Semi Random Position Based Steganography for Resisting Statistical Steganalysis

Steganography is the branch of information hiding for secret communication. The simplest and widely used steganography is the LSB based approach due to its visual quality with high embedding capacity. However, LSB based steganography techniques are not secure against statistical steganalysis mainly χ2 attack and Regular Singular (RS) attack. These two staganalysis can easily estimate the hidden message length. This work propose a LSB based steganography technique where first a location is obtained randomly based on the bit pattern (except LSB) of a cover pixel using linear probing and embed a secret bit into LSB. This technique makes the stego-image completely secure against both χ2 attack and RS attack.

[1]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[2]  Der-Chyuan Lou,et al.  LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis , 2012, Inf. Sci..

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  P. Shah,et al.  Adaptive Wavelet Packet Based Audio Steganography using Data History , 2008, 2008 IEEE Region 10 and the Third international Conference on Industrial and Information Systems.

[5]  André R. S. Marçal,et al.  A Steganographic Method for Digital Images Robust to RS Steganalysis , 2005, ICIAR.

[6]  K. Jemili,et al.  Data hiding within audio signals , 1999, 4th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services. TELSIKS'99 (Cat. No.99EX365).

[7]  Bo Wang,et al.  A chaos-based steganography algorithm for H.264 standard video sequences , 2008, 2008 International Conference on Communications, Circuits and Systems.

[8]  Wen-Hsiang Tsai,et al.  A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.

[9]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[10]  Ajaz Hussain Mir,et al.  Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..

[11]  Chin-Chen Chang,et al.  A steganographic method for digital images using side match , 2004, Pattern Recognit. Lett..

[12]  S. Ramakrishnan,et al.  An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image , 2014, Int. J. Netw. Secur..

[13]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[14]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[15]  Hui Li,et al.  Reversible data hiding based on block median preservation , 2011, Inf. Sci..

[16]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[17]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[18]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[19]  Mohammad Hassan Shirali-Shahreza,et al.  A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).

[20]  A.A. Hanafy,et al.  A secure covert communication model based on video steganography , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[21]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .