Advertisement

A Novel Steganalysis Method Based on Histogram Analysis

  • Bismita Choudhury
  • Rig Das
  • Arup Baruah
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 315)

Abstract

Steganalysis is the art of detecting hidden messages embedded inside Steganographic Images. Steganalysis involves detection of steganography, estimation of message length and its extraction. Recently Steganalysis receives great deal of attention from the researchers due to the evolution of new, advanced and much secured steganographic methods for communicating secret information. This paper presents a universal steganalysis method for blocking recent steganographic techniques in spatial domain. The novel method analyses histograms of both the cover and suspicious image and based on the histogram difference it gives decision on the suspicious image of being stego or normal image. This method for steganalysis extracts a special pattern from the histogram difference of the cover and . By finding that specific pattern from the histogram difference of the suspicious and cover image it detects the presence of hidden message. The proposed steganalysis method has been experimented on a set of stego images where different steganographic techniques are used and it successfully detects all those stego images.

Keywords

Steganalysis Steganography Histogram PSNR 

References

  1. 1.
    Johnson, F.N., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Computer Society Press. 31(2), 26–34 (1998)CrossRefGoogle Scholar
  2. 2.
    Fridrich, J., Goljan, M.: Practical steganalysis of digital images—state of the art. In: Proceedings of Electronic Imaging, SPIE, vol. 4675, pp. 1–13 (2002)Google Scholar
  3. 3.
    Lou, D.C., Hu, C.H., Chiu, C.C.: Steganalysis of histogram modification reversible data hiding scheme by histogram feature Coding. Int. J. Innov. Comput. Inf. Control 7, 11 (2011)Google Scholar
  4. 4.
    Cheddad, A., Condell, J., Curran, K., Kevitt, M.P.: Digital image steganography: survey and analysis of current methods. Elsevier Signal Process. 90, 727–752 (2010)CrossRefzbMATHGoogle Scholar
  5. 5.
    Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in grayscale and color images. In: Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, October 5 (2001)Google Scholar
  6. 6.
    Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of jpeg images: breaking the F5 algorithm. In: Proceedings of the 5th Information Hiding Workshop, Springer, vol. 2578, pp. 310–323 (2002)Google Scholar
  7. 7.
    Joo, C.J., Kim, S.K., Lee, K.H.: Histogram estimation-scheme-based steganalysis defeating the steganography using pixel-value differencing and modulus function. Opt. Eng. 49, 077001 (2010)Google Scholar
  8. 8.
    Pevny, T., Ba, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. In: ACM Multimedia and Security Workshop, Princeton, NJ, September 7–8, pp. 75–84 (2009)Google Scholar
  9. 9.
    Das, R., Tuithung, T.: A novel steganography method for image based on huffman encoding. In: 3rd IEEE National Conference on Emerging Trends and Applications in Computer Science (NCETACS—2012), pp. 14–18 (2012)Google Scholar
  10. 10.
  11. 11.
    Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: ACM Workshop on Information Hiding and Multimedia Security, June (2013)Google Scholar
  12. 12.
    Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: IEEE Workshop on Information Forensic and Security (WIFS), Tenerife, Spain, December (2012)Google Scholar
  13. 13.
    Filler, T., Fridrich, J.: Gibbs construction in steganography. IEEE Trans. Inf. Forensics and Security. 5(4), 705–720 (2010)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Department of Computer Science and Engineering and Information TechnologyDon Bosco College of Engineering and TechnologyGuwahatiIndia
  2. 2.Department of Computer Science and EngineeringNational Institute of TechnologyRourkelaIndia

Personalised recommendations