Steganography with Least Histogram Abnormality

A novel steganographic scheme is proposed which avoids asymmetry inherent in conventional LSB embedding techniques so that abnormality in the image histogram is kept minimum. The proposed technique is capable of resisting the χ 2 test and RS analysis, as well as a new steganalytic method named GPC analysis as introduced in this paper. In the described steganographic technique, a pair of mutually complementary mappings, F 1 and F − 1, is used, leading to a balanced behavior of several statistical parameters explored by several steganalytic schemes, thus improved security. Experimental results are presented to demonstrate the effectiveness of the method.

[1]  Mark Ettinger,et al.  Steganalysis and Game Equilibria , 1998, Information Hiding.

[2]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[3]  J. Fridrich,et al.  Attacking the OutGuess , 2002 .

[4]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[5]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[6]  Markus G. Kuhn,et al.  Information hiding-A survey : Identification and protection of multimedia information , 1999 .

[7]  Jiri Fridrich,et al.  Steganalysis of LSB encoding in color images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[8]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[9]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[10]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[11]  Zhang Xinpeng,et al.  Steganographic technique capable of withstanding RQP analysis , 2002 .

[12]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[13]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[14]  Miroslav Goljan,et al.  Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.

[15]  Niels Provos,et al.  Detecting Steganographic Content on the Internet , 2002, NDSS.

[16]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.