Skip to main content

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 4499))

Abstract

The LTSB (Least Two Significant Bit) planes steganalytic technique is discussed, and a detection method based on the Quartic Equation is presented. This method firstly constructs a finite-state machine including 16 kinds of state based on image pixel sample pairs, and then builds a quartic equation according to the states conversion relations, finally gains the estimated value by solving this equation. To enhance the precision of the estimate algorithm, an improved hypothesis is proposed, and a more robust quartic equation is constructed. Experiment results show that this approach can estimate the LTSB embedding ratio quite reliably.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Westfeld, A.: Detecting low embedding rates. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 324–339. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Fridrich, J., Goljan, M.: Practical steganalysis of Digital Images – State of the Art. In: Proc. Security and Watermarking of Multimedia Contents IV. Proc. of SPIE, vol. 4675, pp. 1–13 (2002)

    Google Scholar 

  3. Fridrich, J., Du, R., Meng, L.: Steganalysis of LSB Encoding in Color Images. In: Proc. IEEE International Conference on Multimedia and Expo, vol. 3, New York, pp. 1279–1282 (2000)

    Google Scholar 

  4. Gonzalez, R.C., Wintz, P.: Digital Image Processing. Addison-Wesley, Reading (1997)

    Google Scholar 

  5. Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB Steganography via Sample Pair Analysis. IEEE Transactions on Signal Processing 51(7), 1995–2007 (2003)

    Article  Google Scholar 

  6. Avcibas, I.: Steganalysis Using Image Quality Metrics. IEEE Transactions on Image Processing 12(2), 221–229 (2003)

    Article  MathSciNet  Google Scholar 

  7. Ker, A.D.: Improved Detection of LSB Steganography in Grayscale Images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 97–115. Springer, Heidelberg (2004)

    Google Scholar 

  8. Ker, A.D.: Quantitive evaluation of pairs and RS steganalysis. In: Proc. Security, Steganography, and Watermarking of Multimedia Contents VI. Proc. of SPIE, vol. 5306, pp. 83–97 (2004)

    Google Scholar 

  9. Lu, P., Luo, X., Tang, Q., et al.: An Improved Sample Pairs Method for Detection of LSB Embedding. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 116–128. Springer, Heidelberg (2004)

    Google Scholar 

  10. Luo, X., Liu, B., Liu, F.: Improved RS Method for Detection of LSB Steganography. In: Gervasi, O., et al. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 508–516. Springer, Heidelberg (2005)

    Google Scholar 

  11. CBIR Image Database. University ofWashington (1997), http://www.CS.washington.edu/research/imagedatabase/groundtruth/

  12. Böhme, R.: Assessment of Steganalytic Methods Using Multiple Regression Models. In: Barni, M., et al. (eds.) IH 2005. LNCS, vol. 3727, pp. 278–295. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yun Q. Shi

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this chapter

Cite this chapter

Luo, X., Yang, C., Wang, D., Liu, F. (2007). LTSB Steganalysis Based on Quartic Equation. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security II. Lecture Notes in Computer Science, vol 4499. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73092-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73092-7_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73091-0

  • Online ISBN: 978-3-540-73092-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics