A Comparative Review of Steganalysis Techniques

While Cryptography is the science of secure communication, Steganography is the art of covert communication. Steganography has a long history, but modern steganography uses digital carriers such as electronic text, disk space, network packets, digital audio and images to hide secrets. Steganalysis, the countermeasure to steganography, is designed to detect and analyse the hidden data disseminated using steganography. This paper reviews and compares three steganalysis techniques: the Histogram Characteristic Function (HCF) technique, the Regular-Singular analysis (RS) technique, and Raw Quick Pair (RQP) technique. The paper analyses the performance, characteristics, and limitations of these three techniques, supported by empirical evidence.

[1]  Jessica J. Fridrich,et al.  Distortion-Free Data Embedding for Images , 2001, Information Hiding.

[2]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[3]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[4]  Huayong Ge,et al.  Steganography and steganalysis based on digital image , 2011, 2011 4th International Congress on Image and Signal Processing.

[5]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[6]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[7]  Andrew D. Ker Resampling and the detection of LSB matching in color bitmaps , 2005, IS&T/SPIE Electronic Imaging.

[8]  Ajaz Hussain Mir,et al.  Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..

[9]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[10]  Jiri Fridrich,et al.  Steganalysis of LSB encoding in color images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[11]  K. W. Cattermole The Fourier Transform and its Applications , 1965 .

[12]  Sushil Jajodia,et al.  Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).