Academia.eduAcademia.edu

Outline

A Blind Steganalysis Scheme using Estimation Techniques

2008, eurasip.org

https://doi.org/10.5281/ZENODO.40934

Abstract

Distributed image steganography (DIS) [11] is a method for hiding a secret image inside n different innocuous cover images. The method is secure and reliable because it leaves very little traces of the secret image in the stego image. However, it is possible that criminals could use it for unchallenged, covert communication of illegal secret information over the Internet. In such cases, a suitable countermeasure (also known as steganalysis), to reverse the DIS is needed which can detect and disclose this kind of secret information. In this paper, the challenge of disclosing the secret image was handled by adopting an estimation theoretic approach [5] using techniques such as Kalman filtering . Another unique feature is the blind steganalysis approach which assumes no knowledge of the cover images. The results indicate the potential for its usage by law enforcement agencies in detecting and extracting secret information hidden by the DIS.

References (11)

  1. M. Arulampalam, S. Maskell, and N. Gordon, "A tutorial on particle filters for online nonlinear/non-gaussian bayesian tracking," IEEE Trans. Signal Process, vol. 50, no. 2, pp. 174-188, Feb. 2002.
  2. L. Bai, S. Biswas, and E. Blasch, "An estimation approach to extract multimedia information in distributed steganographic images," presented at the 10th International Conference on Information Fusion (ICIF), Quebec city, Canada, July 2007.
  3. G. R. Blakley and C. Meadows, "Security of ramp schemes," presented at the Advances in Cryptology -Crypto '84, G. R. Blakley and D. Chaum, Eds., vol. 196, Santa Barbara, California, USA, Aug. 1984, pp. 242-269.
  4. F. J, G. M, and R. Du, "Detecting lsb steganography in color, and gray- scale images," IEEE Multimedia, vol. 8, no. 4, 2001.
  5. S. M. Kay, Fundamentals of statistical signal processing:estimation theory. Upper saddle river,New Jersey 07458: Prentice Hall, 1993.
  6. A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
  7. G. Simmons, "Prisoners problem and the subliminal channel," presented at the Advances in Cryptology: Proceedings of CRYPTO 83, 1983.
  8. K. Sullivan, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, "Steganalysis for markov cover data with applications to images," IEEE Trans. Information Forensics and Security, vol. 1, no. 2, pp. 275-287, 2006.
  9. C.-C. Thien and J.-C. Lin, "Secret image sharing," Computers & Graphics, vol. 26, no. 5, pp. 765-770, 2002.
  10. Y. Wang and P. Moulin, "Steganalysis of block-dct image steganogra- phy," IEEE workshop on Statistical Signal Processing, Sept. 2003.
  11. Y.-S. Wu, C.-C. Thien, and J.-C. Lin, "Sharing and hiding secret images with size constraint," Pattern Recognition, vol. 37, no. 7, pp. 1277-1385, 2004.