Searching for the stego-key

@inproceedings{Fridrich2004SearchingFT,
  title={Searching for the stego-key},
  author={Jessica J. Fridrich and Miroslav Goljan and David Soukal},
  booktitle={IS\&T/SPIE Electronic Imaging},
  year={2004}
}
Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedding, recover the stego key, and finally extract the hidden message. In this paper, we present a methodology for identifying the stego key in key-dependent steganographic schemes. Previous approaches for stego key search were exhaustive searches looking for some recognizable structure (e.g., header) in the extracted bit… Expand
Stego key searching for LSB steganography on JPEG decompressed image
TLDR
The proposed method can successfully recover the stego key in LSB replacement and LSB matching, i.e., the extracting attack is successful, and it outperforms three previous methods in terms of computational complexity. Expand
On the Unicity Distance of Stego Key
TLDR
The difficulty of extracting hidden information is analyzed with information-theoretic method in the terms of unicity distance of steganographic key (abbreviated stego key), which shows the relations between key rate, message rate, hiding capacity and difficulty of extraction. Expand
Extracting hidden messages of MLSB steganography based on optimal stego subset
TLDR
Algorithms can be used to effectively extract all hidden message bits of LSB steganography under certain specific conditions and there is still a lack of effective algorithms to extract the hidden messages of most steganographic algorithms. Expand
Stego key recovery based on the optimal hypothesis test
TLDR
Methods of recovering the stego key for least significant bit (LSB) steganography in the JPEG domain based on the differences in the statistical properties of the discrete cosine transform coefficients between the paths generated by the correct and incorrect keys are studied. Expand
Efficient stego key recovery based on distribution differences of extracting message bits
TLDR
The methods of efficient stego key recovery for LSB steganography in JPEG domain by utilizing the distribution differences between message bits extracted by the correct and incorrect keys and a stegO key recovery method based on parametric hypothesis test is proposed. Expand
Cryptographic Secrecy Analysis of Adaptive Steganographic Syndrome-Trellis Codes
  • Hansong Du, Jiu-fen Liu, Yu-guo Tian, Xiangyang Luo
  • Computer Science
  • Secur. Commun. Networks
  • 2021
TLDR
In this manuscript, the cryptographic secrecy of this kind of steganography is analyzed, on condition of two common attacks: stego-only attack and known-cover attack, respectively, from three perspectives: steganographic key equvocation, message equivocation, and unicity distance of the steganographical key. Expand
Forensic steganalysis: determining the stego key in spatial domain steganography
TLDR
It is shown that in the spatial domain the stego key search can be made significantly more efficient by working with the noise component of the image obtained using a denoising filter. Expand
Extracting hidden messages in steganographic images
  • T. Quach
  • Computer Science
  • Digit. Investig.
  • 2014
TLDR
It is shown that the expected mean residuals contain enough information to logically order the located payload provided that the size of the payload in each stego image is not fixed. Expand
Stego key recovery method for F5 steganography with matrix encoding
TLDR
Experimental results show that the proposed method can recover the stego key accurately and efficiently, even when the existing Xu’s method fails for the high or very low embedding ratio. Expand
A review of forensic approaches to digital image Steganalysis
TLDR
Details about important forensic techniques as available in the steganalysis literature are given and digital image domain for determination of the embedding algorithm, estimation of the secret message payload and stego key determination are presented. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 22 REFERENCES
New methodology for breaking steganographic techniques for JPEGs
TLDR
This paper identifies two limitations of the proposed approach and shows how they can be overcome to obtain accurate detection in every case and outlines a condition that must be satisfied by all secure high-capacity steganographic algorithms for JPEGs. Expand
Higher-order statistical steganalysis of palette images
TLDR
A new higher-order steganalytic method called Pairs Analysis for detection of secret messages embedded in digital images, which enables more reliable and accurate message detection than previous methods. Expand
Defending Against Statistical Steganalysis
TLDR
Improved methods for information hiding are presented and an a priori estimate is presented to determine the amount of data that can be hidden in the image while still being able to maintain frequency count based statistics. Expand
Digital image steganography using stochastic modulation
TLDR
A new steganographic paradigm for digital images in raster formats that achieves oblivious data transfer without using noise extraction algorithms or error correction, and extends stochastic modulation to a content-dependent device noise. Expand
On the limits of steganography
TLDR
It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography. Expand
Steganographic system based on higher-order statistics
TLDR
This work investigates the well known steganographic tool Jsteg as well as a newer approach proposed by Eggers et al., which relies on histogram-preserving data mapping, which shows weaknesses leading to a certain detectability. Expand
A new approach to reliable detection of LSB steganography in natural images
TLDR
A physical quantity derived from the transition coefficients between difference image histograms of an image and its processed version produced by setting all bits in the LSB plane to zero appears to be a good measure of the weak correlation between successive bit planes and can be used to discriminate stego-images from cover images. Expand
Detecting Low Embedding Rates
TLDR
This paper shows three approaches for detecting steganograms with low change density, a steganographic algorithm with a very low embedding rate, and another algorithm (Hide), constructed to be secure against visual and statistical chi-square attacks. Expand
On estimation of secret message length in LSB steganography in spatial domain
TLDR
The concept of a weighted stego image is introduced and the problem of determining the unknown message length as a simple optimization problem is formulated to obtain more stable and accurate results for a wide spectrum of natural images. Expand
Steganalysis of additive-noise modelable information hiding
TLDR
It is shown that these embedding methods are equivalent to a lowpass filtering of histograms that is quantified by a decrease in the HCF center of mass (COM). Expand
...
1
2
3
...