Abstract
At present, research on steganalysis is mainly focused on the existence detection of hidden messages. However, the extraction of hidden messages, i.e., extraction attacks, also plays a decisive role in tasks such as obtaining evidence of covert communication and fighting against criminal activities. For steganography using a stego key, the purpose of an extraction attack is to recover the stego key. This paper mainly studies methods of recovering the stego key for least significant bit (LSB) steganography in the JPEG domain. Firstly, based on the differences in the statistical properties of the discrete cosine transform (DCT) coefficients between the paths generated by the correct and incorrect keys, a stego key recovery model based on the optimal hypothesis test is proposed. Moreover, formulas are given for calculating the desired sample size and threshold in the proposed stego key recovery model. Secondly, based on the difference in the distributions of odd and even coefficients between the correct and incorrect paths, a method of recovering the stego key for OutGuess steganography using this model is proposed. Finally, based on the difference in the distributions of zero and non-zero coefficients between the correct and incorrect paths, a method of recovering the stego key for F5 steganography (modified version) using this model is proposed. Experimental results for OutGuess 0.13b, OutGuess 0.2 and modified F5 steganography show that the proposed method can successfully recover the stego key and that its performance is superior to that of existing methods.
Similar content being viewed by others
Notes
This list includes 146 steganography programs, 85 of which are based on digital images; the other 61 programs are based on audio files, text files and so on (http://www.jjtc.com/Steganography/toolmatrix.htm).
References
Chen JY, Liu JF, Zhang WM et al (2013) Cryptographic secrecy analysis of matrix embedding. International Journal of Computational Intelligence Systems 6(4):639–647
Filler T, Pevny T, Bas P (2010) BOSS (Break Our Steganography System). http://www.agents.cz/boss
Fridrich J, Goljan M, Hogea D et al (2003) Quantitative steganalysis of digital images: estimating the secret message length. Multimedia Systems 9(3):288–302
Fridrich J, Goljan M, Soukal D (2004) Searching for the stego-key. In: Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, pp 70–82
Fridrich J, Goljan M, Soukal D, et al (2005) Forensic steganalysis: determining the stego key in spatial domain steganography. In: Proceedings of SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, pp 631–642
Guo L, Ni J, Shi YQ (2014) Uniform embedding for efficient JPEG steganography. IEEE Transactions on Information Forensics and Security 9(5):814–825
Holub V, Fridrich J (2013) Digital image steganography using universal distortion. Proceedings of the first ACM workshop on Information hiding and multimedia security. ACM, pp 59–68
Lehmann EL, Romano JP (2006) Testing statistical hypotheses. Springer Science & Business Media
Liu J, Tang GM (2012) Stego key estimation in LSB steganography. J Multimed 7(4):309–313
Liu JF, Chen JY, Zhang WM, et al (2010) Cryptographic secrecy analysis of matrix embedding. In: Proceedings of IEEE International Conference on Multimedia Information Networking and Security, Nanjing, pp 691–695
Liu JF, Tian YG, Han T et al (2016) Stego key searching for LSB steganography on JPEG decompressed image. SCIENCE CHINA Inf Sci 59(3):1–15
Pevný T, Ker AD (2014) Steganographic key leakage through payload metadata. In: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security. ACM, pp 109–114
Provos N (2001) Defending against statistical steganalysis. In: Proceedings of the 10th conference on USENIX Security Symposium-Volume 10. USENIX Association, pp 24–24
Sallee P (2003) Model-based steganography. In: Proceedings of International workshop on digital watermarking. Springer Berlin Heidelberg, pp 154–167
Solanki K, Sarkar A, Manjunath B S (2007) YASS: yet another steganographic scheme that resists blind steganalysis. In: Proceedings of the 9th international conference on information hiding. Springer-Verlag, pp 16–31
University of Granada, Computer Vision Group (2012) CVG-UGR image database. http://decsai.ugr.es/cvg/dbimagenes/
Upham D (2008) JPEG-JSteg-V4, http://www.funet.fi/pub/crypt/steganography/jpeg-jsteg-v4.diff.gz
Westfeld A (2001) F5-A Steganographic Algorithm. In: Proceedings of the 4th International Workshop on Information Hiding. Springer-Verlag, pp 289–302
Ziou D, Jafari R (2014) Efficient steganalysis of images: learning is good for anticipation. Pattern Anal Applic 17(2):279–289
Acknowledgements
This work was supported by the National Natural Science Foundation of China (No. 61379151, 61572052 and U1636219).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Xu, C., Liu, J., Gan, J. et al. Stego key recovery based on the optimal hypothesis test. Multimed Tools Appl 77, 17973–17992 (2018). https://doi.org/10.1007/s11042-017-4878-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4878-4