Abstract
Steganalysis is the art of detecting hidden messages embedded inside Steganographic Images. Steganalysis involves detection of steganography, estimation of message length and its extraction. Recently Steganalysis receives great deal of attention from the researchers due to the evolution of new, advanced and much secured steganographic methods for communicating secret information. This paper presents a universal steganalysis method for blocking recent steganographic techniques in spatial domain. The novel method analyses histograms of both the cover and suspicious image and based on the histogram difference it gives decision on the suspicious image of being stego or normal image. This method for steganalysis extracts a special pattern from the histogram difference of the cover and . By finding that specific pattern from the histogram difference of the suspicious and cover image it detects the presence of hidden message. The proposed steganalysis method has been experimented on a set of stego images where different steganographic techniques are used and it successfully detects all those stego images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Johnson, F.N., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Computer Society Press. 31(2), 26–34 (1998)
Fridrich, J., Goljan, M.: Practical steganalysis of digital images—state of the art. In: Proceedings of Electronic Imaging, SPIE, vol. 4675, pp. 1–13 (2002)
Lou, D.C., Hu, C.H., Chiu, C.C.: Steganalysis of histogram modification reversible data hiding scheme by histogram feature Coding. Int. J. Innov. Comput. Inf. Control 7, 11 (2011)
Cheddad, A., Condell, J., Curran, K., Kevitt, M.P.: Digital image steganography: survey and analysis of current methods. Elsevier Signal Process. 90, 727–752 (2010)
Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in grayscale and color images. In: Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, October 5 (2001)
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of jpeg images: breaking the F5 algorithm. In: Proceedings of the 5th Information Hiding Workshop, Springer, vol. 2578, pp. 310–323 (2002)
Joo, C.J., Kim, S.K., Lee, K.H.: Histogram estimation-scheme-based steganalysis defeating the steganography using pixel-value differencing and modulus function. Opt. Eng. 49, 077001 (2010)
Pevny, T., Ba, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. In: ACM Multimedia and Security Workshop, Princeton, NJ, September 7–8, pp. 75–84 (2009)
Das, R., Tuithung, T.: A novel steganography method for image based on huffman encoding. In: 3rd IEEE National Conference on Emerging Trends and Applications in Computer Science (NCETACS—2012), pp. 14–18 (2012)
Steganography codes for windows. http://dde.binghamton.edu/download/stego_algorithms/
Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: ACM Workshop on Information Hiding and Multimedia Security, June (2013)
Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: IEEE Workshop on Information Forensic and Security (WIFS), Tenerife, Spain, December (2012)
Filler, T., Fridrich, J.: Gibbs construction in steganography. IEEE Trans. Inf. Forensics and Security. 5(4), 705–720 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Choudhury, B., Das, R., Baruah, A. (2015). A Novel Steganalysis Method Based on Histogram Analysis. In: Sulaiman, H., Othman, M., Othman, M., Rahim, Y., Pee, N. (eds) Advanced Computer and Communication Engineering Technology. Lecture Notes in Electrical Engineering, vol 315. Springer, Cham. https://doi.org/10.1007/978-3-319-07674-4_73
Download citation
DOI: https://doi.org/10.1007/978-3-319-07674-4_73
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07673-7
Online ISBN: 978-3-319-07674-4
eBook Packages: EngineeringEngineering (R0)