Reliable steganalysis of HUGO steganography based on partially known plaintext

The image adaptive steganography represented by HUGO (Highly Undetectable steGO) has high anti-detection capabilities. The primary challenge for steganalyzers is how to reliably detect such steganography and extract the embedded message from stego. Although existing steganalysis algorithms based on parameter recognition of STCs (Syndrome-Trellis Codes) can reliably detect adaptive steganography when the embedded message is in plaintext, the steganalysis method is ineffective when the embedded message is in ciphertext. Therefore, a steganalysis algorithm based on partially known plaintext is proposed in this paper. The steganalysis algorithm targets situations wherein in order to facilitate the receiver’s extraction and storage of the embedded message, the file format name and message length may be transported without encryption when HUGO steganography is used to transport the encrypted file. First, the structural characteristics of the parity-check matrix were utilized to simplify the STCs decoding equation. Second, we calculated the submatrix by solving nonhomogeneous linear equations instead of exhausting submatrix, thus, parameter recognition efficiency was significantly improved. Finally, we verified the correctness of the submatrix and extracted the embedded message from stego images. The experimental results show that parameter recognition of STCs can be achieved using an ordinary PC within a short time. Therefore, the embedded message can be extracted when the partly embedded message is known.

[1]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[2]  Jessica J. Fridrich,et al.  Quantitative steganalysis using rich models , 2013, Electronic Imaging.

[3]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[4]  Jessica J. Fridrich,et al.  Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.

[5]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[6]  Jessica J. Fridrich,et al.  Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.

[7]  Jessica J. Fridrich,et al.  Breaking HUGO - The Process Discovery , 2011, Information Hiding.

[8]  Yun Q. Shi,et al.  Textural Features for Steganalysis , 2012, Information Hiding.

[9]  Bin Li,et al.  Steganalysis of a PVD-based content adaptive image steganography , 2013, Signal Process..

[10]  Jessica J. Fridrich,et al.  Steganalysis of JPEG images using rich models , 2012, Other Conferences.

[11]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[12]  Jessica J. Fridrich,et al.  Phase-aware projection model for steganalysis of JPEG images , 2015, Electronic Imaging.

[13]  Jessica J. Fridrich,et al.  Multivariate gaussian model for designing additive distortion for steganography , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[14]  Jessica J. Fridrich,et al.  Steganalysis Features for Content-Adaptive JPEG Steganography , 2016, IEEE Transactions on Information Forensics and Security.

[15]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[16]  Fatih Kurugollu,et al.  A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO) , 2011, Information Hiding.

[17]  Yun Q. Shi,et al.  An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[18]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[19]  Weiming Zhang,et al.  Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes , 2016, Multimedia Tools and Applications.

[20]  Xinpeng Zhang,et al.  Effective reversible data hiding in encrypted image with privacy protection for image content , 2015, J. Vis. Commun. Image Represent..

[21]  Yi Zhang,et al.  Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.