Searching for the stego-key

  title={Searching for the stego-key},
  author={J. Fridrich and M. Goljan and D. Soukal},
  booktitle={IS&T/SPIE Electronic Imaging},
  • J. Fridrich, M. Goljan, D. Soukal
  • Published in IS&T/SPIE Electronic Imaging 2004
  • Mathematics, Computer Science, Engineering
  • Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedding, recover the stego key, and finally extract the hidden message. In this paper, we present a methodology for identifying the stego key in key-dependent steganographic schemes. Previous approaches for stego key search were exhaustive searches looking for some recognizable structure (e.g., header) in the extracted bit… CONTINUE READING
    78 Citations

    Topics from this paper

    Stego key searching for LSB steganography on JPEG decompressed image
    • 18
    • PDF
    On the Unicity Distance of Stego Key
    • 1
    Extracting hidden messages of MLSB steganography based on optimal stego subset
    • 21
    • PDF
    Stego key recovery based on the optimal hypothesis test
    • 3
    • Highly Influenced
    Efficient stego key recovery based on distribution differences of extracting message bits
    • 1
    • Highly Influenced
    Forensic steganalysis: determining the stego key in spatial domain steganography
    • 45
    • PDF
    Extracting hidden messages in steganographic images
    • 10
    • PDF
    Stego key recovery method for F5 steganography with matrix encoding
    A review of forensic approaches to digital image Steganalysis
    • 6
    • Highly Influenced
    Stego Key Estimation in LSB Steganography
    • 9
    • PDF


    New methodology for breaking steganographic techniques for JPEGs
    • 108
    • PDF
    Higher-order statistical steganalysis of palette images
    • 135
    • PDF
    Defending Against Statistical Steganalysis
    • 685
    • PDF
    Digital image steganography using stochastic modulation
    • 127
    • PDF
    On the limits of steganography
    • 1,357
    • PDF
    Steganographic system based on higher-order statistics
    • 50
    A new approach to reliable detection of LSB steganography in natural images
    • 120
    Detecting Low Embedding Rates
    • 167
    • PDF
    On estimation of secret message length in LSB steganography in spatial domain
    • 189
    • PDF
    Steganalysis of additive-noise modelable information hiding
    • 454
    • PDF