Improved LSB-matching Steganography for Preserving Second-order Statistics

In the paper, for enhancing the security of the traditional LSB matching, two improved LSB-matching methods are proposed. In the steganograhical procedure, the Markov chain distance based on the second-order statistics is chosen as the security metric to control the modification directions of ±1 embedding. The first method is based on stochastic modification, which directly determines the modification directions by the empirical Markov transition matrix of a cover image and the pseudorandom number generated by a pseudorandom number generator. The second one is based on genetic algorithm, which is used to find the optimum matching vector to make the security metric as small as possible. Experiments show the proposed algorithms outperform LSB matching and LSB replacement in a sense of the firstorder and second-order security metrics. And the adjacent calibrated COM-HCF steganalytical tests also show that the two algorithms are more secure than the traditional ones.

[1]  Yunkai Gao,et al.  Detecting LSB matching by characterizing the amplitude of histogram , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[2]  Sorina Dumitrescu,et al.  Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.

[3]  Xinpeng Zhang,et al.  Steganography with Least Histogram Abnormality , 2003, MMM-ACNS.

[4]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[5]  Ingemar J. Cox,et al.  Detection of ±1 LSB steganography based on the amplitude of histogram local extrema , 2008, 2008 15th IEEE International Conference on Image Processing.

[6]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[7]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[8]  Sorina Dumitrescu,et al.  An efficient high payload ±1 data embedding scheme , 2011, Multimedia Tools and Applications.

[9]  John H. Holland,et al.  Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .

[10]  Yan Zhang,et al.  Handbook of Research on Secure Multimedia Distribution , 2009 .

[11]  Tieyong Zeng,et al.  Detecting LSB matching by applying calibration technique for difference image , 2008, MM&Sec '08.

[12]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[13]  Jessica J. Fridrich,et al.  Grid Colorings in Steganography , 2007, IEEE Transactions on Information Theory.

[14]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[15]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[16]  Weiming Zhang,et al.  Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes , 2008, Information Hiding.

[17]  B. S. Manjunath,et al.  Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.

[18]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[19]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[20]  Xiaolong Li,et al.  A ±1-Based Steganography by Minimizing the Distortion of First Order Statistics , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[21]  Ingemar J. Cox,et al.  Steganalysis for LSB Matching in Images with High-frequency Noise , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.

[22]  Yuewei Dai,et al.  Image Steganography Based on Quantization-Embedders Combination , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[23]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.