Skip to main content

Steganography Preserving Statistical Properties

  • Conference paper
  • First Online:
Book cover Information Hiding (IH 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2578))

Included in the following conference series:

Abstract

Steganographic modifications must not noticeably change characteristics of the cover data known to an attacker. However, it is a difficult task to define an appropriate set of features that should be preserved. This article investigates possibilities to maintain statistical properties while embedding information. As an example, the simple embedding function “overwriting the least significant bits” is discussed, w.r.t. greyscale images used as covers. Two modifications of this technique are presented here: The first modification avoids changes of first-order statistics and thereby overcomes possible attacks based on histogram analysis. The second modification tries to reduce noticeable modifications of second-order statistics and, thereby, of the structure of an image. The suggested modifications are tested on a set of images. Testing a possible attack and comparing these results to the results of the same attack on stego images created by the original method clarifies the improvements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ismail Avcibas, Nasir Memon, Bülent Sankur: Steganalysis of Watermarking Techniques using Image Quality Metrics. In: Ping Wah Wong, Edward J. Delp (Ed.): Security and Watermarking of Multimedia Contents III. Proceedings of SPIE Vol. 4314, 2001, 523–531. 287

    Google Scholar 

  2. Wilfried J. Dixon, Frank J. Massey: Introduction to Statistical Analysis. McGraw-Hill Book Company, Inc. New York, 1957. 284, 289

    MATH  Google Scholar 

  3. Hany Farid: Detecting Steganographic Messages in Digital Images. http://www.cs.dartmouth.edu/~farid/publications/tr01.html 287

  4. Elke Franz, Andreas Pfitzmann: Steganography Secure Against Cover-Stego-Attacks. In Andreas Pfitzmann (Ed.): Information Hiding. Third International Workshop, IH’99, Dresden, Germany, September/October 1999, Proceedings, Springer, LNCS 1768, 2000, 29–46. 286

    Google Scholar 

  5. Jessica Fridrich, Rui Du, Meng Long: Steganalysis of LSB Encoding in Color Images. ICME 2000, New York City, July 31th-August 2nd, USA. http://www.ssie.binghampton.edu/fridrich/publications.html 287

  6. Jessica Fridrich, Miroslav Goljan, Rui Du: Steganalysis Based on JPEG Compatibility. SPIE Multimedia Systems and Applications IV, Denver, CO, August 20-24, 2001. 292

    Google Scholar 

  7. Jessica Fridrich, Miroslav Goljan, Rui Du: Reliable Detection of LSB Steganography in Color and Grayscale Images. Proc. of the ACM Workshop on Multimedia and Security, Ottawa, CA, October 5, 2001, 27–30. 287, 292

    Google Scholar 

  8. Wilhelm Göhler: Höhere Mathematik: Formeln und Hinweise. Bearb. von Barbara Ralle, 10. überarb. Auflage, VEB Deutscher Verlag für Grundstoffindustrie, Leipzig, 1987. 288

    Google Scholar 

  9. Solomon W. Golomb, Robert E. Peile, Robert A. Scholtz: Basic Concepts in Information Theory and Coding. Plenum Press, New York, 1994. 279

    MATH  Google Scholar 

  10. Neil F. Johnson, Sushil Jajodia: Steganalysis of Images Created Using Current Steganography Software. In David Aucsmith (Ed.): Information Hiding. Second InternationalWorkshop, IH’98, Portland, Oregon, USA, April 1998, Proceedings, Springer, LNCS 1525, 1998, 273–289. 278

    Google Scholar 

  11. Stefan Katzenbeisser, Fabien A.P. Petitcolas (Ed.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, 2000. 287

    Google Scholar 

  12. Donald E. Knuth: The art of computer programming. Volume 2: Seminumerical algorithms. Addison-Wesley, 3rd Ed., 1998. 280

    Google Scholar 

  13. Maurice Maes: Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks. In David Aucsmith (Ed.): Information Hiding. Second International Workshop, IH’98, Portland, Oregon, USA, April 1998, Proceedings, Springer, LNCS 1525, 1998, 290–305. 287

    Google Scholar 

  14. A. Papoulis, Probability, Random Variables, and Stochastic Processes, 2nd ed. New York, McGraw-Hill, 1984. 280, 284

    MATH  Google Scholar 

  15. Niels Provos: Defending Against Statistical Steganalysis. 10th USENIX Security Symposium, August 2001. http://www.citi.umich.edu/u/provos/stego/ 279, 287

  16. Maxwell T. Sandford, Jonathan N. Bradley, Theodore G. Handel: The data embedding method. In Proc. of the SPIE Photonics East Conference, Philadelphia, September 1995. 291

    Google Scholar 

  17. Peter Wayner: Mimic Functions. Technical Report, Cornell University, Department of Computer Science, 1990. 280

    Google Scholar 

  18. Andreas Westfeld, Andreas Pfitzmann: Attacks on Steganographic Systems. In Andreas Pfitzmann (Ed.): Information Hiding. Third International Workshop, IH’99, Dresden, Germany, September/October 1999, Proceedings, Springer, LNCS 1768, 2000, 61–76. 278, 279, 286, 287

    Google Scholar 

  19. Andreas Westfeld: F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis. In Ira S. Moscowitz (Ed.): Information Hiding. 4th International Workshop, IH’01, Pittsburgh, PA, USA, April 2001, Proceedings, Springer, LNCS 2137, 2001, 289–302. 279

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Franz, E. (2003). Steganography Preserving Statistical Properties. In: Petitcolas, F.A.P. (eds) Information Hiding. IH 2002. Lecture Notes in Computer Science, vol 2578. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36415-3_18

Download citation

  • DOI: https://doi.org/10.1007/3-540-36415-3_18

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00421-9

  • Online ISBN: 978-3-540-36415-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics