Efficient stego key recovery based on distribution differences of extracting message bits

The extraction of embedded messages, i.e., extraction attacks are the ultimate purpose of steganalysis, with great practical significance to obtain covert communication content and covert communication forensics. For steganography using a stego key, the extraction attacks are equivalent to the stego key recovery. This paper mainly studies the methods of efficient stego key recovery for LSB steganography in JPEG domain. According to the distribution differences of extracting message bits generated by the correct and incorrect keys, stego key recovery is transformed into the hypothesis test of the message bits distribution extracted by the correct and incorrect keys. Firstly, by fitting the message bits distribution extracted by the correct key, a stego key recovery method based on nonparametric hypothesis test is proposed. Secondly, by utilizing the distribution differences between message bits extracted by the correct and incorrect keys, a stego key recovery method based on parametric hypothesis test is proposed. And then, formulas are given for calculating the sample size and threshold in the proposed stego key recovery model, on the basis of type I error and type II error. Experimental results show that the proposed method can successfully recover the stego key of OutGuess 0.13b, OutGuess0.2, JPEG domain random LSB matching steganography and random F3 steganography, the performance is superior to that of existing methods.

[1]  Liu Jiu-fen,et al.  Chosen-key extracting attack to random LSB steganography , 2010 .

[2]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[3]  E. Lehmann Testing Statistical Hypotheses , 1960 .

[4]  Chin-Chen Chang,et al.  A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting , 2014, IEEE Transactions on Image Processing.

[5]  Weiming Zhang,et al.  On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..

[6]  Weiming Zhang,et al.  Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes , 2016, Multimedia Tools and Applications.

[7]  Dimitrios Hatzinakos,et al.  Watermark detection for noisy interpolated images , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.

[8]  Tomás Pevný,et al.  Steganographic key leakage through payload metadata , 2014, IH&MMSec '14.

[9]  Tao Han,et al.  Stego key searching for LSB steganography on JPEG decompressed image , 2015, Science China Information Sciences.

[10]  Xinfeng Zhang,et al.  Joint Feature and Texture Coding: Toward Smart Video Representation via Front-End Intelligence , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[11]  Xiangyu Li,et al.  Transmission frequency-band hidden technology in physical layer security , 2015, Science China Information Sciences.

[12]  Xiangyang Luo,et al.  Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[13]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[14]  Xinpeng Zhang,et al.  Hybrid distortion function for JPEG steganography , 2016, J. Electronic Imaging.

[15]  Fenlin Liu,et al.  Reliable steganalysis of HUGO steganography based on partially known plaintext , 2017, Multimedia Tools and Applications.

[16]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[17]  Jessica J. Fridrich,et al.  Forensic steganalysis: determining the stego key in spatial domain steganography , 2005, IS&T/SPIE Electronic Imaging.

[18]  Jessica J. Fridrich,et al.  Model Based Steganography with Precover , 2017, Media Watermarking, Security, and Forensics.

[19]  Jessica J. Fridrich,et al.  Searching for the stego-key , 2004, IS&T/SPIE Electronic Imaging.

[20]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[21]  Chin-Chen Chang,et al.  An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism , 2013, IEEE Transactions on Circuits and Systems for Video Technology.

[22]  Xiangyang Luo,et al.  Stego key recovery based on the optimal hypothesis test , 2017, Multimedia Tools and Applications.

[23]  Shaocheng Tong,et al.  Adaptive neural network tracking design for a class of uncertain nonlinear discrete-time systems with dead-zone , 2012, Science China Information Sciences.

[24]  Jing Liu,et al.  Stego Key Estimation in LSB Steganography , 2012, J. Multim..