SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 148
ANALYSIS OF IMAGE STEGANALYSIS TECHNIQUES TO DEFEND
AGAINST STATISTICAL ATTACKS – A SURVEY
Usha B.A1
, N K Srinath2
, N K Cauvery3
1, 2, 3
Asst Professor, Prof and HOD, Professor, Dept of CSE, R V College of Engineering, Bangalore, India
ushaba@rvce.edu.in, srinathnk@rvce.edu.in, cauverynk@rvce.edu.in
Abstract
Steganography is the art concealing information to transmit it in such a way that nobody but the intended receiver knows the existence
of the message. Steganalysis techniques work on eliminating suspicion about the existence of a message. If suspicion is raised, then
the message cannot be passed covertly. One of the ways to detect the hidden message is to view the statistical properties of the image
or medium in which the message is hidden. This is called a statistical attack. In this paper, we explain the nature of such attacks and
present our conclusions based on reviews of existing methods of defense against statistical attacks.
Keywords– Steganalysis, Steganography, statistical attacks, JPEG images, OutGuess
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Steganography comes from Greek words meaning "covered
writing". Over the ages, it has developed into an art of hiding
the very existence of a message when it is being relayed. Any
code that can be represented digitally can act as a carrier for a
message. This could be text, an image, a video or any other
such “innocent looking” media. A message is the information
hidden in anything that can be embedded into a bit stream like
plain text, cipher text or even another image. A stego-carrier is
the name given to the cover carrier and the embedded message
together. A stegokey is any additional hidden information, such
as a password, required to be able to send a message. A
possible formula of the process may be represented as: [1]
Cover medium + embedded message + stegokey = stego-
medium
1.1 Methods Used
Due to their omnipresence in the World Wide Web, images
provide excellent carriers for hidden information. Many
different techniques have been introduced till date [2]. Each of
these can be used to test detection properties and robustness in
the effort to destroy or disable the embedded message. These
techniques can be broadly categorized into two groups: those in
the Image Domain and those in the Transform Domain.
i) Image Domain tools make use of bit-wise methods that apply
least significant bit (LSB) insertion and noise manipulation.
These “simple system” approaches in steganography [3] set the
least significant bits of image pixels equal to those of the
message text.
The tools used in this group include StegoDos, S-Tools, Hide
and Seek, Hide4PGP and Steganos among others. There is no
loss in the image formats used in such steganography and it
allows data to be directly manipulated and recovered. This
approach also comprises including additional components such
as masks or image objects to watermark an image.
ii) The transform domain tools involve manipulation of
algorithms and image transforms such as discrete cosine
transformation (DCT) and wavelet transformation. These
methods hide messages in more significant areas of the
covering image medium and hence may end up manipulating
image properties such as brightness. Watermarking tools
belong to this category. Software that implements this approach
includes PictureMarc, JK-PGS, SysCop, and SureSign. This
approach is more robust than bit-wise techniques but there
exists a tradeoff between this robustness and the amount of
information that can feasibly be added to the image. [1]
JPEG images use the Discrete Cosine Transform (DCT) to
achieve image compression. The compressed data is stored as
integers; however, if we need to quantize the data to encode a
message, all the calculations required involve floating point
data. Information is hidden in the JPEG image by modulating
the rounding choices either up or down in the DCT coefficients.
Detection of such an embedded message would seem to be
quite difficult. In this rounding off, errors may occur and this
leads to the losses in this method. The tool Jpeg-Jsteg is a
steganography tool that makes use of this property. In
steganography when we divide the image into 8x8 sub-images,
the boundaries of these sub-images may become visible,
leading to a disjoint image. This is called blocking artifact and
DCT is used to minimize it. [4]
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 149
We can also use tools whose approach combines image and
transform domain tools. These may include approaches like
patchwork and masking which make the hidden information
seem redundant. [3] Hence the steganography is successful and
independent of effects like cropping and rotation. Patchwork
uses a pseudo-random technique to select multiple patches of
an image for marking with a watermark so that even if one is
lost, the entire message is not lost. Masks use image domain
tactics since they are just an extra component or image object.
They also use transform domain tools for adjusting image
properties or transforming them.
1.2 Steganalytic Detection
For a person applying Steganalysis to determine the presence of
a message, the method he will use is called a steganalytic
attack. There are five main types of attacks possible, namely
stego-only, known cover, known message, chosen stego, and
chosen message. A stego-only attack is one where only the
stego-medium is available for analysis. If the "original" cover-
media and stego-media are both available, then a known cover
attack is available. A known message attack is used when the
hidden message is revealed at some later date, and an attacker
may attempt to analyze the stego-media for future attacks. The
chosen stego attack is one where the steganography algorithm
and stego-media are known. A chosen message attack is one
where the steganalyst generates stego-media from some
steganography tool or algorithm and a known message so that
he can find out which tools and algorithms are used based on
the patterns he can detect.
2. STATISTICAL ATTACKS
2.1. Characteristics Of A Statistical Attack
While embedding the message in a medium, there are certain
statistical properties of the medium that need to be maintained.
If not maintained, they can reveal the existence of a hidden
message. For example if the medium is an image, examples of
such properties would include PoVs. A PoV or pair of values is
a tuple (2i, 2i +1) that indicates that the bit denoted by 2i is
transformed onto the bit 2i+1 after encoding the message within
the image. These PoVs are automatically generated when the
image is encoded and can be stored. Then, for the kth pixel, the
frequency histogram of the image, denoted by Yk will change
and then the presence of the message will become apparent.
Hence we need to maintain that Y2i+Y2i+1 remains a constant.
If not, this type of attack is called a statistical attack.
The main types of statistical analysis include histographic, chi-
square, generalized chi-square and pairs analysis.
Histographic analysis on JPEG sequential and pseudo-random
embedding type stegosystems, such as JSteg and Outguess 0.1
can effectively estimate the length of the message embedded
and it is based on the loss of histogram symmetry after
embedding. χ2 makes use of the generalized Euler Gamma
function and has a rigorous mathematical proof.
The generalised χ2 attack does not calculate an estimation of
the message length and can be sometimes wrong if the message
has a significant difference in the number of zeros compared to
ones.
Pairs analysis was designed specifically for GIF images but
works well for greyscale BMP images as well and can estimate
the length of the message embedded. [5]
3. CURRENT APPROACHES IN STEGANALYSIS
At present, there are two approaches to the problem of
steganalysis, one where there exists a specific steganographic
technique for a specific steganographic algorithm or one where
the technique is independent of it. The success of these
algorithms depends on its capacity to detect the presence of an
image. Decoding of a message can be cumbersome if strong
cryptographic tools have been used. If the individual is able to
detect the presence of a message, then the steganographic
system is said to be insecure [7] and we need to find ways to
ensure secure transmission of secret messages.
Here, the authors discuss the possibilities of deterministic and
non-deterministic approaches in steganography. The
deterministic method proves to be ineffective if both the stego
and the cover are known to a third person that wants to break
into the system. In [7], we see that it is impossible to have
secure data in such cases. Thus, indeterminism is introduced in
the embedding operation. This results in randomness each time
the process is computed thus introducing uncertainty. Thus, if
the attacker is aware of the stego and the cover (S and C
respectively), then when S is known, C is uncertain, such that
H(C/S) > 0 where H denotes the entropy. To ensure this, the
authors in [7] introduce another variable CS from which the
actual cover is selected. They assume that the steganographic
function, CS and the stego are publicly known whereas the key
and cover are unknown to the attackers. They prove that the
cover must contain an uncertainty for the attacker to allow
secure steganography between sender and recipient. Thus, to
ensure security, the embedding process must be split into two:
non - deterministic and deterministic parts, which are
indistinguishable to the attacker.
For instance, an image taken using a camera can easily portray
the area where the image was captured and the features of the
camera. But, the position of the camera or the direction of the
camera while capturing the image cannot be predicted
accurately. Thus, the attacker is unaware of the image details
and cannot distinguish between an original image and a
steganographic one. Thus, we can say that preprocessing i.e.
positioning of the camera initiates randomness into the cover
data.
Another method to ensure secure data sending illustrates the
idea of a trusted domain. In [7], we see that ISDN allows secure
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 150
communication with steganography with the aid of bit
transparent transportation of digital data. Here, the attacker fails
to encode the secret message without the key even if he knows
the source and the embedding function. The characteristic of
the output (stego or cover) cannot be determined from outside
in this method.
Information hiding begins by modifying the redundant bits,
which can change the statistical properties of the cover. For
instance, equal likelihood of 1’s and 0’s occurs. But, redundant
data tends to converge towards one of them. Embedding data
thus weakens the correlation. [9] Thus, for secure
steganography, the key and the actual cover must remain
unknown to the attacker. We also need to apply additional
transforms to the redundant data, which correct measurable
deviations in the embedding process. This is possible by
concealing the key with a symmetric cryptosystem. The
embedding of the message in the image must also allow for
randomness to enhance security. One must also be aware of the
preprocessing techniques for effective steganographic
implementation of messages.
4. COMMONLY USED STEGANOGRAPHY
ALGORITHMS
Based on the images they operate on, the algorithms can be
classified into three types – raw images, palette based and
JPEG images.
4.1 Raw Images
We understand that the simple LSB (Least Significant Bit)
embedding method operates on raw images, where the message
is embedded in a subset of the LSB plane of the image usually
after encryption [6]. As discussed earlier, this introduces
partitioning of the image into PoVs. Since the values are
mapped, it provides statistical flattening of the distribution of
values.
However, the major drawback of this technique is the length
constraint as it embedding can be detected only when the length
is comparable to the number of pixels in the image. Analysis
from [6] shows that only with prior knowledge of where the
message is placed, messages of shorter length can be detected
which is too strong an assumption to make.
4.2 Palette Based Images
In case of palette based images [6], we see that by observing
the palette tables in GIF images and the anomalies caused by
stego tools that perform LSB embedding in GIF images, we can
distinguish between stego and cover images.
The author emphasizes that in order to reduce the distortion
caused by embedding as proposed by EzStego in [10], the
colour pallet is sorted such that the colour differences between
consecutive colors is minimized. The message bits are then
embedded in the LSB of the indices. Since similar pixels,
which can modify due to the embedding process, get mapped to
the neighboring colors in the palette, visual artifacts are
minimal and hard to observe.
4.3 JPEG Images
JPEG format is one of the most widely used formats these days
and is subjected to constant research in terms of steganalysis
and steganography. One of the most frequently used algorithms
is the OutGuess Embedding Program proposed by Fridrich.
It embeds the data in LSB of the DCT coefficients randomly,
leaving some coefficients unchanged. In order to preserve the
original histogram of DCT coefficients, the remaining
coefficients are adjusted. Thus, the method that involves
estimation of the original histogram proves to be ineffective.
We discuss the OutGuess program again briefly. [6]
5. STATISTICAL EMBEDDING
In [9], the author discusses embedding techniques that
distribute the hidden message uniformly across the image.
Provos [9] explains that this process can be split into two stages
– Identification of redundant bits and selection of bits where the
data is to be placed.
Provos [9] emphasizes that the image format plays an important
role in identifying the redundant bits. He also discusses the
importance of pseudo random number generator (PRNG) that
introduces randomness. For bit selection, a cipher is used. We
understand this process from [9]. We realize that since the
PRNG has a secret key, it is impossible to detect the message
without the key.
6. STATISTICAL DETECTION
By determining that an image’s statistical properties that
deviate from a norm, we can figure out whether an image has
been modified steganographically. Certain tests do this by
measuring the entropy of the redundant data, which is higher if
the image has a hidden message. [8]
We realize that DCT coefficients play a significant role in the
embedding process as observed by the authors in [8]. The
different steganographic systems in use include -JSteg, JSteg-
Shell and JPHide and OutGuess. These are popular systems for
JPEG images. These systems utilize a form of least- significant
bit embedding and are detectable by statistical analysis except
for the OutGuess. The authors have discussed various aspects
on these systems in [8].
[8] In the JSteg system, the DCT coefficients are modified
continuously from the beginning of the image. It does not
support encryption and has no random bit selection. Here, the
first five bits of the header contain the size of the length field in
bits and the remaining ones express the size of the embedded
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 151
data. [8] In case of JPHide, detecting content is more difficult a
task as the DCT coefficients isn’t selected continuously from
the beginning unlike the first system JSteg. It uses a fixed table
that defines classes of DCT coefficients to determine the order
in which the coefficients are to be modified. In this technique,
the next class is chosen only after the coefficients in the current
class are used. This ensures information hiding in the class even
after the entire message has been embedded. This ensures
enhanced security as the all the DCT coefficients involved are
modified even if the message is only 8 bits long (approx. 5000
co-eff.). Using this technique, we can modify the second least
significant bits of the DCT coefficients apart from the usual
least significant bits.
On the other hand, we find the OutGuess technique to be more
efficient than the previous two discussed in [8]. This chooses
the DCT coefficients with a pseudo-random number generator.
A user-supplied pass phrase initializes a stream cipher (which
encrypts the content) and a pseudo-random number generator,
both based on RC4. The authors observe that the newer version
OutGuess 0.2 preserves statistical properties unlike the version
0.13b which is vulnerable. When the OutGuess 0.2 technique is
used, the χ2-test discussed earlier fails. In [9], Provos
demonstrates how the OutGuess program preserves the
statistical properties of the image. Thus, we can preserve data
in the image and ensure effective communication without the
attacker knowing the content.
7. NEED FOR EFFECTIVE DETECTION AND ITS
APPLICATIONS
Steganography is a growing field with serious applications in
the world today. There is no way to control the huge number or
type of images being sent over the Internet and hence we have
no way to individually inspect each of them to ascertain the
presence of a hidden message. This could lead to dire
consequences like terrorist activities, financial scams or even
large-scale brainwashing. For example, in 2001, US officials
stated that they have suspicions that terrorists communicate
using steganography via the Internet.
“Hidden in the X-rated pictures on several pornographic Web
sites and the posted comments on sports chat rooms may lie the
encrypted blueprints of the next terrorist attack against the
United States or its allies. It sounds far fetched, but U.S.
officials and experts say it's the latest method of
communication being used by Osama bin Laden and his
associates to outfox law enforcement. Bin Laden, indicted in
the bombing in 1998 of two U.S. embassies in East Africa, and
others are hiding maps and photographs of terrorist targets and
posting instructions for terrorist activities on sports chat rooms,
pornographic bulletin boards and other Web sites, U.S. and
foreign officials say.” Such situations require identical counter
attacks and hence the governments of various countries, as well
as anti terrorism organizations, intelligence and espionage
bureaus need to be able to pass steganographically-encoded
information without its being threatened by statistical attacks.
Even to send nuclear, defence weapons, military tactics,
espionage and foreign strategy related messages; defence
against statistical attack is definitely the need of the hour.
CONCLUSIONS
In this paper we have recorded and summarized the current
scenario in the highly stimulating field of Steganalysis. Defense
against statistical attacks in Steganalysis holds great potential
for future research considering its vast scope and extremely
important applications. The methods used in status quo are
sufficiently advanced and can provide suitable defence against
current attacks. However, with growing awareness about
steganography and the abundance of transmission media for
images and hidden information, it can only be predicted that
methods of attack will only become more sophisticated. In such
a scenario we need to constantly observe new forms of attack
and keep coming up with new techniques of defense against
them.
REFERENCES
[1] Johnson, N.F., Jajodia, S., Steganalysis of Images Created
using Current Steganography Software, Workshop on
Information Hiding Proceedings, Portland, Oregon, USA, 15 -
17 April 1998.
[2] Johnson, N.F., Jajodia, S: Exploring Steganography: Seeing
the Unseen, IEEE Computer, February (1998) 26-34
[3] Anderson, R., Petitcolas, F.: On the Limits of
Steganography, IEEE Journal on Selected Areas in
Communications, Vol. 16, No. 4, May
[4] Gonzalez, R.C., Woods, R.E.: Digital Image Processing.
Addison-Wesley. Reading, MA, (1992)
[5]http://www.computing.surrey.ac.uk/personal/st/H.Schaathun
/projects/Past/leivaditis.pdf
[6] Mehdi Kharrazi, Husrev T. Sencar, and Nasir Memon,
Image Steganography: Concepts and Practice, WSPC Lecture
Notes, April 2004
[7] J.Zöllner, H.Federrath, H.Klimant, A.Pfitzmann,
R.Piotraschke, A.Westfeld, G.Wicke, G.Wolf, Modeling the
security of steganographic systems, Proceedings, 2nd workshop
on Information Hiding, April 1998, Portland
[8] Niels Provos, Peter Honeyman, Detecting Steganographic
Content on the Internet, Center for Information Technology
Integration, University of Michigan
[9] Niels Provos, Defending Against Statistical Steganalysis,
CITI Technical Report 01-4, Center for Information
Technology Integration, University of Michigan
[10]R. Machado, “Ezstego,” http://www.stego.com, 2001.

More Related Content

PDF
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
PDF
Customized and Secure Image Steganography Through Random Numbers Logic.
PDF
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
PDF
RSA Based Secured Image Steganography Using DWT Approach
PDF
High Capacity and Security Steganography Using Discrete Wavelet Transform
PDF
Highly secure scalable compression of encrypted images
PDF
4 image steganography combined with des encryption pre processing
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
Welcome to International Journal of Engineering Research and Development (IJERD)
Customized and Secure Image Steganography Through Random Numbers Logic.
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
RSA Based Secured Image Steganography Using DWT Approach
High Capacity and Security Steganography Using Discrete Wavelet Transform
Highly secure scalable compression of encrypted images
4 image steganography combined with des encryption pre processing

What's hot (16)

PDF
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
PDF
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
PDF
A novel hash based least significant bit (2 3-3) image steganography in spati...
PDF
Hash Visualization a New Technique to improve Real World CyberSecurity
PDF
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
PDF
Ijritcc 1378
PDF
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
DOC
Implementation of bpsc stegnography ( synopsis)
PDF
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
PDF
Information Hiding using LSB Technique based on Developed PSO Algorithm
PDF
Two level data security using steganography and 2 d cellular automata
PDF
Color Image Encryption and Decryption Using Multiple Chaotic Maps
PDF
D0341829
PDF
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
PDF
Enhanced Secret Communication Using Multilevel Audio Steganography
PDF
Text in Image Hiding using Developed LSB and Random Method
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
A novel hash based least significant bit (2 3-3) image steganography in spati...
Hash Visualization a New Technique to improve Real World CyberSecurity
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
Ijritcc 1378
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Implementation of bpsc stegnography ( synopsis)
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
Information Hiding using LSB Technique based on Developed PSO Algorithm
Two level data security using steganography and 2 d cellular automata
Color Image Encryption and Decryption Using Multiple Chaotic Maps
D0341829
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
Enhanced Secret Communication Using Multilevel Audio Steganography
Text in Image Hiding using Developed LSB and Random Method
Ad

Viewers also liked (20)

PDF
Cloud computing and its security aspects
PDF
Implementation of hummingbird cryptographic
PDF
Analysis of fuel consumption and oxides of nitrogen using oxygen enriched air...
PDF
Performance analysis of a liquid column in a chemical plant by using mpc
PDF
Design of green data center
PDF
Surface quality enrichment using fine particle impact
PDF
Design and analysis of low power pseudo differential
PDF
Overview of energy grid in india
PDF
Design of 3 d rc frame on sloping ground
PDF
An efficient monitoring system for sports person using wi fi communication
PDF
A great land mark to achieve 4 g mobile communications
PDF
An innovative idea to discover the trend on multi dimensional spatio-temporal...
PDF
Atenolol epoxide reaction data analysis in batch reactor
PDF
Ccag gossip based reliable multicast protocol
PDF
Study of fiber optic sensor using concrete beams
PDF
Enhancing the capability of supply chain by
PDF
Effect of depth to thickness ratio and length to depth ratio on hollow sectio...
PDF
Detection of skin diasease using curvlets
PDF
Sc idt soft computing based intrusion detection technology in smart home secu...
PDF
Experimental investigation on behavior of bamboo reinforced concrete member
Cloud computing and its security aspects
Implementation of hummingbird cryptographic
Analysis of fuel consumption and oxides of nitrogen using oxygen enriched air...
Performance analysis of a liquid column in a chemical plant by using mpc
Design of green data center
Surface quality enrichment using fine particle impact
Design and analysis of low power pseudo differential
Overview of energy grid in india
Design of 3 d rc frame on sloping ground
An efficient monitoring system for sports person using wi fi communication
A great land mark to achieve 4 g mobile communications
An innovative idea to discover the trend on multi dimensional spatio-temporal...
Atenolol epoxide reaction data analysis in batch reactor
Ccag gossip based reliable multicast protocol
Study of fiber optic sensor using concrete beams
Enhancing the capability of supply chain by
Effect of depth to thickness ratio and length to depth ratio on hollow sectio...
Detection of skin diasease using curvlets
Sc idt soft computing based intrusion detection technology in smart home secu...
Experimental investigation on behavior of bamboo reinforced concrete member
Ad

Similar to Analysis of image steganalysis techniques to defend against statistical attacks – a survey (20)

PDF
Bi34381384
PDF
A Comparative Study And Literature Review Of Image Steganography Techniques
PDF
A novel steganographic scheme based on
PDF
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
PDF
Bp34412415
PDF
A Study of Various Steganographic Techniques Used for Information Hiding
PDF
4.content (stenography)
PDF
Ijariie1132
PDF
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
PDF
www.ijerd.com
PDF
www.ijerd.com
PDF
Steganalysis Using Colour Model Conversion
PDF
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
PDF
Steganography using Interpolation and LSB with Cryptography on Video Images -...
PDF
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
PDF
Feature Selection Algorithm for Supervised and Semisupervised Clustering
PDF
A Secure Data Communication System Using Cryptography and Steganography
PDF
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
PDF
IRJET- Machine Learning Application for Data Security
PDF
O017429398
Bi34381384
A Comparative Study And Literature Review Of Image Steganography Techniques
A novel steganographic scheme based on
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
Bp34412415
A Study of Various Steganographic Techniques Used for Information Hiding
4.content (stenography)
Ijariie1132
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
www.ijerd.com
www.ijerd.com
Steganalysis Using Colour Model Conversion
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Feature Selection Algorithm for Supervised and Semisupervised Clustering
A Secure Data Communication System Using Cryptography and Steganography
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
IRJET- Machine Learning Application for Data Security
O017429398

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
PDF
Flood related disasters concerned to urban flooding in bangalore, india
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
PDF
Shear strength of rc deep beam panels – a review
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
PDF
Risk analysis and environmental hazard management
PDF
Review study on performance of seismically tested repaired shear walls
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
PDF
Can fracture mechanics predict damage due disaster of structures
PDF
Assessment of seismic susceptibility of rc buildings
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Likely impacts of hudhud on the environment of visakhapatnam
Impact of flood disaster in a drought prone area – case study of alampur vill...
Hudhud cyclone – a severe disaster in visakhapatnam
Groundwater investigation using geophysical methods a case study of pydibhim...
Flood related disasters concerned to urban flooding in bangalore, india
Enhancing post disaster recovery by optimal infrastructure capacity building
Effect of lintel and lintel band on the global performance of reinforced conc...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Shear strength of rc deep beam panels – a review
Role of voluntary teams of professional engineers in dissater management – ex...
Risk analysis and environmental hazard management
Review study on performance of seismically tested repaired shear walls
Monitoring and assessment of air quality with reference to dust particles (pm...
Low cost wireless sensor networks and smartphone applications for disaster ma...
Coastal zones – seismic vulnerability an analysis from east coast of india
Can fracture mechanics predict damage due disaster of structures
Assessment of seismic susceptibility of rc buildings
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...

Recently uploaded (20)

PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Geodesy 1.pptx...............................................
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
bas. eng. economics group 4 presentation 1.pptx
DOCX
573137875-Attendance-Management-System-original
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
additive manufacturing of ss316l using mig welding
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
PPT on Performance Review to get promotions
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Sustainable Sites - Green Building Construction
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Geodesy 1.pptx...............................................
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
bas. eng. economics group 4 presentation 1.pptx
573137875-Attendance-Management-System-original
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
additive manufacturing of ss316l using mig welding
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPT on Performance Review to get promotions
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Sustainable Sites - Green Building Construction
Internet of Things (IOT) - A guide to understanding
Operating System & Kernel Study Guide-1 - converted.pdf
OOP with Java - Java Introduction (Basics)
Lecture Notes Electrical Wiring System Components
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...

Analysis of image steganalysis techniques to defend against statistical attacks – a survey

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 148 ANALYSIS OF IMAGE STEGANALYSIS TECHNIQUES TO DEFEND AGAINST STATISTICAL ATTACKS – A SURVEY Usha B.A1 , N K Srinath2 , N K Cauvery3 1, 2, 3 Asst Professor, Prof and HOD, Professor, Dept of CSE, R V College of Engineering, Bangalore, India ushaba@rvce.edu.in, srinathnk@rvce.edu.in, cauverynk@rvce.edu.in Abstract Steganography is the art concealing information to transmit it in such a way that nobody but the intended receiver knows the existence of the message. Steganalysis techniques work on eliminating suspicion about the existence of a message. If suspicion is raised, then the message cannot be passed covertly. One of the ways to detect the hidden message is to view the statistical properties of the image or medium in which the message is hidden. This is called a statistical attack. In this paper, we explain the nature of such attacks and present our conclusions based on reviews of existing methods of defense against statistical attacks. Keywords– Steganalysis, Steganography, statistical attacks, JPEG images, OutGuess -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Steganography comes from Greek words meaning "covered writing". Over the ages, it has developed into an art of hiding the very existence of a message when it is being relayed. Any code that can be represented digitally can act as a carrier for a message. This could be text, an image, a video or any other such “innocent looking” media. A message is the information hidden in anything that can be embedded into a bit stream like plain text, cipher text or even another image. A stego-carrier is the name given to the cover carrier and the embedded message together. A stegokey is any additional hidden information, such as a password, required to be able to send a message. A possible formula of the process may be represented as: [1] Cover medium + embedded message + stegokey = stego- medium 1.1 Methods Used Due to their omnipresence in the World Wide Web, images provide excellent carriers for hidden information. Many different techniques have been introduced till date [2]. Each of these can be used to test detection properties and robustness in the effort to destroy or disable the embedded message. These techniques can be broadly categorized into two groups: those in the Image Domain and those in the Transform Domain. i) Image Domain tools make use of bit-wise methods that apply least significant bit (LSB) insertion and noise manipulation. These “simple system” approaches in steganography [3] set the least significant bits of image pixels equal to those of the message text. The tools used in this group include StegoDos, S-Tools, Hide and Seek, Hide4PGP and Steganos among others. There is no loss in the image formats used in such steganography and it allows data to be directly manipulated and recovered. This approach also comprises including additional components such as masks or image objects to watermark an image. ii) The transform domain tools involve manipulation of algorithms and image transforms such as discrete cosine transformation (DCT) and wavelet transformation. These methods hide messages in more significant areas of the covering image medium and hence may end up manipulating image properties such as brightness. Watermarking tools belong to this category. Software that implements this approach includes PictureMarc, JK-PGS, SysCop, and SureSign. This approach is more robust than bit-wise techniques but there exists a tradeoff between this robustness and the amount of information that can feasibly be added to the image. [1] JPEG images use the Discrete Cosine Transform (DCT) to achieve image compression. The compressed data is stored as integers; however, if we need to quantize the data to encode a message, all the calculations required involve floating point data. Information is hidden in the JPEG image by modulating the rounding choices either up or down in the DCT coefficients. Detection of such an embedded message would seem to be quite difficult. In this rounding off, errors may occur and this leads to the losses in this method. The tool Jpeg-Jsteg is a steganography tool that makes use of this property. In steganography when we divide the image into 8x8 sub-images, the boundaries of these sub-images may become visible, leading to a disjoint image. This is called blocking artifact and DCT is used to minimize it. [4]
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 149 We can also use tools whose approach combines image and transform domain tools. These may include approaches like patchwork and masking which make the hidden information seem redundant. [3] Hence the steganography is successful and independent of effects like cropping and rotation. Patchwork uses a pseudo-random technique to select multiple patches of an image for marking with a watermark so that even if one is lost, the entire message is not lost. Masks use image domain tactics since they are just an extra component or image object. They also use transform domain tools for adjusting image properties or transforming them. 1.2 Steganalytic Detection For a person applying Steganalysis to determine the presence of a message, the method he will use is called a steganalytic attack. There are five main types of attacks possible, namely stego-only, known cover, known message, chosen stego, and chosen message. A stego-only attack is one where only the stego-medium is available for analysis. If the "original" cover- media and stego-media are both available, then a known cover attack is available. A known message attack is used when the hidden message is revealed at some later date, and an attacker may attempt to analyze the stego-media for future attacks. The chosen stego attack is one where the steganography algorithm and stego-media are known. A chosen message attack is one where the steganalyst generates stego-media from some steganography tool or algorithm and a known message so that he can find out which tools and algorithms are used based on the patterns he can detect. 2. STATISTICAL ATTACKS 2.1. Characteristics Of A Statistical Attack While embedding the message in a medium, there are certain statistical properties of the medium that need to be maintained. If not maintained, they can reveal the existence of a hidden message. For example if the medium is an image, examples of such properties would include PoVs. A PoV or pair of values is a tuple (2i, 2i +1) that indicates that the bit denoted by 2i is transformed onto the bit 2i+1 after encoding the message within the image. These PoVs are automatically generated when the image is encoded and can be stored. Then, for the kth pixel, the frequency histogram of the image, denoted by Yk will change and then the presence of the message will become apparent. Hence we need to maintain that Y2i+Y2i+1 remains a constant. If not, this type of attack is called a statistical attack. The main types of statistical analysis include histographic, chi- square, generalized chi-square and pairs analysis. Histographic analysis on JPEG sequential and pseudo-random embedding type stegosystems, such as JSteg and Outguess 0.1 can effectively estimate the length of the message embedded and it is based on the loss of histogram symmetry after embedding. χ2 makes use of the generalized Euler Gamma function and has a rigorous mathematical proof. The generalised χ2 attack does not calculate an estimation of the message length and can be sometimes wrong if the message has a significant difference in the number of zeros compared to ones. Pairs analysis was designed specifically for GIF images but works well for greyscale BMP images as well and can estimate the length of the message embedded. [5] 3. CURRENT APPROACHES IN STEGANALYSIS At present, there are two approaches to the problem of steganalysis, one where there exists a specific steganographic technique for a specific steganographic algorithm or one where the technique is independent of it. The success of these algorithms depends on its capacity to detect the presence of an image. Decoding of a message can be cumbersome if strong cryptographic tools have been used. If the individual is able to detect the presence of a message, then the steganographic system is said to be insecure [7] and we need to find ways to ensure secure transmission of secret messages. Here, the authors discuss the possibilities of deterministic and non-deterministic approaches in steganography. The deterministic method proves to be ineffective if both the stego and the cover are known to a third person that wants to break into the system. In [7], we see that it is impossible to have secure data in such cases. Thus, indeterminism is introduced in the embedding operation. This results in randomness each time the process is computed thus introducing uncertainty. Thus, if the attacker is aware of the stego and the cover (S and C respectively), then when S is known, C is uncertain, such that H(C/S) > 0 where H denotes the entropy. To ensure this, the authors in [7] introduce another variable CS from which the actual cover is selected. They assume that the steganographic function, CS and the stego are publicly known whereas the key and cover are unknown to the attackers. They prove that the cover must contain an uncertainty for the attacker to allow secure steganography between sender and recipient. Thus, to ensure security, the embedding process must be split into two: non - deterministic and deterministic parts, which are indistinguishable to the attacker. For instance, an image taken using a camera can easily portray the area where the image was captured and the features of the camera. But, the position of the camera or the direction of the camera while capturing the image cannot be predicted accurately. Thus, the attacker is unaware of the image details and cannot distinguish between an original image and a steganographic one. Thus, we can say that preprocessing i.e. positioning of the camera initiates randomness into the cover data. Another method to ensure secure data sending illustrates the idea of a trusted domain. In [7], we see that ISDN allows secure
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 150 communication with steganography with the aid of bit transparent transportation of digital data. Here, the attacker fails to encode the secret message without the key even if he knows the source and the embedding function. The characteristic of the output (stego or cover) cannot be determined from outside in this method. Information hiding begins by modifying the redundant bits, which can change the statistical properties of the cover. For instance, equal likelihood of 1’s and 0’s occurs. But, redundant data tends to converge towards one of them. Embedding data thus weakens the correlation. [9] Thus, for secure steganography, the key and the actual cover must remain unknown to the attacker. We also need to apply additional transforms to the redundant data, which correct measurable deviations in the embedding process. This is possible by concealing the key with a symmetric cryptosystem. The embedding of the message in the image must also allow for randomness to enhance security. One must also be aware of the preprocessing techniques for effective steganographic implementation of messages. 4. COMMONLY USED STEGANOGRAPHY ALGORITHMS Based on the images they operate on, the algorithms can be classified into three types – raw images, palette based and JPEG images. 4.1 Raw Images We understand that the simple LSB (Least Significant Bit) embedding method operates on raw images, where the message is embedded in a subset of the LSB plane of the image usually after encryption [6]. As discussed earlier, this introduces partitioning of the image into PoVs. Since the values are mapped, it provides statistical flattening of the distribution of values. However, the major drawback of this technique is the length constraint as it embedding can be detected only when the length is comparable to the number of pixels in the image. Analysis from [6] shows that only with prior knowledge of where the message is placed, messages of shorter length can be detected which is too strong an assumption to make. 4.2 Palette Based Images In case of palette based images [6], we see that by observing the palette tables in GIF images and the anomalies caused by stego tools that perform LSB embedding in GIF images, we can distinguish between stego and cover images. The author emphasizes that in order to reduce the distortion caused by embedding as proposed by EzStego in [10], the colour pallet is sorted such that the colour differences between consecutive colors is minimized. The message bits are then embedded in the LSB of the indices. Since similar pixels, which can modify due to the embedding process, get mapped to the neighboring colors in the palette, visual artifacts are minimal and hard to observe. 4.3 JPEG Images JPEG format is one of the most widely used formats these days and is subjected to constant research in terms of steganalysis and steganography. One of the most frequently used algorithms is the OutGuess Embedding Program proposed by Fridrich. It embeds the data in LSB of the DCT coefficients randomly, leaving some coefficients unchanged. In order to preserve the original histogram of DCT coefficients, the remaining coefficients are adjusted. Thus, the method that involves estimation of the original histogram proves to be ineffective. We discuss the OutGuess program again briefly. [6] 5. STATISTICAL EMBEDDING In [9], the author discusses embedding techniques that distribute the hidden message uniformly across the image. Provos [9] explains that this process can be split into two stages – Identification of redundant bits and selection of bits where the data is to be placed. Provos [9] emphasizes that the image format plays an important role in identifying the redundant bits. He also discusses the importance of pseudo random number generator (PRNG) that introduces randomness. For bit selection, a cipher is used. We understand this process from [9]. We realize that since the PRNG has a secret key, it is impossible to detect the message without the key. 6. STATISTICAL DETECTION By determining that an image’s statistical properties that deviate from a norm, we can figure out whether an image has been modified steganographically. Certain tests do this by measuring the entropy of the redundant data, which is higher if the image has a hidden message. [8] We realize that DCT coefficients play a significant role in the embedding process as observed by the authors in [8]. The different steganographic systems in use include -JSteg, JSteg- Shell and JPHide and OutGuess. These are popular systems for JPEG images. These systems utilize a form of least- significant bit embedding and are detectable by statistical analysis except for the OutGuess. The authors have discussed various aspects on these systems in [8]. [8] In the JSteg system, the DCT coefficients are modified continuously from the beginning of the image. It does not support encryption and has no random bit selection. Here, the first five bits of the header contain the size of the length field in bits and the remaining ones express the size of the embedded
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 151 data. [8] In case of JPHide, detecting content is more difficult a task as the DCT coefficients isn’t selected continuously from the beginning unlike the first system JSteg. It uses a fixed table that defines classes of DCT coefficients to determine the order in which the coefficients are to be modified. In this technique, the next class is chosen only after the coefficients in the current class are used. This ensures information hiding in the class even after the entire message has been embedded. This ensures enhanced security as the all the DCT coefficients involved are modified even if the message is only 8 bits long (approx. 5000 co-eff.). Using this technique, we can modify the second least significant bits of the DCT coefficients apart from the usual least significant bits. On the other hand, we find the OutGuess technique to be more efficient than the previous two discussed in [8]. This chooses the DCT coefficients with a pseudo-random number generator. A user-supplied pass phrase initializes a stream cipher (which encrypts the content) and a pseudo-random number generator, both based on RC4. The authors observe that the newer version OutGuess 0.2 preserves statistical properties unlike the version 0.13b which is vulnerable. When the OutGuess 0.2 technique is used, the χ2-test discussed earlier fails. In [9], Provos demonstrates how the OutGuess program preserves the statistical properties of the image. Thus, we can preserve data in the image and ensure effective communication without the attacker knowing the content. 7. NEED FOR EFFECTIVE DETECTION AND ITS APPLICATIONS Steganography is a growing field with serious applications in the world today. There is no way to control the huge number or type of images being sent over the Internet and hence we have no way to individually inspect each of them to ascertain the presence of a hidden message. This could lead to dire consequences like terrorist activities, financial scams or even large-scale brainwashing. For example, in 2001, US officials stated that they have suspicions that terrorists communicate using steganography via the Internet. “Hidden in the X-rated pictures on several pornographic Web sites and the posted comments on sports chat rooms may lie the encrypted blueprints of the next terrorist attack against the United States or its allies. It sounds far fetched, but U.S. officials and experts say it's the latest method of communication being used by Osama bin Laden and his associates to outfox law enforcement. Bin Laden, indicted in the bombing in 1998 of two U.S. embassies in East Africa, and others are hiding maps and photographs of terrorist targets and posting instructions for terrorist activities on sports chat rooms, pornographic bulletin boards and other Web sites, U.S. and foreign officials say.” Such situations require identical counter attacks and hence the governments of various countries, as well as anti terrorism organizations, intelligence and espionage bureaus need to be able to pass steganographically-encoded information without its being threatened by statistical attacks. Even to send nuclear, defence weapons, military tactics, espionage and foreign strategy related messages; defence against statistical attack is definitely the need of the hour. CONCLUSIONS In this paper we have recorded and summarized the current scenario in the highly stimulating field of Steganalysis. Defense against statistical attacks in Steganalysis holds great potential for future research considering its vast scope and extremely important applications. The methods used in status quo are sufficiently advanced and can provide suitable defence against current attacks. However, with growing awareness about steganography and the abundance of transmission media for images and hidden information, it can only be predicted that methods of attack will only become more sophisticated. In such a scenario we need to constantly observe new forms of attack and keep coming up with new techniques of defense against them. REFERENCES [1] Johnson, N.F., Jajodia, S., Steganalysis of Images Created using Current Steganography Software, Workshop on Information Hiding Proceedings, Portland, Oregon, USA, 15 - 17 April 1998. [2] Johnson, N.F., Jajodia, S: Exploring Steganography: Seeing the Unseen, IEEE Computer, February (1998) 26-34 [3] Anderson, R., Petitcolas, F.: On the Limits of Steganography, IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, May [4] Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Addison-Wesley. Reading, MA, (1992) [5]http://www.computing.surrey.ac.uk/personal/st/H.Schaathun /projects/Past/leivaditis.pdf [6] Mehdi Kharrazi, Husrev T. Sencar, and Nasir Memon, Image Steganography: Concepts and Practice, WSPC Lecture Notes, April 2004 [7] J.Zöllner, H.Federrath, H.Klimant, A.Pfitzmann, R.Piotraschke, A.Westfeld, G.Wicke, G.Wolf, Modeling the security of steganographic systems, Proceedings, 2nd workshop on Information Hiding, April 1998, Portland [8] Niels Provos, Peter Honeyman, Detecting Steganographic Content on the Internet, Center for Information Technology Integration, University of Michigan [9] Niels Provos, Defending Against Statistical Steganalysis, CITI Technical Report 01-4, Center for Information Technology Integration, University of Michigan [10]R. Machado, “Ezstego,” http://www.stego.com, 2001.