Steganalysis of least significant bit matching using multi-order differences

This paper presents a learning-based steganalysis/detection method to attack spatial domain least significant bit LSB matching steganography in grayscale images, which is the antetype of many sophisticated steganographic methods. We model the message embedded by LSB matching as the independent noise to the image, and theoretically prove that LSB matching smoothes the histogram of multi-order differences. Because of the dependency among neighboring pixels, histogram of low order differences can be approximated by Laplace distribution. The smoothness caused by LSB matching is especially apparent at the peak of the histogram. Consequently, the low order differences of image pixels are calculated. The co-occurrence matrix is utilized to model the differences with the small absolute value in order to extract features. Finally, support vector machine classifiers are trained with the features so as to identify a test image either an original or a stego image. The proposed method is evaluated by LSB matching and its improved version "Hugo". In addition, the proposed method is compared with state-of-the-art steganalytic methods. The experimental results demonstrate the reliability of the new detector. Copyright © 2013 John Wiley & Sons, Ltd.

[1]  Jun Zhang,et al.  Detection of LSB Matching Steganography using the Envelope of Histogram , 2009, J. Comput..

[2]  Bin Li,et al.  Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels , 2007, 2007 IEEE International Conference on Image Processing.

[3]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[4]  Tieyong Zeng,et al.  Reliable histogram features for detecting LSB matching , 2010, 2010 IEEE International Conference on Image Processing.

[5]  Ingemar J. Cox,et al.  Detection of ±1 LSB steganography based on the amplitude of histogram local extrema , 2008, 2008 15th IEEE International Conference on Image Processing.

[6]  Qingzhong Liu,et al.  Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images , 2008, Pattern Recognit..

[7]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[8]  Jessica J. Fridrich,et al.  Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain , 2005, IS&T/SPIE Electronic Imaging.

[9]  E. Delp,et al.  Security, steganography, and watermarking of multimedia contents , 2004 .

[10]  Tao Zhang,et al.  Steganalysis of LSB matching based on statistical modeling of pixel difference distributions , 2010, Inf. Sci..

[11]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[12]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[13]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[14]  Gang Xiong,et al.  Image textural features for steganalysis of spatial domain steganography , 2012, J. Electronic Imaging.

[15]  Fenlin Liu,et al.  A review on blind detection for image steganography , 2008, Signal Process..

[16]  Christopher J. C. Burges,et al.  A Tutorial on Support Vector Machines for Pattern Recognition , 1998, Data Mining and Knowledge Discovery.

[17]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[18]  Noboru Babaguchi,et al.  Run length based steganalysis for LSB matching steganography , 2008, 2008 IEEE International Conference on Multimedia and Expo.

[19]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[20]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[21]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[22]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.