Secret Key Estimation for Image Sequential Steganograph in Transform Domain

Trivedi et al. presented an effective LMP (locally most powerful) method (2005) to estimate the secret key for sequential steganography in mid- and high-frequency of DCT domain. In this paper, we proposed an improved LMP algorithm, which not only can reliably estimate the secret key for mid- and high-frequency sequential embedding, but also for the case of low-frequency. Moreover, the application of improved algorithm for DWT sequential steganography is discussed. Results of experiment show the performance of improved algorithm is desirable for low-, mid- and high-frequency steganography in DCT domain and in the subbands of DWT domain.

[1]  Fenlin Liu,et al.  An Improved Secret Key Estimation Method for Sequential Steganography , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[2]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[3]  Chengyun Yang,et al.  Effective steganalysis based on statistical moments of wavelet characteristic function , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[4]  Jessica J. Fridrich,et al.  Forensic steganalysis: determining the stego key in spatial domain steganography , 2005, IS&T/SPIE Electronic Imaging.

[5]  Rajarathnam Chandramouli,et al.  Secret key estimation in sequential steganography , 2005, IEEE Transactions on Signal Processing.

[6]  Rajarathnam Chandramouli,et al.  Locally most-powerful detector for secret key estimation in spread spectrum image steganography , 2004, IS&T/SPIE Electronic Imaging.

[7]  J. Caruso,et al.  Multielemental speciation analysis of fungi porcini (Boletus edulis) mushroom by size exclusion liquid chromatography with sequential on-line UV-ICP-MS detection. , 2004, Journal of agricultural and food chemistry.

[8]  Rajarathnam Chandramouli,et al.  Active steganalysis of sequential steganography , 2003, IS&T/SPIE Electronic Imaging.

[9]  Z. Qiu,et al.  A DWT-based color image steganography scheme , 2002, 6th International Conference on Signal Processing, 2002..

[10]  Mei-Juan Chen,et al.  Robust image watermark with wavelet transform and spread spectrum techniques , 2000, Conference Record of the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers (Cat. No.00CH37154).

[11]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[12]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[13]  R. F.,et al.  Mathematical Statistics , 1944, Nature.