Stego key searching for LSB steganography on JPEG decompressed image

基于 JPEG 解压缩图像的 LSB 隐写密钥搜索方法

Abstract

At present, steganalysis research focuses on detecting the existence of a hidden message. However, extracting the hidden information, i.e., an extracting attack, is crucial in obtaining effective evidence in computer forensics. Due to the difficulty of an extracting attack, research in this field is limited. In steganography with a stego key, an extracting attack is equivalent to recovering the stego key. In this paper we study a method for recovering the stego key in least significant bit (LSB) steganography with a decompressed JPEG image as the cover image. Firstly, the recovery of the stego key is translated into a cryptanalysis problem for a sequential cipher. The method for recovering the stego key is based on estimating the modification positions. The minimum size of the data used to recover the stego key successfully is discussed. Secondly, when a decompressed JPEG image is used as the cover image, the probability of recovering the cover pixels using recompression is discussed. Recompression is used to compute the error of the estimated sequence. Finally, an algorithm to recover the stego key in LSB steganography with a decompressed JPEG image as the cover image is proposed. The experimental results for the steganographic software, Hide and Seek 4.1 and its variant, which is a typical representative of LSB steganography, show that the proposed method can successfully recover the stego key in LSB replacement and LSB matching, i.e., the extracting attack is successful, and it outperforms three previous methods in terms of computational complexity.

摘要

创新点

目前隐写分析的研究主要集中于隐藏消息的存在性检测。然而能否隐藏消息的提取, 即提取攻击, 对于计算机取证中能否获取重要证据起着重要作用。对于基于隐写密钥的隐写术, 提取攻击等价于恢复隐写密钥。本文的主要创新点如下: 首先, 将恢复隐写密钥转化为一个序列密码的密码分析问题, 得到了成功恢复隐写密钥所需的样本量。 然后, 利用重复压缩估计成功恢复载体像素的概率, 进而计算估计序列的误差值。 最后, 提出了以 JPEG 解压缩图像为载体的 LSB 隐写密钥恢复方法。

This is a preview of subscription content, access via your institution.

References

  1. 1

    Zhang W M, Li S Q. Information-theoretic analysis for the difficulty of extracting hidden information. Wuhan Univm J Nat Sci, 2005, 10: 315–318

    MathSciNet  Article  Google Scholar 

  2. 2

    Regalia P A. Cryptographic secrecy of steganographic matrix embedding. IEEE Trans Inf Forens Secur, 2008, 3: 786–791

    Article  Google Scholar 

  3. 3

    Liu J F, Chen J Y, Zhang W M, et al. Cryptographic secrecy analysis of matrix embedding. In: Proceedings of the IEEE International Conference on Multimedia Information Networking and Security, Nanjing, 2010. 691–695

    Google Scholar 

  4. 4

    Chen J Y, Liu J F, Zhang W M, et al. Cryptographic secrecy analysis of matrix embedding. Int J Comput Intell Syst, 2013, 6: 639–647

    Article  Google Scholar 

  5. 5

    Fridrich J, Goljan M, Soukal D. Searching for the stego-key. In: Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, 2004. 70–82

    Google Scholar 

  6. 6

    Fridrich J, Goljan M, Soukal D, et al. Forensic steganalysis: determining the stego key in spatial domain steganography. In: Proceedings of SPIE 5681, Security, Steganography, andWatermarking of Multimedia Contents VII, San Jose, 2005. 631–642

    Google Scholar 

  7. 7

    Zhang W M, Liu J F, Li S Q. Approaches for recovering key of LSB steganography (in Chinese). Acta Sci Nat Univ Sunyatseni, 2005, 44: 29–33

    MathSciNet  Google Scholar 

  8. 8

    Zhang W M, Li S Q, Liu J F. Extracting attack to LSB steganography in spatial domain (in Chinese). Chin J Comput, 2007, 30: 1625–1631

    MathSciNet  Google Scholar 

  9. 9

    Liu J, Tang G M. Stego key estimation in LSB steganography. J Multimedia, 2012, 7: 309–313

    Google Scholar 

  10. 10

    Zhang W M, Li S Q, Liu J F. Analysis for the equivalent keys of steganographic scheme CPT. Acta Electron Sin, 2007, 35: 2258–2261

    Google Scholar 

  11. 11

    Chen J Y, Zhu Y F, Zhang W M, et al. Chosen-key extracting attack to random LSB steganography. J Commun, 2010, 31: 73–80

    Google Scholar 

  12. 12

    Zhang J, Zhang D. Detection of LSB matching steganography in decompressed images. IEEE Signal Process Lett, 2010, 17: 141–144

    Article  Google Scholar 

  13. 13

    Luo W Q, Wang Y G, Huang J W. Security analysis on spatial ±1 steganography for JPEG decompressed images. IEEE Signal Process Lett, 2011, 18: 39–42

    Article  Google Scholar 

  14. 14

    Li X, Zhang T, Zhang Y, et al. A novel blind detector for additive noise steganography in JPEG decompressed images. Multimed Tools Appl, 2014, 68: 1051–1068

    Article  Google Scholar 

  15. 15

    Li X, Zhang T, Zhang Y, et al. Quantitative steganalysis of spatial ±1 steganography in JPEG decompressed images. Multimed Tools Appl, 2014, 73: 1487–1506

    Article  Google Scholar 

  16. 16

    Luo W Q, Huang J W, Qiu G P. JPEG error analysis and its applications to digital image forensics. IEEE Trans Inf Forens Secur, 2010, 5: 480–491

    Article  Google Scholar 

  17. 17

    Liu J F, Tian Y G, Han T, et al. LSB steganographic payload location for JPEG-decompressed images. Digit Signal Process, 2015, 38: 66–76

    Article  Google Scholar 

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Tao Han.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Liu, J., Tian, Y., Han, T. et al. Stego key searching for LSB steganography on JPEG decompressed image. Sci. China Inf. Sci. 59, 32105 (2016). https://doi.org/10.1007/s11432-015-5367-x

Download citation

Keywords

  • steganalysis
  • extracting attack
  • LSB steganography
  • decompressed JPEG image
  • recompression
  • stego key

关键词

  • 隐写分析
  • 提取攻击
  • LSB 隐写
  • JPEG 解压缩图像
  • 重复压缩
  • 隐写密钥