Steganalysis of Palette Images: Attack Optimal Parity Assignment Algorithm

Steganography is the art of communicating a message by embedding it into multimedia data without drawing any suspicions. Optimal parity assignment (OPA) algorithm is one of palette image steganographic methods. But there is still no effective steganalytic method that can attack it reliably. In this paper, we present a statistical steganalysis for detecting the secret messages embedded by using OPA algorithm. Based on the analysis of RTS (replacement-transfer structure) of index replacement in GIF-based steganography, we explore the singular statistic of core elements in OPA stego-images via convergent continuous replacement (CCR) operation. On the other hand, we can estimate the statistic of cover image from stego-image by a special filtering operation. With the estimation of cover image statistic and the singular statistic of the stego-image, the length of secret messages embedded in GIF images with OPA algorithm can be estimated. The experimental results indicate that our algorithm can estimate the length of hidden messages accurately

[1]  Jiri Fridrich A New Steganographic Method for Palette-Based Images , 1999, PICS.

[2]  Niels Provos,et al.  Detecting Steganographic Content on the Internet , 2002, NDSS.

[3]  Hideki Noda,et al.  Luminance quasi-preserving color quantization for digital steganography to palette-based images , 2002, Object recognition supported by user interaction for service robots.

[4]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[5]  Jessica J. Fridrich,et al.  Higher-order statistical steganalysis of palette images , 2003, IS&T/SPIE Electronic Imaging.

[6]  Niimi Michiharu,et al.  Topological Ordered Color Table for BPCS Steganography Using Indexed Color Images , 2001 .

[7]  Jiri Fridrich,et al.  Secure Steganographic Methods for Palette Images , 1999, Information Hiding.

[8]  Michael Backes,et al.  Reliable broadcast in a computational hybrid model with Byzantine faults, crashes, and recoveries , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[9]  Sorina Dumitrescu,et al.  Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.

[10]  M Cannavo,et al.  Seeing the unseen. , 1993, Administrative radiology : AR.

[11]  Jiri Fridrich,et al.  Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).

[12]  Xingang You,et al.  A new steganographic method resisting statistical attack , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..

[13]  Andreas Westfeld Detecting Low Embedding Rates , 2002, Information Hiding.

[14]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[15]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[16]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.