Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Extracting hidden messages of MLSB steganography based on optimal stego subset

This is a preview of subscription content, log in to check access.


  1. 1

    Liu J F, Tian Y G, Han T, et al. Stego key searching for LSB steganography on JPEG decompressed image. Sci China Inf Sci, 2016, 59: 032105

  2. 2

    Fridrich J, Goljan M, Soukal D. Searching for the stego-key. In: Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, 2004. 70–82

  3. 3

    Ker A D. Locating steganographic payload via WS residuals. In: Proceedings of 10th Workshop on Multimedia and Security, Oxford, 2008. 27–31

  4. 4

    Ker A D, Lubenko I. Feature reduction and payload location with WAM steganalysis. In: Proceedings of SPIE 7254, Media Forensics and Security, San Jose, 2009. 72540A

  5. 5

    Quach T T. Optimal cover estimation methods and steganographic payload location. IEEE Trans Inform Forensic Secur, 2011, 6: 1214–1222

  6. 6

    Quach T T. Cover estimation and payload location using Markov random fields. In: Proceedings of SPIE 9028, Electronic Imaging, Media Watermarking, Security, and Forensics, San Francisco, 2014. 90280H

  7. 7

    Liu J F, Tian Y G, Han T, et al. LSB steganographic payload location for JPEG-decompressed images. Digital Signal Process, 2015, 38: 66–76

  8. 8

    Huang Y F, Tao H Z, Xiao B, et al. Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys. Sci China Technol Sci, 2017, 60: 1585–1596

Download references


This work was supported by National Natural Science Foundation of China (Grant Nos. 61302159, 61401512, 61772549, 61379151, 61602508, U1736214) and Science and Technology Research Project of Henan Province, China (Grant No. 152102210005).

Author information

Correspondence to Xiangyang Luo or Jicang Lu.

Electronic supplementary material

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Yang, C., Luo, X., Lu, J. et al. Extracting hidden messages of MLSB steganography based on optimal stego subset. Sci. China Inf. Sci. 61, 119103 (2018).

Download citation