Skip to main content
Log in

Stego key recovery based on the optimal hypothesis test

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

At present, research on steganalysis is mainly focused on the existence detection of hidden messages. However, the extraction of hidden messages, i.e., extraction attacks, also plays a decisive role in tasks such as obtaining evidence of covert communication and fighting against criminal activities. For steganography using a stego key, the purpose of an extraction attack is to recover the stego key. This paper mainly studies methods of recovering the stego key for least significant bit (LSB) steganography in the JPEG domain. Firstly, based on the differences in the statistical properties of the discrete cosine transform (DCT) coefficients between the paths generated by the correct and incorrect keys, a stego key recovery model based on the optimal hypothesis test is proposed. Moreover, formulas are given for calculating the desired sample size and threshold in the proposed stego key recovery model. Secondly, based on the difference in the distributions of odd and even coefficients between the correct and incorrect paths, a method of recovering the stego key for OutGuess steganography using this model is proposed. Finally, based on the difference in the distributions of zero and non-zero coefficients between the correct and incorrect paths, a method of recovering the stego key for F5 steganography (modified version) using this model is proposed. Experimental results for OutGuess 0.13b, OutGuess 0.2 and modified F5 steganography show that the proposed method can successfully recover the stego key and that its performance is superior to that of existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Notes

  1. This list includes 146 steganography programs, 85 of which are based on digital images; the other 61 programs are based on audio files, text files and so on (http://www.jjtc.com/Steganography/toolmatrix.htm).

References

  1. Chen JY, Liu JF, Zhang WM et al (2013) Cryptographic secrecy analysis of matrix embedding. International Journal of Computational Intelligence Systems 6(4):639–647

    Article  Google Scholar 

  2. Filler T, Pevny T, Bas P (2010) BOSS (Break Our Steganography System). http://www.agents.cz/boss

  3. Fridrich J, Goljan M, Hogea D et al (2003) Quantitative steganalysis of digital images: estimating the secret message length. Multimedia Systems 9(3):288–302

    Article  MATH  Google Scholar 

  4. Fridrich J, Goljan M, Soukal D (2004) Searching for the stego-key. In: Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, pp 70–82

  5. Fridrich J, Goljan M, Soukal D, et al (2005) Forensic steganalysis: determining the stego key in spatial domain steganography. In: Proceedings of SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, pp 631–642

  6. Guo L, Ni J, Shi YQ (2014) Uniform embedding for efficient JPEG steganography. IEEE Transactions on Information Forensics and Security 9(5):814–825

    Article  Google Scholar 

  7. Holub V, Fridrich J (2013) Digital image steganography using universal distortion. Proceedings of the first ACM workshop on Information hiding and multimedia security. ACM, pp 59–68

  8. Lehmann EL, Romano JP (2006) Testing statistical hypotheses. Springer Science & Business Media

  9. Liu J, Tang GM (2012) Stego key estimation in LSB steganography. J Multimed 7(4):309–313

    Google Scholar 

  10. Liu JF, Chen JY, Zhang WM, et al (2010) Cryptographic secrecy analysis of matrix embedding. In: Proceedings of IEEE International Conference on Multimedia Information Networking and Security, Nanjing, pp 691–695

  11. Liu JF, Tian YG, Han T et al (2016) Stego key searching for LSB steganography on JPEG decompressed image. SCIENCE CHINA Inf Sci 59(3):1–15

    Article  Google Scholar 

  12. Pevný T, Ker AD (2014) Steganographic key leakage through payload metadata. In: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security. ACM, pp 109–114

  13. Provos N (2001) Defending against statistical steganalysis. In: Proceedings of the 10th conference on USENIX Security Symposium-Volume 10. USENIX Association, pp 24–24

  14. Sallee P (2003) Model-based steganography. In: Proceedings of International workshop on digital watermarking. Springer Berlin Heidelberg, pp 154–167

  15. Solanki K, Sarkar A, Manjunath B S (2007) YASS: yet another steganographic scheme that resists blind steganalysis. In: Proceedings of the 9th international conference on information hiding. Springer-Verlag, pp 16–31

  16. University of Granada, Computer Vision Group (2012) CVG-UGR image database. http://decsai.ugr.es/cvg/dbimagenes/

  17. Upham D (2008) JPEG-JSteg-V4, http://www.funet.fi/pub/crypt/steganography/jpeg-jsteg-v4.diff.gz

  18. Westfeld A (2001) F5-A Steganographic Algorithm. In: Proceedings of the 4th International Workshop on Information Hiding. Springer-Verlag, pp 289–302

  19. Ziou D, Jafari R (2014) Efficient steganalysis of images: learning is good for anticipation. Pattern Anal Applic 17(2):279–289

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (No. 61379151, 61572052 and U1636219).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Che Xu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, C., Liu, J., Gan, J. et al. Stego key recovery based on the optimal hypothesis test. Multimed Tools Appl 77, 17973–17992 (2018). https://doi.org/10.1007/s11042-017-4878-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4878-4

Keywords

Navigation