Steganalysis of Pixel-Value Differencing Steganographic Method

In this paper a steganalysis method is presented for a steganographic routine. The steganography is based on pixel value differencing, PVD, and no attacked has been offered for it yet. By modification of an existing method, that uses chi2 measure, the PVD steganography was successfully and accurately attacked.

[1]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[2]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[3]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[4]  Frank Bossen,et al.  Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.

[5]  M. Hwang,et al.  Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .

[6]  Sorina Dumitrescu,et al.  Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..

[7]  Tao Zhang,et al.  A new approach to reliable detection of LSB steganography in natural images , 2003, Signal Process..

[8]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[9]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[10]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[11]  Gerhard C. Langelaar,et al.  Copy Protection for Multimedia Data based on Labeling Techniques , 1998 .

[12]  Xiang-Gen Xia,et al.  A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.

[13]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[14]  Jean-François Delaigle,et al.  Low cost spatial watermarking , 1998, Comput. Graph..

[15]  Xinpeng Zhang,et al.  Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..

[16]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.