equivalent keys of steganographic scheme CPT. Acta Electron Sin, 2007, 35: 2258–2261

  11. 11

    Chen J Y, Zhu Y F, Zhang W M, et al. Chosen-key extracting attack to random LSB steganography. J Commun, 2010, 31: 73–80

  12. 12

    Zhang J, Zhang D. Detection of LSB matching steganography in decompressed images. IEEE Signal Process Lett, 2010, 17: 141–144

  13. 13

    Luo W Q, Wang Y G, Huang J W. Security analysis on spatial ±1 steganography for JPEG decompressed images. IEEE Signal Process Lett, 2011, 18: 39–42

  14. 14

    Li X, Zhang T, Zhang Y, et al. A novel blind detector for additive noise steganography in JPEG decompressed images. Multimed Tools Appl, 2014, 68: 1051–1068

  15. 15

    Li X, Zhang T, Zhang Y, et al. Quantitative steganalysis of spatial ±1 steganography in JPEG decompressed images. Multimed Tools Appl, 2014, 73: 1487–1506

  16. 16

    Luo W Q, Huang J W, Qiu G P. JPEG error analysis and its applications to digital image forensics. IEEE Trans Inf Forens Secur, 2010, 5: 480–491

  17. 17

    Liu J F, Tian Y G, Han T, et al. LSB steganographic payload location for JPEG-decompressed images. Digit Signal Process, 2015, 38: 66–76

Download references

Author information

Correspondence to Tao Han.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Liu, J., Tian, Y., Han, T. et al. Stego key searching for LSB steganography on JPEG decompressed image. Sci. China Inf. Sci. 59, 32105 (2016). https://doi.org/10.1007/s11432-015-5367-x

Download citation

Keywords

  • steganalysis
  • extracting attack
  • LSB steganography
  • decompressed JPEG image
  • recompression
  • stego key

关键词

  • 隐写分析
  • 提取攻击
  • LSB 隐写
  • JPEG 解压缩图像
  • 重复压缩
  • 隐写密钥