Skip to main content

A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO)

  • Conference paper
Information Hiding (IH 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6958))

Included in the following conference series:

Abstract

This paper presents a new methodology for the steganalysis of digital images. In principle, the proposed method is applicable to any kind of steganography at any domain. Special interest is put on the steganalysis of Highly Undetectable Steganography (HUGO). The proposed method first extracts features via applying a function to the image, constructing the k variate probability density function (PDF) estimates, and downsampling it by a suitable downsampling algorithm. The extracted feature vectors are then further optimized in order to increase the detection performance and reduce the computational time. Finally using a supervised classification algorithm such as SVM, steganalysis is performed. The proposed method is capable of detecting BOSSRank image set with an accuracy of 85%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications, 1st edn. Cambridge University Press, Cambridge (2009)

    Book  MATH  Google Scholar 

  2. Fridrich, J., Holotyak, T., Voloshynovskiy, S.: Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. In: Proc. of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Salzburg, Austria, September 19-21 (2005)

    Google Scholar 

  3. Fridrich, J., Goljan, M.: Practical Steganalysis-State of the Art. In: Proc. SPIE Photonics West Electronic Imaging Security and Watermarking of Multimedia Contents, San Jose, California, vol. 4675, pp. 1–13 (January 2002)

    Google Scholar 

  4. Fridrich, J., Goljan, M., Du, R.: Detecting LSB Steganography in Color and Gray-Scale Images. IEEE Multimedia 8(4), 22–28 (2001)

    Article  Google Scholar 

  5. Gul, G., Kurugollu, F.: SVD-Based Universal Spatial Domain Image Steganalysis. IEEE Transactions on Information Forensics and Security 5(2), 349–353 (2010)

    Article  Google Scholar 

  6. Pevny, T., Bas, P., Fridrich, J.: Steganalysis by Subtractive Pixel Adjacency Matrix. IEEE Transaction on Information Forensics and Security 5(2), 215–224 (2010)

    Article  Google Scholar 

  7. Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  8. Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  9. Gul, G., Avcibas, I.: Source Cell Phone Camera Identification Based on Singular Value Decomposition. In: First IEEE International Workshop on Information Forensics and Security, pp. 171–175 (December 2009)

    Google Scholar 

  10. Pudil, P., Novovicova, J., Kittler, J.: Floating Search Methods in Feature Selection. Pattern Recognition Letters 15(2), 1119–1125 (1994)

    Article  Google Scholar 

  11. Gul, G., Dirik, A.E., Avcibas, I.: Steganalytic Features for JPEG Compression-Based Perturbed Quantization. IEEE Signal Processing Letters 14(3), 204–208 (2007)

    Article  Google Scholar 

  12. http://boss.gipsa-lab.grenoble-inp.fr/ (accessed Januray 31, 2011)

  13. http://www.csie.ntu.edu.tw/~cjlin/libsvm/ (accessed Januray 31, 2011)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gul, G., Kurugollu, F. (2011). A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO). In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds) Information Hiding. IH 2011. Lecture Notes in Computer Science, vol 6958. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24178-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24178-9_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24177-2

  • Online ISBN: 978-3-642-24178-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics