Information Technology Reference
In-Depth Information
resist this type of attacks, a more balanced scheme is introduced in which both F 1 and
F 1 are used to preserve the image histogram so that some abnormal features are ef-
fectively avoided. Although modifications are no longer confined to the least signifi-
cant bit plane, the new method does not introduce any additional visual distortion to the
cover image. Extraction of the embedded data can still be accomplished by simply
extracting the LSBs of the stego-image. The proposed approach is also applicable to the
LSB modification of transform domain coefficients, and a detectable signature of
histogram shrinkage introduced by techniques such as F5 is avoided.
Acknowledgments
This work was supported by the National Natural Science Foundation of China (No.
60072030) and Key Disciplinary Development Program of Shanghai (2001-44).
References
1. Petitcolas, F.A.P., Anderson, R.J., and Kuhn, M.G.: “Information Hiding A Survey,”
Proc. IEEE, 87 (1999) 1062 −1078
2. Fridrich, J., and Goljan, M.: “Practical Steganalysis of Digital Images State of the Art,”
Proceedings of SPIE, Vol. 4675, San Jose, USA, Jan. 2002, 1−13
3. Wang, H., and Wang, S.: “Cyber Warfare Steganography vs. Steganalysis,” Communi-
cation of the ACM (in press)
4. Westfeld, A., and Pfitzmann, A.: “Attacks on Steganographic Systems,” Lecture Notes in
Computer Science, vol. 1768 (1999) 61
76
5. Provos, N., and Honeyman, P.: “Detecting Steganographic Content on the Internet,” CITI
Technical Report 01−11 (2001)
6. Fridrich, J., Goljan, M., and Du, R.: “Detecting LSB Steganography in Color and Gray-Scale
Images,” Magazine of IEEE Multimedia, Special Issue on Security, Oct.-Dec. issue (2001)
22−28
7. Fridrich, J., Du, R., and Long, M.: “Steganalysis of LSB Encoding in Color Images,” in 2000
IEEE Int. Conf. on Multimedia and Expo, vol. 3 (2000) 1279−1282
8. Fridrich, J., Goljan, M., and Du, R.: Steganalysis Based on JPEG Compatibility. Proceedings
of SPIE, Vol. 4518 (2001) 275-280
9. Fridrich, J., Goljan, M., and Hogea, D.: Attacking the OutGuess. in Proc. of the ACM
Workshop on Multimedia and Security 2002, Juan-les-Pins, France, December 6, 2002
10. Fridrich, J., Goljan, M., and Hogea, D.: “Steganalysis of JPEG Image: Breaking the F5 Al-
gorithm,” in 5th International Workshop on Information Hiding, Noordwijkerhout, Nether-
lands, Oct. 2002
11. Westfeld, A.: F5
A Steganographic Algorithm. Lecture Notes in Computer Science,
302
12. Lyu, S., and Farid, H.: Detecting Hidden Message Using Higher-Order Statistics and Sup-
port Vector Machines. In 5th International Workshop on Information Hiding, Noordwi-
jkerhout, The Netherlands, 7-9 October 2002
13. Ettinger, J.: Steganalysis and Game Equilibria. Lecture Notes in Computer Science,
vol. 1525 (1998) 319−328
14. Provos, N.: Defending against Statistical Steganalysis. In 10th USENIX Security Sympo-
sium, Washington, DC (2001)
15. Wang, S., Zhang, X., and Zhang, K.: Steganographic Technique Capable of Withstanding
RQP Analysis. Journal of Shanghai University, 6 (2002) 273−277
vol. 2137 (2001) 289
Search WWH ::




Custom Search