We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Image Steganography and Steganalysis: A Survey

by Yambem Jina Chanu, Kh. Manglem Singh, Themrichon Tuithung
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 52 - Number 2
Year of Publication: 2012
Authors: Yambem Jina Chanu, Kh. Manglem Singh, Themrichon Tuithung
10.5120/8171-1484

Yambem Jina Chanu, Kh. Manglem Singh, Themrichon Tuithung . Image Steganography and Steganalysis: A Survey. International Journal of Computer Applications. 52, 2 ( August 2012), 1-11. DOI=10.5120/8171-1484

@article{ 10.5120/8171-1484,
author = { Yambem Jina Chanu, Kh. Manglem Singh, Themrichon Tuithung },
title = { Image Steganography and Steganalysis: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 52 },
number = { 2 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume52/number2/8171-1484/ },
doi = { 10.5120/8171-1484 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:51:13.543663+05:30
%A Yambem Jina Chanu
%A Kh. Manglem Singh
%A Themrichon Tuithung
%T Image Steganography and Steganalysis: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 52
%N 2
%P 1-11
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography refers to the technique of hiding secret messages into media such as text, audio, image and video without any suspicion, while steganalysis is the art and science of detection of the presence of steganography. It can be used for the benefit of the mankind to serve us as well as by terrorists and criminals for malicious purposes. Both steganography and steganalysis have received a lot of attention from law enforcement and media. In the past, different steganographic techniques with properties of imperceptibility, undetectability, robustness and capacity have been proposed. Newer and more sophisticated steganographic techniques for embedding secret message will require more powerful steganalysis methods for detection. The battle between steganography and steganalysis is never ending. In this paper, an extensive review report is presented for steganography and steganalysis.

References
  1. F. Petticolas, Information hiding techniques for steganography and digital watermarking, StefenKatzenbeisser, Artech house books, ISBN 158053-035-4, Dec. 1999.
  2. F. Hartung and M. Kutter, Multimedia watermarking techniques, Proceedings of the IEEE, vol. 87, no. 7, July 1999.
  3. S. Voloshynovkiy, S. Pereira, T. Pun, J. Eggers and J. Su, Attacks on digital watermarks: classification, estimation-based attacks and benchmarks, IEEE communications Magazine 39, 9 (August) 2001, pp. 118-126.
  4. A. Sequeira and D. Kundur, Communications and information theory in watermarking: A survey, In proc. of SPIE Multimedia systems and application IV, vol. 4518, pp. 216-227.
  5. J. O. Ruanaidh, H. Peterson, A. Herrigel, S. Pereira and T. Pun, Cryptographic copyright protection for digital images based on watermarking techniques, Elsevier Theoretical Computer Science, vol 226, no. 1, pp. 117-142, 1999.
  6. C. Bergman and J. Davidson, Unitary embedding for data hiding with the SVD, Security, Steganography, and Watermarking of Multimedia Contents VII, SPIE, vol. 5681, San Jose, Jan. , 2005.
  7. "Digital millennium copyright act ", http://thomas. loc. gov . cgi-bin/query/z?c105:H. R. 2281. ENR:
  8. N. F. Johnson and S. Jajodia, Exploring steganography,: seeing the unseen, IEEE Computer, vol. 31, no. 2, pp. 26-34, 1998.
  9. W. Bender, W. Butera, D. Gruhl, R. Hwang, F. J. Paiz, S. Pogreb, Applications of data hiding, IBM Systems Journal vol. 39, no. 3 & 4, pp. 547-568, 2000.
  10. J. Fridrich and M. Golan and R. Du, Detecting LSB steganography in color and gray-scale images, IEEE Multimedia Magazine, Special Issue on Security, pp. 22-28, October-November 2001.
  11. C. Hosmer, Discovering hidden evidence, Journal of Digital Forensic Practice, vol. 1, pp. 47-56, 2000.
  12. J. C. Hermandez-Castro, I. Blasco-Lopez, J. M. Estevez-Tapaidor, Steganography in games: A general methodology and its application of the Game of Go, Elsevier Science Computers and Security, pp. 64-71, vol. 25, 2006.
  13. H. Wang and S. Wang, Cyber warfare Steganography vsSteganalysis, ACM Commun. vol. 47, pp. 76-82, October 2004.
  14. A. Nissar and A. H. Mir, Classification of steganalysis techniques: A study, Elsevier Digital Signal Processing, vol. 20, pp. 1758-1770, 2010.
  15. W. Bender, W. Butera, D. Gruhl, R. Hwang, F. J. Paizand and S. Pogreb, Applications for data hiding, IBM Systems Journal, vol. 39, no. ¾, pp. 547-568, 2000.
  16. S. Miaou, C. Hsu, Y. Tsai, and H. Chao, A secure data hiding technique with heterogeous data-combining capability for electronic patient records, Proc. of 22nd IEEE EMBS, pp. 280-283, July 2000.
  17. U. C. Nirinjan, and D. Anand, Watermarking medical images with patient information, Proc. of 20th IEEE International Conference of Biological Society, pp. 703-706, 29 October – 1 November 1998.
  18. Y. Li, C. Li and C. Wei, Protection of mammograms using blind steganography and watermarking, Proc. of IEEE ISIAS, pp. 496-499, 2007.
  19. R. J. Anderson and F. A. P. Pettitcolas, On the limits of steganography, IEEE Journal on Selected Areas in Communication, vol. 16, no. 4, pp. 474-481, 1998.
  20. H. Wang and S. Wang, Cyber warfare: Steganography vsSteganalysis, Communications of ACM, vol. 47, no. 10, pp. 76-82, 2004.
  21. N. Provos and P. Honeyman, Hide and seek: An introduction to steganography, IEEE Security and Privacy, vol. 1, no. 3, pp. 32-44, 2003.
  22. B. Lin, J. He, J. Huang and Y. Q. Shi, A survey on image steganography and steganalysis, Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 2, pp. 142-172, April 2011.
  23. E. Kawaguchi and R. O. Eason, Principle and applications of BPCS steganography, in Multimedia Systems and Applications, vol. 3528, pp. 464-473, SPIE, 1998.
  24. A. Westfeld and A. Ptzmann, Attacks on steganographic systems-breaking the steganographic Utilities ezstego, jsteg, steganos, and s-tools and some lessons learned, Proc. of 3rd Information Hiding Workshop, vol. 1768, pp. 61-76, Springer,1999.
  25. J. Mielikainen, LSB matching revisted, IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.
  26. X. Li, B. Yang, D. Cheng and T. Zeng, A generalization of LSB matching, IEEE Signal Processing Letters, vol. 16, no. 2, pp. 69-72, 2009.
  27. J. Fridrich, D. Soukal and M. Goljan, Maximum likehood destination of secret message length embedded using pmk steganography in spatial domain, Proc. of IST/SPIE Electronic Imaging: Security, Steganography and Watermarking of Multimedia Contents VII, vol. 5681, pp. 595-606, 2005.
  28. D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613-1626, 2003.
  29. Y. H. Yu, C. C. Chang and Y. C. Hu, Hiding secret data in images via predictive coding, Pattern Recognition, vol. 38, no. 5, pp. 691-705, 2005.
  30. B. Chen and G. W. Wornell, Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, IEEE trans. Information Theory, vol. 47, no. 4, pp. 1423-1443, 2001.
  31. L. M. Marvel, C. G. Boncelet Jr. and C. T. Retter, Spread spectrum steganography, IEEE Trans. Image Processing vol. 8, no. 8, pp. 1075-83, 1999.
  32. A. M. Farid, M. Akbarzadeh and F. Varasteh, A new genetic algorithm approach for secure JPEG steganography, in Proc. of IEEE of International Conference on Engineering Intelligent Systems, pp. 1-6, 22-23 April 2006.
  33. A. Latham, JPHide, http://linux01. gwdg. de/alatham/steg o. html
  34. A. Westfeld, F5 – A steganographic algorithm: high capacity despite better staganalysis, Proc. of International Hiding Workshop, vol. 2137, pp. 289-302, Springer 2001.
  35. J. Fridrich, M. Goljan and D. Hogeg, Steganalysis of JPEG images breaking the F5 algorithm,, Proc. Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, Lecture Notes in Computer Science, October 7-9, 2578/2003, pp. 310-323, 2002.
  36. X. Li and J. Wang, A steganographic method based upon JPEG and particle swarm optimization algorithm, Information Science, vol. 177, no. 15, pp. 3099-3191, 2007.
  37. P. Sallee, Model-based steganography, Proc. of 2nd International Workshop on Digital Watermarking, vol. 2939, pp. 154-167, Springer, 2003.
  38. K. Solanki, A. Sarkar and B. S. Manjunath, YASS: Yet another steganographic scheme, that resists blind steganalysis, Proc. of 9thInformation Hiding Workshop, Springer, vol. 4567, pp. 16-31, 2007.
  39. . K. B. Raja , C. R. Chowdary, K. R. Venugopal and L. M. Patnaik, A secure image steganography using LSB DCT and compression techniques on raw images, Proc. IEEE ICISIP05, pp. 170-176, 14-17 December 2005.
  40. McKeon, Strange Fourier steganography in movies, Proc. IEEE ICEIT, pp. 178-182, 17-20 May 2007.
  41. T. Bhattacharya, N. Dey and S. R. B. Chaudhuri, A session based dual steganographic technique using DWT and spread spectrum, International Journal of Modern Engineering Research, vol. 1, no. 1, pp. 157-161,
  42. A. Nag, S. Biswas, D. Sarkar and P. P. Sarkar, A novel technique for image steganography based on DWT and Huffman coding, IJCSS, vol. 4, no. 6, pp. 561-570.
  43. T. Bhattacharya, N. Dey and S. R. B. Chaudhuri, A session based multiple image hiding technique using DWT and DCT, IJCA, vol. 38, no. 5, pp. 18-21, 2012.
  44. K. L. Chung, C-H. Shen, and L-C. Chang, A novel SVD- and VQ based image hiding scheme, Elsevier Pattern Recognition Letters, vol. 22, pp. 1051-1058, 2001.
  45. C. Bergman and J. Davidson, Unitary embedding for data hiding with the SVD, Security, Steganography and Watermarking of Multimedia Contents VII, SPIE, vol. 5681, San Jose CA, January 2005.
  46. M. M. Hadhoud and A. A. Shallan, An efficient SVD image steganographic approach, IEEE ICCES, pp. 257-262, 14-16, December 2009.
  47. K. B. Raja, U. M. Rao, K. A. Rashmi, K. R. Venugopal and U. M. Patnaik, Robust and high capacity image steganography using SVD, IET-UK ICTES, pp. 718-723, 20-22 December 2009.
  48. V. I. Gorodetski, L. J. Popyack, V. Samoilov and V. A. Skormin, SVD-based approach to transparent embedding data into digital images, Lecture Notes in Computer Science, vol. 2052, pp. 263-274, 2001.
  49. Kh. Manglem Singh, L. Shyamsundar Singh, A. Buboo Singh and Kh. Subhabati Devi, Proc. International Conference on Information and Communication technologies pp, pp. 238-241, March 2007.
  50. X. Zhang and S. Wang, Vulnerability of pixel value differencing steganography in histogram analysis and modification for enhanced security, Pattern Recognition Letters, vol. 25, pp. 331-339, 2004.
  51. C. H. Yang, C. Y. Weng, S. J. Wang, H. M. Sun, Adaptive data hiding in edge areas of images with spatial LSB domain system, IEEE Transaction Inf. Forensic Security, vo. 3, no. 3, pp. 488- 497, September 2008.
  52. W. Luo, F. Huang, J. Huang, Edge adaptive image steganography based on LSB matching revisited, IEEE Trans. on Information Forensics and Security, vol. 5, no. 2 June 2010.
  53. R. Bohme and A. Westfeld, Breaking Cauchy model-based JPEG steganography with first order statistics, Proc. European Symposium on Research in Computer Security, 13th September 2004, Lecture Notes in Computer Science, vol. 3193, pp. 125-140.
  54. C. C. Chang, P. Tsai and M. H. Lin, An adaptive steganography for index-based image using codeword grouping, Advances in Multimedia Information Processing-PCM, Springer, vol. 3333, pp. 731-738, 2004.
  55. K. B. Raja, S. Sindhu, T. D. Mahalakshmi, S. Akshatha, B. K. Nithin, M. Sarvajith, K. R. Venugopal, I. M. Patnaik, Robust image adaptive steganography using integer wavelets, Proc. on 3rd International Conference on Communication Systems Software and Middleware and Workshops, COMSWARE'08, pp. 614-621, 6-8 January 2008.
  56. Y. T. Wu and F. Y. Shih, Genetic algorithm based methodology for breaking the steganalysis systems, IEEE Trans. on Systems, Man, and Cybernetics – Part B, Cybernetics, 36(1), pp. 24-31, 2006.
  57. J. Kong, H. Jia, X. Li, Z. Qi, A novel content-based information hiding scheme, Proc. On International Conference on Computer Engineering and Technology, vol. 1, pp. 436-440, pp. 22-24, January 2009.
  58. R. Rakesh, S. Devathi, P. Sekhar, C. Sekharan, B. Surendra and K. Tatikonda, Message guided adaptive random steganography using counting-out embedding, IJCA, vol. 24, no. 6, June 2011.
  59. P. R. S. S. V. Raju, Y. Vamsidhar and R. C. Sriram, Edge adaptive image steganography on LSB using Godel numbering, IJCST, vol. 2, no. 1, December 2011 (Online).
  60. N. F. Johnson and S. Jajodia, Steganalysis of images created using current steganography software, in Lecture Notes in Computer Science, vol. 1525, Springer-Verlag, pp. 273-289, 1998.
  61. T. A Hawi, M. A. Qutayari and H. Barada, Steganalysis attacks on stego-images using stego signatures and statistical image properties, in Proc. IEEE TENCON, vol. 2, pp. 104-107, 2004.
  62. J. Fridrich and M. Goljan, Practical steganalysis of digital images – state of the art, Security and Watermarking of Multimedia Contents IV, E. J. Delp III and P. W. Wong, editors, Proc. of SPIE, 4675, pp. 1-13, 2002.
  63. l. Zhi, S. A. Fen and Y. Xian, A LSB steganography detection algorithm, Proc. of IEEE Symposium on Personal Indoor and Mobile Radio Communication, vol. 3, pp. 2780-2783, September 2003.
  64. T. Zhang and X. Ping, Reliable detection of LSB steganography based on the difference image histogram, IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 3, pp. 545-548 April 2003.
  65. J. Fridrich, R. Du and I. Meng, Steganalysis of LSB encoding in color images, Proc. of IEEE Conference on Multimedia and Expo, July 31- August 2, 2000.
  66. I. Avcibas, N. Memon, and B. Image steganlysis with binary similarity measures, IEEE ICIP, September 2002.
  67. S. Dumitrescu, X. Wu, Z. Wang, Detection of LSB steganography via sample pair analysis, IEEE trans Signal processing, pp. 1995-2007, 2003.
  68. A. D. Ker, Steganalysis of LSB matching in gray-scale images, IEEE Signal Processing Letters, 12(6), pp. 441-444, June 2005.
  69. J. J. Harmsen and W. A. Pearlman, Steganalysis of additive noise modelable information hiding, Proc. SPIE Imaging, Security and Watermarking of Multimedia Content, pp. 131-142, January 2003.
  70. M. Niimi, R. O. Eason, H. Noda and E. kawaguchi, Intensity histogram steganalysis in bpcs steganography, Proc. of IST/SPIE Electronic Imaging: Security and Watermarking of Multimedia Contents, vol. 4314, pp. 555-564, 2001.
  71. X. Yu, T. Tan and Y. Wang, Reliable detection of bpcs steganography in natural images, Proc. of ICIG, 2004.
  72. K. . Sullivan, Z. Bi, U. Madhow, S. Chandrasekaran and B. S. Manjunath, Steganalysis of quantization index modulation data hiding, Proc. of IEEE ICIP, pp. 165-168, vol. 2, 2004.
  73. T. Zhang and X. Ping, A fast and effective steganalytic technique against JSteg like algorithms, ACM symposium on Applied Computing, 9-12 March, 2003.
  74. J. Fridrich, M. Goljan and D. Hogea, Steganalysis of JPEG: Breaking the F5 algorithm, Proc. of 5th Information Hiding Workshop, Springer, vol. 2578, pp. 310-323, 2002.
  75. C. Hong and S. S. Agaian, Spatial-frequency feature vector fusion based steganalysis, IEEE international Conference on Man & Cybernetic, vol. 3, no. 8-11, pp. 1866- 1870, 2006.
  76. J. Fridrich, M. Goljan and D. Hogea, Attacking the OutGuess, Proc. of ACM Workshop on Multimedia and Security, ACM Press, pp. 3-6, 2002.
  77. B. Bohme and A. Westfeld, Breaking Cauch model-based JPEG steganography with first order statistics, Proc. of 9th European Symposium on Research in Computer Security, Springer, vol. 3193, pp. 125-140, 2004.
  78. B. li, Y. Q. Shi and J. Huang, Steganalysis in YASS, Proc. of 10th ACM Workshop on Multimedia and Security, ACM Press, pp. 139-148, 2008.
  79. S. Liu, Y. Hongnun and W. Goa, Neural network based steganalysis in still images, Proc. of International Conference on Multimedia and Expo, ICME, vol. 2, pp. 509-512, July 2003.
  80. S. Liu, Y. Hongnun and W. Goa, Steganalysis based on wavelet texture analysis and neural network, Proc. of WCICA, 2004.
  81. I. Avcibas, N. Memon and B. Sankur, Steganalysis using image quality metrics, In Security and Multimedia Contents, SPIE, 2001.
  82. H. Farid, Detecting hidden messages using higher-order statistical models, Proc. of IEEE ICIP, vol. 2, pp. 905-908, September 2002.
  83. S. Lyu and H. Farid, Detecting hidden messages using higher-order statistics and support vector machines, Proc. of 5th International Workshop on Information Hiding, 2002.
  84. W-N. Lie and G-S. Lin, A feature based classification for blind image steganalysis, IEEE Transaction Multimedia, vol. 7, no. 6, pp. 1007- 1020, December 2005.
  85. D. Zou, Y. Q. Shi, W. Su and G. Xuan, Steganalysis based on Markov model of threshold prediction-error image, IEEE ICME, 2006.
  86. Y. Q. Shi, G. Xuan, D. Zou, J. Gao, C. Yang, Z. Zhang, P. Chai, W. Chen and C. Chen, Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction error image and neural network, IEEE ICME, 6-8 July 2005.
  87. X. Chen, Y. Wang, T. Tan and L Gei, Blind image steganalysis based on statistical analysis of empirical matrix, IEEE ICPR, 2006.
  88. S-H. Zhan and H-B. Zhang, Blind steganalysis using wavelet statistics and ANOVA, IEEE Conference on Machine Learning and Cybernetics, vol. 5, pp. 2515-2519, 19-22 August, 2007.
  89. X. Luo, F. Liu, J. Chen and Y. Zhang, Image universal analysis based on wavelet packet transform, 10th IEEE Workshop on Multimedia Signal Processing, pp. 780-784, 2008.
  90. J. Dong and T. Tan, Blind image steganalysis based on run-length histogram analysis, Proc. of 15th IEEE ICIP, pp. 2064-2067, 2008.
  91. X. Mankun, L. Tianyun and P. Xijian, Steganalysis of LSB matching based on histogram features in grayscale image, IEEE ICCT, pp. 669-672, 10-12 November 2008.
  92. M-C. Chen, S. S. Agaian, C. I. P. Chen and B. M. Rodriguez, Alpha-trimmed image estimation for JPEG steganography, Proc. of IEEE International Conference Systems, Man and Cybernetics, pp. 4581-4585, 2009.
  93. G. Gul and F. Kurugollu, A novel universal steganalyzer design, "LogSv", Proc. on IEEE ICIP, pp. 4249-4252, 2009.
  94. S. Cho, B-H. Cha, J. Wang and C-C. J. Kuo, Block based image steganalysis: Algorithm and performance evaluation, Proc. on IEEE ISCAS, pp. 1679-1682, 2010.
  95. Z-M. He, W. W. Y. Ng, P. P. K. Chan and D. S. Yeung, Steganography detection using localized generalization error model, Proc. on IEEE Systems, Msn and Cybernetics, pp. 15441549, 2010.
  96. m. Ramezani and S. Ghaemmaghami, towards genetic feature selection in image steganalysis, Proc. on 7th IEEE CCNC, pp. 1-4, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Steganalysis LSB embedding Universal staganalysis Transform domain RS algorithm