Skip to main content

A Novel Steganalysis Method Based on Histogram Analysis

  • Conference paper
  • First Online:
Advanced Computer and Communication Engineering Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 315))

Abstract

Steganalysis is the art of detecting hidden messages embedded inside Steganographic Images. Steganalysis involves detection of steganography, estimation of message length and its extraction. Recently Steganalysis receives great deal of attention from the researchers due to the evolution of new, advanced and much secured steganographic methods for communicating secret information. This paper presents a universal steganalysis method for blocking recent steganographic techniques in spatial domain. The novel method analyses histograms of both the cover and suspicious image and based on the histogram difference it gives decision on the suspicious image of being stego or normal image. This method for steganalysis extracts a special pattern from the histogram difference of the cover and . By finding that specific pattern from the histogram difference of the suspicious and cover image it detects the presence of hidden message. The proposed steganalysis method has been experimented on a set of stego images where different steganographic techniques are used and it successfully detects all those stego images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Johnson, F.N., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Computer Society Press. 31(2), 26–34 (1998)

    Article  Google Scholar 

  2. Fridrich, J., Goljan, M.: Practical steganalysis of digital images—state of the art. In: Proceedings of Electronic Imaging, SPIE, vol. 4675, pp. 1–13 (2002)

    Google Scholar 

  3. Lou, D.C., Hu, C.H., Chiu, C.C.: Steganalysis of histogram modification reversible data hiding scheme by histogram feature Coding. Int. J. Innov. Comput. Inf. Control 7, 11 (2011)

    Google Scholar 

  4. Cheddad, A., Condell, J., Curran, K., Kevitt, M.P.: Digital image steganography: survey and analysis of current methods. Elsevier Signal Process. 90, 727–752 (2010)

    Article  MATH  Google Scholar 

  5. Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in grayscale and color images. In: Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, October 5 (2001)

    Google Scholar 

  6. Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of jpeg images: breaking the F5 algorithm. In: Proceedings of the 5th Information Hiding Workshop, Springer, vol. 2578, pp. 310–323 (2002)

    Google Scholar 

  7. Joo, C.J., Kim, S.K., Lee, K.H.: Histogram estimation-scheme-based steganalysis defeating the steganography using pixel-value differencing and modulus function. Opt. Eng. 49, 077001 (2010)

    Google Scholar 

  8. Pevny, T., Ba, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. In: ACM Multimedia and Security Workshop, Princeton, NJ, September 7–8, pp. 75–84 (2009)

    Google Scholar 

  9. Das, R., Tuithung, T.: A novel steganography method for image based on huffman encoding. In: 3rd IEEE National Conference on Emerging Trends and Applications in Computer Science (NCETACS—2012), pp. 14–18 (2012)

    Google Scholar 

  10. Steganography codes for windows. http://dde.binghamton.edu/download/stego_algorithms/

  11. Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: ACM Workshop on Information Hiding and Multimedia Security, June (2013)

    Google Scholar 

  12. Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: IEEE Workshop on Information Forensic and Security (WIFS), Tenerife, Spain, December (2012)

    Google Scholar 

  13. Filler, T., Fridrich, J.: Gibbs construction in steganography. IEEE Trans. Inf. Forensics and Security. 5(4), 705–720 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bismita Choudhury .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Choudhury, B., Das, R., Baruah, A. (2015). A Novel Steganalysis Method Based on Histogram Analysis. In: Sulaiman, H., Othman, M., Othman, M., Rahim, Y., Pee, N. (eds) Advanced Computer and Communication Engineering Technology. Lecture Notes in Electrical Engineering, vol 315. Springer, Cham. https://doi.org/10.1007/978-3-319-07674-4_73

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07674-4_73

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07673-7

  • Online ISBN: 978-3-319-07674-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics