A New Steganography Based on chi2 Technic

In this paper, we proposed a new method for Steganography based on deceiving Χ 2 algorithm. Since the cover image coefficients and stego image coefficients histograms have sensible difference for purposes of statistical properties, statistical analysis of Χ 2-test reveals the existence of hidden messages inside stego image .We are introducing the idea for hiding messages in the cover image. It causes that DCT (Discrete Cosine Transforms) coefficient histogram not having remarkable modification before and after embedding message. As a result, the identifying of hidden message inside an image is impossible for an eavesdropper through Χ 2-test. In fact, the proposed method increases the Steganography security against Χ 2-test, but the capacity of embedding messages decreases to half.

[1]  Stefan Katzenbeisser,et al.  Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.

[2]  Qingzhong Liu,et al.  Image complexity and feature mining for steganalysis of least significant bit matching steganography , 2008, Inf. Sci..

[3]  J C Judge,et al.  Steganography: Past, Present, Future , 2001 .

[4]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[5]  John McHugh,et al.  A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.

[6]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[7]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[8]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1991, CACM.

[9]  Gerhard Goos,et al.  Fast Software Encryption , 2001, Lecture Notes in Computer Science.

[10]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[11]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[12]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[13]  Niels Provos,et al.  Detecting Steganographic Content on the Internet , 2002, NDSS.

[14]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[15]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[16]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[17]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[18]  Tao Zhang,et al.  A fast and effective steganalytic technique against JSteg-like algorithms , 2003, SAC '03.

[19]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.