A hierarchical protocol for increasing the stealthiness of steganographic methods

We present a new protocol that works in conjunction with information hiding algorithms to systematically improve their stealthiness. Our protocol is designed to work with many digital object types including natural language text, software, images, audio, or streaming data. It utilizes a tree-structured hierarchical view of the cover object and determines regions where changes to the object for embedding message data would be easily revealed by an attacker, and are thus to be avoided by the embedding process.The protocol requires the existence of a heuristic detectability metric which can be calculated over any region of the cover object and whose value correlates with the likelihood that a steganalysis algorithm would classify that region as one with embedded information. By judiciously spreading the effects of message-embedding over the whole object, the proposed protocol keeps the detectability of the cover object within allowable values at both fine and coarse scales of granularity. Our protocol provides a way to monitor and to control the effect of each operation on the object during message embedding.

[1]  Steven H. Low,et al.  Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.

[2]  Hannes Federrath,et al.  Modeling the Security of Steganographic Systems , 1998, Information Hiding.

[3]  Jessica J. Fridrich,et al.  Higher-order statistical steganalysis of palette images , 2003, IS&T/SPIE Electronic Imaging.

[4]  Radu Sion,et al.  Natural Language Watermarking and Tamperproofing , 2002, Information Hiding.

[5]  Edward J. Delp,et al.  The Watermark Evaluation Testbed (WET) , 2004, IS&T/SPIE Electronic Imaging.

[6]  Elke Franz Steganography Preserving Statistical Properties , 2002, Information Hiding.

[7]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[8]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[9]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[10]  Hany Farid,et al.  Detecting Steganographic Messages in Digital Images , 2001 .

[11]  Jessica J. Fridrich,et al.  New methodology for breaking steganographic techniques for JPEGs , 2003, IS&T/SPIE Electronic Imaging.

[12]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[13]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[14]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[15]  Jessica J. Fridrich,et al.  Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.

[16]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[17]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[18]  Neri Merhav,et al.  An Image Watermarking Scheme Based on Information Theoretic Principles , 2001 .

[19]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[20]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.