Abstract
Steganographic modifications must not noticeably change characteristics of the cover data known to an attacker. However, it is a difficult task to define an appropriate set of features that should be preserved. This article investigates possibilities to maintain statistical properties while embedding information. As an example, the simple embedding function “overwriting the least significant bits” is discussed, w.r.t. greyscale images used as covers. Two modifications of this technique are presented here: The first modification avoids changes of first-order statistics and thereby overcomes possible attacks based on histogram analysis. The second modification tries to reduce noticeable modifications of second-order statistics and, thereby, of the structure of an image. The suggested modifications are tested on a set of images. Testing a possible attack and comparing these results to the results of the same attack on stego images created by the original method clarifies the improvements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ismail Avcibas, Nasir Memon, Bülent Sankur: Steganalysis of Watermarking Techniques using Image Quality Metrics. In: Ping Wah Wong, Edward J. Delp (Ed.): Security and Watermarking of Multimedia Contents III. Proceedings of SPIE Vol. 4314, 2001, 523–531. 287
Wilfried J. Dixon, Frank J. Massey: Introduction to Statistical Analysis. McGraw-Hill Book Company, Inc. New York, 1957. 284, 289
Hany Farid: Detecting Steganographic Messages in Digital Images. http://www.cs.dartmouth.edu/~farid/publications/tr01.html 287
Elke Franz, Andreas Pfitzmann: Steganography Secure Against Cover-Stego-Attacks. In Andreas Pfitzmann (Ed.): Information Hiding. Third International Workshop, IH’99, Dresden, Germany, September/October 1999, Proceedings, Springer, LNCS 1768, 2000, 29–46. 286
Jessica Fridrich, Rui Du, Meng Long: Steganalysis of LSB Encoding in Color Images. ICME 2000, New York City, July 31th-August 2nd, USA. http://www.ssie.binghampton.edu/fridrich/publications.html 287
Jessica Fridrich, Miroslav Goljan, Rui Du: Steganalysis Based on JPEG Compatibility. SPIE Multimedia Systems and Applications IV, Denver, CO, August 20-24, 2001. 292
Jessica Fridrich, Miroslav Goljan, Rui Du: Reliable Detection of LSB Steganography in Color and Grayscale Images. Proc. of the ACM Workshop on Multimedia and Security, Ottawa, CA, October 5, 2001, 27–30. 287, 292
Wilhelm Göhler: Höhere Mathematik: Formeln und Hinweise. Bearb. von Barbara Ralle, 10. überarb. Auflage, VEB Deutscher Verlag für Grundstoffindustrie, Leipzig, 1987. 288
Solomon W. Golomb, Robert E. Peile, Robert A. Scholtz: Basic Concepts in Information Theory and Coding. Plenum Press, New York, 1994. 279
Neil F. Johnson, Sushil Jajodia: Steganalysis of Images Created Using Current Steganography Software. In David Aucsmith (Ed.): Information Hiding. Second InternationalWorkshop, IH’98, Portland, Oregon, USA, April 1998, Proceedings, Springer, LNCS 1525, 1998, 273–289. 278
Stefan Katzenbeisser, Fabien A.P. Petitcolas (Ed.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, 2000. 287
Donald E. Knuth: The art of computer programming. Volume 2: Seminumerical algorithms. Addison-Wesley, 3rd Ed., 1998. 280
Maurice Maes: Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks. In David Aucsmith (Ed.): Information Hiding. Second International Workshop, IH’98, Portland, Oregon, USA, April 1998, Proceedings, Springer, LNCS 1525, 1998, 290–305. 287
A. Papoulis, Probability, Random Variables, and Stochastic Processes, 2nd ed. New York, McGraw-Hill, 1984. 280, 284
Niels Provos: Defending Against Statistical Steganalysis. 10th USENIX Security Symposium, August 2001. http://www.citi.umich.edu/u/provos/stego/ 279, 287
Maxwell T. Sandford, Jonathan N. Bradley, Theodore G. Handel: The data embedding method. In Proc. of the SPIE Photonics East Conference, Philadelphia, September 1995. 291
Peter Wayner: Mimic Functions. Technical Report, Cornell University, Department of Computer Science, 1990. 280
Andreas Westfeld, Andreas Pfitzmann: Attacks on Steganographic Systems. In Andreas Pfitzmann (Ed.): Information Hiding. Third International Workshop, IH’99, Dresden, Germany, September/October 1999, Proceedings, Springer, LNCS 1768, 2000, 61–76. 278, 279, 286, 287
Andreas Westfeld: F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis. In Ira S. Moscowitz (Ed.): Information Hiding. 4th International Workshop, IH’01, Pittsburgh, PA, USA, April 2001, Proceedings, Springer, LNCS 2137, 2001, 289–302. 279
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Franz, E. (2003). Steganography Preserving Statistical Properties. In: Petitcolas, F.A.P. (eds) Information Hiding. IH 2002. Lecture Notes in Computer Science, vol 2578. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36415-3_18
Download citation
DOI: https://doi.org/10.1007/3-540-36415-3_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00421-9
Online ISBN: 978-3-540-36415-3
eBook Packages: Springer Book Archive