Skip to main content

Image Steganography and Steganalysis: Concepts and Practice

  • Conference paper
Digital Watermarking (IWDW 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2939))

Included in the following conference series:

Abstract

In the last few years, we have seen many new and powerful steganography and steganalysis techniques reported in the literature. In the following paper we go over some general concepts and ideas that apply to steganography and steganalysis. Specifically we establish a framework and define notion of security for a steganographic system. We show how conventional definitions do not really adequately cover image steganography and an provide alternate definition. We also review some of the more recent image steganography and steganalysis techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Simmons, G.: The prisoners problem and the subliminal channel. In: CRYPTO, pp. 51–67 (1983)

    Google Scholar 

  2. Johnson, N.F., Katzenbeisser, S.: A survay of steganographic techniques. In: Katzenbeisser, S., Petitcolas, F. (eds.) Information Hiding, pp. 43–78. Artech House, Norwood (2000)

    Google Scholar 

  3. Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  4. Zollner, J., Federrath, H., Klimant, H., Pfitzman, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In: 2nd Information Hiding Workshop, April 1998, pp. 345–355 (1998)

    Google Scholar 

  5. Chandramouli, R., Memon, N.: Steganography capacity: A steganalysis perspective. To appear in SPIE Security and Watermarking of Multimedia Contents V, vol. 5020 (2003)

    Google Scholar 

  6. Fridrich, J., Goljan, M., Hogea, D., Soukal, D.: Quantitive steganalysis of digital images: Estimating the secret message lenght. ACM Multimedia Systems Journal, Special issue on Multimedia Security (2003)

    Google Scholar 

  7. Chandramouli, R., Memon, N.: Analysis of lsb image steganography techniques. In: IEEE Intnl. Conf. on Image Processing, vol. 3, pp. 1019–1022 (2001)

    Google Scholar 

  8. Chandramouli, R., Memon, N.: On sequential watermark detection. IEEE Transactions on Signal Processing 51(4), 1034–1044 (2003)

    Article  MathSciNet  Google Scholar 

  9. Collin, F.: Encryptpic, http://www.winsite.com/bin/Info?500000033023

  10. Pulcini, G.: Stegotif, http://www.geocities.com/SiliconValley/9210/gfree.html

  11. Sharp, T.: Hide 2.1 (2001), http://www.sharpthoughts.org

  12. Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  13. Dumitrescu, S., Wu, X., Memon, N.: On steganalysis of random lsb embedding in continuous-tone images. In: IEEE International Conference on Image Processing, ROchester, New York (September 2002)

    Google Scholar 

  14. Fridrich, J., Goljan, M., Du, R.: Detecting lsb steganography in color and grayscale images. IEEE Multimedia Special Issue on Security, 22–28 (October-November 2001)

    Google Scholar 

  15. Fridrich, J., Du, R., Meng, L.: Steganalysis of lsb encoding in color images. In ICME 2000, New York, NY, USA (2000)

    Google Scholar 

  16. Westfeld, A.: Detecting low embedding rates. In: 5th International Workshop on Information Hiding, pp. 324–339 (2002)

    Google Scholar 

  17. Machado, R.: Ezstego (2001), http://www.stego.com

  18. Kwan, M.: Gifshuffle, http://www.darkside.com.au/gifshuffle/

  19. Moroney, C.: Hide and seek, http://www.rugeley.demon.co.uk/security/hdsk50.zip

  20. Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 32–47. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  21. Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium (2001)

    Google Scholar 

  22. Upham, D.: Jpeg-jsteg, ftp://ftp.funet.fi/pub/crypt/steganography/jpeg-jstegv4.diff.gz

  23. Westfeld, A.: F5—a steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  24. Avcibas, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. In: Security and Watermarking of Multimedia Contents, San Jose, Ca. (February 2001)

    Google Scholar 

  25. Avcibas, I., Memon, N., Sankur, B.: Image steganalysis with binary similarity measures. In: IEEE International Conference on Image Processing, ROchester, New York (September 2002)

    Google Scholar 

  26. Avcibas, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. IEEE transactions on Image Processing (January 2003)

    Google Scholar 

  27. Farid, H., Lyu, S.: Detecting hidden messages using higher-order statistics and support vector machines. In: 5th International Workshop on Information Hiding (2002)

    Google Scholar 

  28. Duda, R., Hart, P.: Pattern classification and scene analysis. John Wiley and Sons, Chichester (1973)

    MATH  Google Scholar 

  29. Burges, C.: A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery 2, 121–167 (1998)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chandramouli, R., Kharrazi, M., Memon, N. (2004). Image Steganography and Steganalysis: Concepts and Practice. In: Kalker, T., Cox, I., Ro, Y.M. (eds) Digital Watermarking. IWDW 2003. Lecture Notes in Computer Science, vol 2939. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24624-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24624-4_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-21061-0

  • Online ISBN: 978-3-540-24624-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics