Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques

Full Text (PDF, 478KB), PP.76-92

Views: 0 Downloads: 0

Author(s)

Manish Mahajan 1,* Navdeep Kaur 1

1. Faculty Department of Information Technology Chandigarh Engg College Landran, Mohali , Punjab India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2012.10.08

Received: 13 Feb. 2012 / Revised: 6 May 2012 / Accepted: 12 Jul. 2012 / Published: 8 Sep. 2012

Index Terms

Model based steganography, frequency domain, Spatial domain and Adaptive steganography

Abstract

Steganography is the science that deals with hiding of secret data in some carrier media which may be image, audio, formatted text or video. The main idea behind this is to conceal the very existence of data. We will be dealing here with image steganography. Many algorithms have been proposed for this purpose in spatial & frequency domain. But in almost all the algorithms it has been noticed that as we embed the secret data in the image the certain characteristics or statistics of the image get disturbed. Based on these disturbed statistics steganalysts can get the reflection about the existence of secret data which they further decode with the help of available steganalytic tools. Steganalysis is a science of attacking the hidden data to get an authorized access. Although steganalysis is not a part of this work but it may be sometimes discussed as a part of literature. Even in steganography we are not purely concerned with spatial or frequency domain rather our main emphasis is on adaptive steganography or model based steganography. Adaptive steganography is not entirely a new branch of steganography rather it is based upon spatial & frequency domain with an additional layer of mathematical model. So here we will be dealing with adaptive steganography which take care about the important characteristics & statistics of the cover image well in advance to the embedding of secret data so that the disturbance of image statistics as mentioned earlier, which attracts the forgery or unauthorized access, can be minimized. In this survey we will analyze the various steganography algorithms which are based upon certain mathematical model or in other words algorithms which come under the category of model based steganography.

Cite This Paper

Manish Mahajan, Navdeep Kaur, "Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.10, pp.76-92, 2012. DOI:10.5815/ijcnis.2012.10.08

Reference

[1]Kefa Rabah, Department of Physics, Eastern Mediterranean University, Gazimagusa, North Cyprus, Turkey, "Steganography-The Art of Hiding Data", Information Technology Journal 3 (3): 245-269, 2004,ISSN 1682-6027
[2]Kevin Curran, Internet Technologies Research Group, University of Ulster, Karen Bailey, Institute of Technology, Letterkenny, Ireland, "An Evaluation of Image Based Steganography Methods", International Journal of Digital Evidence Fall 2003,Volume2,Issue 2
[3]Petitcolas, F.A.B., 1997,The information hiding homepage-digital watermarking and steganography http://www.cl.cam.ac.uk/ fapp2/steganography,University of Cambridge, Computer Laboratory, Security Group.
[4] Sabu M Thampi,Assistant Professor ,Department of Computer Science & Engineering, LBS College of Engineering, Kasaragod, Kerala-671542, S.India "Information Hiding Techniques: A Tutorial Review", ISTE-STTP on Network Security & Cryptography, LBSCE 2004.
[5]X.Li,J.Wang ,"A steganographic method based upon JPEG and particle swarm optimization algorithm", Information Sciences 177 (15) (2007) 3099–3109.
[6]C.C.Chang, T.S.Chen ,L.Z.Chung ,"A steganographic method based upon JPEG and quantization table modification", InformationSciences 141(1–2 )(2002)123–138.
[7]A.M.Fard ,M.Akbarzadeh- T,F.Varasteh-A, "A new genetic algorithm approach for secure JPEG steganography",in: Proceedings of IEEE International Conference on Engineering of Intelligent Systems, 22–23 April2006, pp.1–6.
[8]N.Provos, P.Honeyman, "Hide and seek: an introduction to steganography" ,IEEE Security and Privacy1(3)(2003)32–44.
[9]A.Westfeld, "F5-A steganographic algorithm:high capacity despite better steganalysis" ,in: Proceedings of Fourth International Workshop on Information Hiding, Lecture Notes in Computer Science, vol. 2137,Pittsburgh, USA, April 2001 pp.289–302.
[10]http://en.wikipedia.org/wiki/Steganography
[11]W.Y.Chen, "Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation", Applied Mathematics and Computation 185(1)(2007)432–448.
[12]N.K.Abdulaziz, K.K.Pang, "Robust data hiding for images", in Proceedings of IEEE International Conference on Communication Technology, WCC- ICCT'02, vol.1,21–25 August 2000 ,pp.380–383.
[13]L.D. Paulson, "New system fights steganography" News Briefs, IEEE Computer Society 39(8) (2006)25–27.
[14]P.Wayner, "Disappearing Cryptography", seconded, Morgan Kaufmann Publishers, 2002.
[15]C.Manikopoulos, S.Yun-Qing, S.Sui, Z.Zheng, N.Zhicheng, Z.Dekun, "Detection of block DCT-based steganography in gray-scale images", in:Proceedings of the IEEE Workshop on Multimedia Signal Processing, 9–11December2002,pp.355–358.
[16]N.Provos, Defending against statistical steganalysis ", Center for Information Technology Integration, University ofMichigan, Technical report,February2001.
[17]N.Provos, P.Honeyman, "Detecting steganographic content on the Internet", Center for Information Technology Integration, University of Michigan, Technical report, August31, 2001.
[18]J.Fridrich, M.Goljan, D.Hogeg, "Steganalysis of JPEG images: breaking the F5 algorithm", in: Proceedings of Information Hiding: Fifth International Workshop, IH 2002 Noordwijkerhout, The Netherlands, Lecture Notes in Computer Science, Springer, October 7–9, 2002, 2578/2003, pp.310–323.
[19]Abbas Cheddad , Joan Condell, Kevin Curran, Paul McKevitt "Digital image steganography: Survey and analysis of current methods" in the journal of Signal processing, Aug 2009.
[20]N.F.Johnson ,S.C. Katzenbeisser, "A survey of steganographic techniques" in: S. Katzenbeisser, F.A.P.Petitcolas (Eds.),Information Hiding Techniques for Steganography and Digital Watermarking,Artech ouse,Inc.,Norwood,2000.
[21]P.Sallee, "Model-based steganography",in: Proceedings of the Second International Workshop on Digital Watermarking, Seoul, Korea, October 20–22,2003,Lecture Notes in Computer Science,vol.2939,pp. 254–260.
[22]N.F.Johnson, S.Jajodia, "Exploring steganography: seeing the unseen", IEEE Computer31 (2) (1998)26–34.
[23]T.L.Thomas,"Alqaeda and the internet: the danger of' cyber planning'', parametrs, US Army War College Quarterly-Spring 2003. Available from:/www.carlislearmy.mil/ usawc / Parameters/03spring/thomas.pdfS.
[24]C.Hosmer, "Discovering hidden evidence", Journal of Digital Forensic Practice (1)(2006)47–56.
[25]W. Bender et al., "Techniques for Data Hiding," IBM Systems J., Vol. 35, Nos. 3 and 4, 1996, pp. 313-336.
[26]I.J. Cox et al., "Secure Spread Spectrum Watermarking for Multimedia" Tech.Report 95-10, NEC Research Inst., Princeton, N.J., 1995.
[27]Lorenzo Rossi, Fabio Garzia, and Roberto Cusani "Peak-Shaped-Based Steganographic Technique for JPEG Images" EURASIP Journal on Information Security Volume 2009, Article ID 382310, 8 pages doi:10.1155/2009/382310
[28]M. Kharrazi, H.T. Sencar, N. Memon, "Performance study of common image steganography and steganalysis techniques", Journal of Electrical Imaging 15 (4) (2006) 1–16.
[29]R. Tzschoppe, R. Baum, J. Huber, A. Kaup, "Steganographic system based on higher-order statistics" , in: Proceedings of SPIE, Security and Watermarking of Multimedia Contents V. Santa Clara, California,USA2003,vol.5020,p.156-166.
[30]H. Farid "Detecting hidden messages using higher-order statistical models",in ICIP 2002, Rochester, NewYork,SA, September 2002.
[31]C. Cachin, "An information-theoretic model for steganography," in Proceedings of 2nd Workshop on Information Hiding, D. Aucsmith, ed., 1525, Lecture Notes in Computer Science, Springer-Verlag, (Portland, Oregon, USA), May 1998.
[32]J. J. Eggers, R. B Äauml, and B. Girod, "A communications approach to image steganography," in Proc. Of SPIE Vol. 4675, Security and Watermarking of Multimedia Contents IV, (San Jose, Ca, USA), January 2002.
[33]xhttp://munitions.iglu.cjb.net/software/steganography/jpeg-jsteg-v4.diff.gz
[34]P. Wayner, "Disappearing Cryptography", second ed, Morgan Kaufmann Publishers, 2002.
[35]R.Bohme, A.Westfeld, "Breaking Cauchy model-based JPEG steganography with first order statistics" , in: Proceedings of the European Symposium on Research in Computer security, ESORICS 2004, Valbonne, France, 13thSeptember 2004, Lecture Notes in Computer Science,vol.3193,pp.125–140.
[36]J.Fridrich, M.Goljan, "Practical steganalysis of digital images- state of the art",in: Proceedings of SPIEP hotonics West, Electronic Imaging'02,SecurityandWatermarkingofMulti-media Contents, SanJose, California, January2002, vol.4675, pp. 1–13.
[37] C. Ullerich, A. Westfeld, "Weaknesses of MB2", in: Proceedings of the Sixth International Workshop on Digital Watermarking, Guangz- hou, China, December 3–5, 2007, pp. 127–142.
[38]C. Chen, Y.Q. Shi, "JPEG image steganalysis utilizing both intra block and Inter block correlations", in: Proceedings of IEEE International Symposium on Circuits and Systems, ISCAS 2008, Seattle, Wa- shington, USA, 18–21 May 2008, pp. 3029–3032.
[39]C.C. Chang, H.W. Tseng, "A steganographic method for digital images using side match, Pattern Recognition" Letters 25 (12) (2004) 1431–1437.
[40]E. Franz, A. Schne idewind, "Adaptive steganography based on dithering", in: Proceedings of the ACM Workshop on Multimedia and Security, September 20–21, 2004, Magdeburg, Germany, pp. 56–62.
[41]L.Yu, Y.Zhao, R.Ni, Z.Zhu, "PM1 steganography in JPEG images using genetic algorithm",Soft Computing13(4)(2009)393–400.
[42]C.C. Chang, P. Tsai, M.H. Lin, "An adaptive steganography for index- based images using codeword grouping", Advances in Multimedia Information Processing-PCM, Springer, vol. 3333, 2004, pp. 731–738 images using codeword grouping, Advances in Multimedia Information Processing-PCM, Springer, vol. 3333, 2004, pp.731-738.
[43]Weiming Zhang, Xinpeng Zhang, and Shuozhong Wang "A Double Layered "Plus- Minus One Data Embedding Scheme"IEEE signal processing letters, vol. 14, no. 11, november 2007.
[44]H.Hioki, "A data embedding method using BPCS principle with new complexity measures", in: Proceedings of Pacific Rim Workshop on Digital Steganography, July2002, pp.30–47.
[45]J.Spaulding, H.Noda, M.N.Shirazi, E.Kawaguchi, "BPCS steganography using EZW lossy compressed images", Pattern Recognition Letters 23(13) (2002)1579–1587.
[46]J.Fridrich, "Application of data hiding in digital images", Tutorial for the ISSPA' 99, Brisbane, Australia, August22–25,1999.
[47]Y.Srinivasan, B.Nutter, S.Mitra, B.Phillips, D.Ferris, "Secure transmission of medical records using high capacity steganography", in: Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems, CBMS'04 , 2004, pp.122–127.
[48]E.Kawaguchi, R.O.Eason, "Principle and applications of BPCS steganography", in: Proceedings of SPIE International Symposium on Voice, Video and Data Communications 2–4 November1998, pp. 464–473.
[49]K.B.Raja, S.Sindhu, T.D.Mahalakshmi, S.Akshatha, B.K.Nithin, M. Sarvajith, K.R.Venugopal, L.M.Patnaik, "Robust image adaptive steganography using integer Wavelets", in: Proceedings of the 3rd International Conference on Communication Systems Software and Middleware and Workshops, COMSWARE' 08,6–10 January 2008, pp. 614–621.
[50]C.C.Lin, W.L.Tai, C.C.Chang,"Multilevel reversible data hiding based on histogram modification of difference images", Pattern Recognition 41(12)(2008)3582–3591.
[51]Y.T.Wu, F.Y.Shih, "Genetic algorithm based methodology for breaking the steganalytic systems", IEEE Transactions on Systems, Man, and Cybernetics part B: cybernetics 36 (1) (2006) 24–31.
[52]S.P.Maity, M.K.Kundu, P.K.Nandi, "Genetic algorithm for optimal imperceptibility in image communication through noisy Channel", in: Proceedings of the International Conference on Neural Information Processing (ICONIP'2004), India,29 October 2004, pp. 700–705.
[53]J. Kong, H. Jia, X. Li, Z. Qi, "A novel content-based information hiding scheme", in: Proceedings of the International Conference on Computer Engineering and Technology, 22–24 January 2009, vol. 1, pp. 436–440.
[54]M.W. Chao, C.H. Lin, C.W. Yu, T.Y. Lee, "A high capacity 3D steganography algorithm", IEEE Transactions on Visualization and Computer Graphics 15 (2) (2009) 274–284.
[55]A. Bogomjakov, C. Gotsman, M. Isenburg, "Distortion-free steganography for polygon meshes", in: Proceedings of Computer Graphics Forum, Eurographics'08, pril 2008, vol. 27 (2), pp. 637–642.
[56]H. Nakamura, Q. Zhao, "Information hiding based on image morphing", in: Proceedings of 22nd International Conference on Advanced Information Networking and Applications Workshops, AINAW, 25–28 March 2008, pp. 1585-1590.
[57]A.M. Zeki, A.A. Manaf, "A novel digital watermarking technique based on ISB (Intermediate Significant Bit)", World Academy of Science, Engineering and Technology 38 (2009) 1080–1087.
[58]S.C. Katzenbeisser, "Principles of steganography", in: S.Katzenbeisser, F.A.P. Petitcolas (Eds.), Information Hiding Techniques for Steganography and Digital Water marking, Artech House Inc, Norwood, 2000.
[59]L. Zheng, I.Cox, "JPEG based conditional entropy coding for correlated Steganography", in: Proceedings of IEEE International Conference on Multimedia and Expo, Beijing, China, 2–5 July 2007, pp. 1251–1254.
[60]I.Cox, "Information hiding, watermarking and steganography", Public Seminar, Intelligent Systems Research Centre(ISRC), University of Ulster at Magee,Northern Ireland, 28th April 2009.
[61]Y.H.Yu, C.C.Chang, I.C.Lin, "A new steganographic method for color and gray scale image hiding", Computer Vision and ImageUnderstanding 107(3)(2007)183–194.
[62]M.Drew, S.Bergner, "Spatio-chromatic decorrelation for color image compression", Technical Report, School of Computing Science, Simon Fraser University, Vancouver, Canada, 2007, available from:/http:// fas.sfu.ca/ pub/cs/TR/2007/CMPT2007-09.pdfS.
[63]M.Saenz, R.Oktem, K.Egiazarian, E.Delp, "Color image wavelet compression using vector morphology", in: Proceedings of the European SignalProcessingConference,September5–82000, Tampere,Finland,2000,pp.5–8.
[64]A.Rodriguez, L.Rowe, Multimedia systems and applications, IEEEComputer 28(5)(1995) 20–22.
[65]L.M.Marvel, C.T.Retter, "A methodology for data hiding using Images", in: Proceedings of IEEE Military Communications Conference, MILCOM'98,Boston, MA, USA,18–21October 1998, pp.1044–1047.
[66]R.J.Anderson, F.A.P.Petitcolas, "On the limits of steganography", IEEE Journal of Selected Areas in Communications 16(4)(1998)474–481.
[67]P.Bas,"Analyse steganographique d' images numeriques: Comparaison de differentes methods", Rapportdestage, Laboratoire des Images et des Signaux, University of Joseph Fourier, 23rdJune 2003, (in French).
[68]J.Fridrich, M.Goljan, R.Du, Reliable detection of LSB stegano- graphy in grayscale and colorimages",in: Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, 5th October 2001 , pp.27–30.
[69]D.C.Lou, C.H. Sung, "A steganographic scheme for secure communications based on the chaos and Euler theorem", IEEE Transactions on Multimedia 6(3)(2004)501–509.
[70]A.Cheddad, J.Condell, K.Curran, P.McKevitt, "Securing information content using new encryption method and steganography", in: Proceedings of the Third IEEE International Conference on Digital Information management, University of East London, UK,13–16 November 2008, pp.563–568.
[71]D.C. Wu, W.H. Tsai, A steganographic method for images by pixel value differencing", Pattern Recognition Letters24 (9–10)(2003) 1613–1626.