Skip to main content

Assessment of Steganalytic Methods Using Multiple Regression Models

  • Conference paper
Information Hiding (IH 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3727))

Included in the following conference series:

Abstract

This paper proposes multiple regression models as a method for quantitative evaluation of the accuracy in steganalysis with respect to various moderating factors, such as parameter choice of the detector and properties of the carrier object. The case for multivariate statistical inference in steganalysis is particularly relevant: recent findings suggest that type and characteristics of carrier do matter, but the precise relations remain still opaque. In this paper we provide an exemplary comparison between two length-estimating attacks against LSB steganography. Extensions and applications for improved steganalysis are addressed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R., Petitcolas, F.A.P.: On the Limits of Steganography. IEEE Journal of Selected Areas in Communications 16, 474–481 (1998)

    Article  Google Scholar 

  2. Dabeer, O., Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.S.: Detection of Hiding in the Least Significant Bit. IEEE Trans. on Signal Processing 52, 3046–3058 (2004)

    Article  MathSciNet  Google Scholar 

  3. Dennis, J.E., Schnabel, R.B.: Numerical Methods for Unconstrained Optimization and Nonlinear Equations. Prentice Hall, New York (1983)

    MATH  Google Scholar 

  4. Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB Steganography Via Sample Pair Analysis. IEEE Trans. on Signal Processing 51, 1995–2007 (2003)

    Article  Google Scholar 

  5. Farid, H., Johnson, M.: The Digital Forensic Image Library (DFIL). Beta version (2004)

    Google Scholar 

  6. Fridrich, J., Goljan, M.: On Estimation of Secret Message Length in LSB Steganography in Spatial Domain. In: Delp, E.J., Wong, P.W. (eds.): Proc. of SPIE Security, Steganography and Watermarking of Multimedia Contents VI, San Jose, CA (2004)

    Google Scholar 

  7. Fridrich, J., Goljan, M., Du, R.: Reliable Detection of LSB Based Image Steganography. In: Proc. of the ACM Workshop on Multimedia and Security, pp. 27–30 (2001)

    Google Scholar 

  8. Fridrich, J., Goljan, M., Hogea, D., Soukal, D.: Quantitative Steganalysis of Digital Images: Estimating the Secret Message Length. ACM Multimedia Systems Journal 9, 288–302 (2003)

    Article  Google Scholar 

  9. Fridrich, J., Goljan, M., Soukal, D.: Higher-order Statistical Steganalysis of Palette Images. In: Delp, E.J., Wong, P.W. (eds.): Proc. of SPIE Security and Watermarking of Multimedia Contents V, pp. 178–190 (2003)

    Google Scholar 

  10. Fridrich, J., Soukal, D., Goljan, M.: Maximum Likelihood Estimation of Length of Secret Message Embedded Using ±K Steganography in Spatial Domain. In: Delp, E.J., Wong, P.W. (eds.): Proc. of SPIE Security, Steganography and Watermarking of Multimedia Contents VII, San Jose, CA, pp. 595–606 (2005)

    Google Scholar 

  11. Ihaka, R., Gentlemen, R.: R – A Language for Data Analysis and Graphics. Journal of Computational Graphics and Statistics 5, 299–314 (1996)

    Article  Google Scholar 

  12. Holotyak, T., Fridrich, J., Soukal, D.: Stochastic Approach to Secret Message Length Estimation in ±K Embedding Steganography. In: Delp, E.J., Wong, P.W. (eds.): Proc. of SPIE Security, Steganography and Watermarking of Multimedia Contents VII, San Jose, CA, pp. 673–684 (2005)

    Google Scholar 

  13. Ker, A.D.: Quantitative Evaluation of Pairs and RS Steganalysis. In: Delp, E.J., Wong, P.W. (eds.): Proc. of SPIE Security, Steganography and Watermarking of Multimedia Contents VI, San Jose, CA (2004)

    Google Scholar 

  14. Ker, A.D.: Improved Detection of LSB Steganography in Grayscale Images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 97–115. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  15. Ker, A.D.: Resampling and the Detection of LSB Matching in Colour Bitmaps. In: Delp, E.J., Wong, P.W. (eds.): Proc. of SPIE Security, Steganography and Watermarking of Multimedia Contents VII, San Jose, CA, pp. 1–15 (2005)

    Google Scholar 

  16. Lindsey, J.K.: Nonlinear Models in Medical Statistics. Oxford University Press, Oxford (2001)

    MATH  Google Scholar 

  17. Lindsey, J.K.: Nonlinear Regression and Repeated Measurements Libraries (2001), http://popgen0146uns50.unimaas.nl/~jlindsey/rcode.html

  18. Long, J.S.: Regression Models for Categorial and Limited Dependent Variables. Sage Publications, Thousand Oaks (1997)

    Google Scholar 

  19. Lu, P., Luo, X., Tang, Q., Shen, L.: An Improved Sample Pairs Method for Detection of LSB Embedding. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 116–127. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  20. Lyu, S., Farid, H.: Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340–354. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  21. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding|A Survey. Proc. of the IEEE 87, 1062–1078 (1999)

    Article  Google Scholar 

  22. The R Project for Statistical Computing, http://www.r-project.org/

  23. Westfeld, A.: Space Filling Curves in Steganalysis. In: Delp, E.J., Wong, P.W. (eds.): Proc. of SPIE Security, Steganography and Watermarking of Multimedia Contents VII, San Jose, CA, pp. 28–37 (2005)

    Google Scholar 

  24. Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  25. Zhang, T., Ping, X.: A New Approach to Reliable Detection of LSB Steganography in Natural Images. Signal Processing 83, 2085–2093 (2003)

    Article  MATH  Google Scholar 

  26. Zhang, X., Wang, S., Zhang, K.: Steganography with Least Histogram Abnormality. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 395–406. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Böhme, R. (2005). Assessment of Steganalytic Methods Using Multiple Regression Models. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds) Information Hiding. IH 2005. Lecture Notes in Computer Science, vol 3727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558859_21

Download citation

  • DOI: https://doi.org/10.1007/11558859_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29039-1

  • Online ISBN: 978-3-540-31481-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics