Skip to main content

A Cover Image Model For Reliable Steganalysis

  • Conference paper
Information Hiding (IH 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6958))

Included in the following conference series:

Abstract

This paper investigates reliable steganalysis of natural cover images using a local non-linear parametric model. In the framework of hypothesis testing theory, the use of the model permits to warrant predictable results under false alarm constraint.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bruni, C., De Santi, A., Koch, G., Sinisgalli, C.: Identification of discontinuities in blurred noisy signals. IEEE Trans. on Circuit and systems-I 44(5), 422–433 (1997)

    Article  MATH  Google Scholar 

  2. Böhme, R.: Advanced Statistical Steganalysis, 1st edn. Springer Publishing Company, Incorporated, Heidelberg (2010)

    Book  MATH  Google Scholar 

  3. Böhme, R.: Assessment of Steganalytic Methods Using Multiple Regression Models. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 278–295. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. BOSS Contest: Break Our Steganographic System (2010), http://boss.gipsa-lab.grenoble-inp.fr

  5. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann, San Francisco (2007)

    Google Scholar 

  6. Dabeer, O., Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.: Detection of hiding in the least significant bit. IEEE Transactions on Signal Processing 52(10), 3046–3058 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  7. Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: Proc.of SPIE Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 23–34 (2004)

    Google Scholar 

  8. Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications, 1st edn. Cambridge University Press, Cambridge (2009)

    Book  MATH  Google Scholar 

  9. Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in color and grayscale images. IEEE Multimedia 8, 22–28 (2001)

    Article  Google Scholar 

  10. Goodman, J.W.: Introduction to Fourier Optics, 3rd edn. Roberts & Company Publishers, Englewood (2005)

    Google Scholar 

  11. Ker, A.D.: Locating steganographic payload via WS residuals. In: ACM Proceedings of 10th Multimedia and Security Workshop, pp. 27–31 (2008)

    Google Scholar 

  12. Ker, A.D., Böhme, R.: Revisiting weighted stego-image steganalysis. In: Proc. of SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, pp. 501–517 (2008)

    Google Scholar 

  13. Ker, A.D.: A Capacity Result for Batch Steganography. IEEE Signal Processing Letters 14(8), 525–528 (2007)

    Article  Google Scholar 

  14. Lehman, E.: Testing Statistical Hypotheses, 2nd edn. Chapman & Hall, Boca Raton (1986)

    Book  Google Scholar 

  15. Mumford, D., Shah, J.: Optimal approximations by piecewise smooth functions and associated variational problems. Communications on Pure and Applied Mathematics (5), 577–685 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  16. Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics 5(1), 167–189 (2005)

    Article  Google Scholar 

  17. Schaefer, G., Stich, M.: UCID - an uncompressed colour image database. In: SPIE Proceedings, vol. 5307, pp. 472–480, http://vision.cs.aston.ac.uk/datasets/UCID/

  18. Seber, G., Wild, C.: Nonlinear Regression. Wiley, Chichester (1989)

    Book  MATH  Google Scholar 

  19. Wang, Y., Moulin, P.: Steganalysis of block-DCT image steganography. In: 2003 IEEE Workshop on Statistical Signal Processing (2003)

    Google Scholar 

  20. Wang, Y., Moulin, P.: Statistical modelling and steganalysis of DFT-based image steganography, vol. 6072, p. 607202. SPIE, CA (2006)

    Google Scholar 

  21. Westfeld, A., Andreas, P.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  22. Zitzmann, C., Cogranne, R., Retraint, F., Nikiforov, I., Fillatre, L., Cornu, P.: Statistical Decision Methods in Hidden Information Detection. In: Filler, T., et al. (eds.) IH 2011. LNCS, vol. 6958, pp. 163–177. Springer-, Heidelberg (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cogranne, R., Zitzmann, C., Fillatre, L., Retraint, F., Nikiforov, I., Cornu, P. (2011). A Cover Image Model For Reliable Steganalysis. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds) Information Hiding. IH 2011. Lecture Notes in Computer Science, vol 6958. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24178-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24178-9_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24177-2

  • Online ISBN: 978-3-642-24178-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics