Information Hiding: Steganography and Steganalysis
2005, Handbook of Statistics
https://doi.org/10.1016/S0169-7161(04)24006-8Abstract
The goal of steganography is to insert a message into a carrier signal so that it cannot be detected by unintended recipients. Due to their widespread use and availability of bits that can be changed without perceptible damage of the original signal images, video, and audio are widespread carrier media. Steganalysis attempts to discover hidden signals in suspected carriers or at the least detect which media contain hidden signals. Therefore, an important consideration in steganography is how robust to detection is a particular technique. We review the existing steganography and steganalysis techniques and discuss their limitations and some possible research directions.
References (29)
- R.J. Anderson and F. Petitcolas. "On the limits of steganography." IEEE Journal on Selected Areas in Communications, 16:474-481, 1998.
- M.J. Atallah, P. Jacquet, and W. Szpankowski, "A probabilistic analysis of pattern matching problem", Random Structures and Algorithms, 4:191-213, 1993.
- F.L. Bauer. Decrypted Secrets-Methods and Maxims of Cryptology. Springer- Verlag, Berlin, Germany, 1997.
- R. Crandall. "Some notes on steganography." 1998. Available at http://os.inf.tu-dresden.de/∼westfeld/crandall.pdf.
- I.J. Cox, M.L. Miller, and J.A. Bloom. Digital Watermarking, Morgan Kauf- mann, San Francisco, CA, 2001.
- S. Dumitrescu, X. Wu, and Z. Wang. "Detection of LSB steganography via sample pair analysis", LNCS 2578, Springer-Verlag, Berlin Heidelberg, pp. 355-372, 2002.
- H. Farid. "Detecting hidden messages using higher-order statistical models." Proc. Int. Conf. on Image Processing, Rochester, NY, 2002.
- S. Lyu and H. Farid. "Detecting hidden messages using higher-order statistics and support vector machines", LNCS 2578, Springer-Verlag, Berlin Heidel- berg, pp. 34-354, 2002.
- E. Frantz. "Steganography preserving statistical properties", LNCS 2578, Springer-Verlag, Berlin Heidelberg, pp. 278-294, 2002.
- J. Fridrich, M. Goljan, and R. Du. "Steganalysis based on JPEG compati- bility.", Proc. SPIE Multimedia Systems and Applications IV, Denver, CO, 2001.
- J. Fridrich, R. Du, and M. Long. "Steganalysis of LSB encoding in color im- ages." Proc. IEEE Int. Conf. on Multimedia and Expo, Vol. 3, pp. 1279- 1282, 2000.
- J. Fridrich, M. Goljan, and R. Du. "Detecting LSB Steganography in color and gray-scale images", IEEE Multimedia Magazine, pp. 22-28, October 2001.
- J. Fridrich, M. Goljan, and D. Hogea. "Steganalysis of JPEG images: Breaking the F5 algorithm", LNCS 2578, Springer-Verlag, Berlin Heidelberg, pp. 310- 323, 2002.
- D. Gruhl and W. Bender. "Information hiding to foil the casual counter- feiter", In Information Hiding Workshop, Lecture Notes in Computer Sci- ence(1525), Springer-Verlag, New York, 1998.
- N. Johnson, Z. Duric, and S. Jajodia. Information Hiding: Steganography and Watermarking -Attacks and Countermeasures., Kluwer Academic Pub- lishers, Boston, 2000.
- N. Johnson and S. Jajodia. "Exploring steganography: Seeing the unseen." IEEE Computer, 31:26-34, 1998.
- N. Johnson and S. Jajodia. "Steganalysis of images created using current steganography software." Proc. Int. Workshop on Information Hiding, LNCS 1525, Springer-Verlag, Berlin, pp. 273-289, 1998. Joint Photographic Experts Group. http://www.jpeg.org/public/jpeghomepage.htm.
- D. Kahn. The Codebreakers-The Story of Secret Writing. Scribner, New York, 1996.
- S. Katzenbeisser and F.A.P. Petitcolas(eds.). Information Hiding: Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000.
- M. Maes. "Twin Peaks: The Histogram Attack on Fixed Depth Image Water- marks", Proc. Int. Workshop on Information Hiding, LNCS 1525, Springer- Verlag, Berlin, pp. 290-305, 1998.
- R.E. Newman, I.S. Moskowitz, L.W. Chang, and M.M. Brahmadesam. "A steganographic embedding undetectable by JPEG compatibility steganaly- sis", LNCS 2578, Springer-Verlag, Berlin Heidelberg, pp. 258-277, 2002.
- F. Petitcolas, R.J. Anderson, and M. Kuhn. Information Hiding-A Survey. Proceedings of the IEEE, 87:1062-1078, 1999.
- N. Provos. "Defending against statistical steganalysis." Proc. 10th USENIX Security Symposium, pp. 323-325, 2001.
- G.J. Simmons. "The history of subliminal channels", IEEE J. Select. Areas Commun., 16:452-462, 1998.
- D. Upham. Jsteg V4. available at: http://www.funet.fi/pub/crypt/steganography.
- P. Wayner. Disappearing Cryptography. 2nd ed., Morgan Kaufmann, San Fran- cisco, 2002.
- A. Westfeld. "F5-a steganographic algorithm: High capacity despite better steganalysis." Proc. Information Hiding Workshop, LNCS 2137, Springer- Verlag, Berlin, pp. 289-302, 2001.
- A. Westfeld. "Detecting low embedding rates". Proc. Information Hiding Workshop, LNCS 2578, Springer-Verlag, Berlin Heidelberg, pp. 324-339, 2002.
- A. Westfeld and A. Pfitzmann. "Attacks on steganographic systems." Proc. Information Hiding Workshop, LNCS 1768, Springer-Verlag, New York, pp. 61-75, 1999.