A Comparative Study of LSB based Statistical Steganalysis and Gray Level Co-Occurrence Matrix based Blind Image Steganalysis
DOI:
https://doi.org/10.26438/ijcse/v10i4.15Keywords:
RS, Sample pair analysis, Chi-squared, Gray level co-occurrence matrixAbstract
Image steganography is used as a covert communication technique which hides secret data in cover image intelligently so that it is visually imperceptible. This is often used by individual or organization with bad intent to harm people, organization or society. Steganalysis technique is used to break these systems to extract the secret information, reveal such covert communication and thwart imminent threat. Steganalytic techniques can be broadly classified as targeted or blind. In the former the knowledge of steganographic system used should be known and the latter adopts a more general approach where no knowledge of the process used to hide data is required. This paper studies some well-established statistical methods of targeted steganalysis and gray level co-occurrence matrix based blind steganalysis and compare their performances.
References
[1] R.J. Anderson, F. A Petitcolas, “On the Limits of Steganography”, IEEE Journal on Selected Areas in Communications, Vol.16, Issue.4,pp.474-481,1998.
[2] B. Li, J. He, J. Huang, Y. Q. Shi, "A Survey on Image Steganography and Steganalysis", Journal of Information Hiding and Multimedia Signal Processing., Vol. 2, Issue.2 ,pp.142-172, 2011.
[3] A. Nissar, A.H. Mir, “Classification of Steganalysis Techniques. A Study”, Digital Signal Processing, Vol. 20, Issue.6, pp.1758-1770, 2010.
[4] S. Pathak, R. Roy, S. Changder, “Performance Analysis of Image Steganalysis Techniques and Future Research Directives”, International Journal of Information and Computer Security. Vol.10, Issue.1, pp.1-24, 2018.
[5] A. Westfeld, A. Pfitzmann, “Attacks on Steganographic Systems”,In Lecture Notes in Computer Science, Vol.1768, Springer, Berlin, pp. 61-76, 2000.
[6] J. Fridrich ,M. Goljan, R. Du, “Reliable Detection of LSB Steganography in Color and Grayscale Images”, In the Proceedings of the Workshop on Multimedia and Security: New Challenges, ACM, New York, pp. 27-30,2001.
[7] S. Dumitrescu, X. Wu, Z.Wang, “Detection of LSB Steganography via Sample Pair Analysis”, IEEE Transactions on Signal Processing, Vol.51, Issue.7, pp. 1995-2007, 2003.
[8] P. Lu, X. Luo, Q. Tang, L. Shen, “An Improved Sample Pairs Method for Detection of LSB Embedding.”, In Lecture Notes in Computer Science, Vol. 3200, Springer, Berlin, pp.116-127,2004.
[9] R. M. Haralick, K. Shanmugam, I. H. Dinstein,"Textural Features for Image Classification", IEEE Transactions On Systems, Man, and Cybernetics Vol.3, Issue. 6 , pp. 610-621, 1973.
[10] R. M. Haralick, "Statistical And Structural Approaches To Texture," Proceedings of the IEEE, vol. 67, no. 5, pp. 786-804, 1979.
[11] K. Sullivan, U. Madhow, S. Chandrasekaran , B. S. Manjunath, "Steganalysis for Markov Cover Data With Applications to Images", IEEE Transactions on Information Forensics and Security Vol.1, Issue. 2, pp. 275-287, 2006.
[12] L. Nanni, S. Brahnam, S. Ghidoni, E. Menegatti, T. Barrier, "Different Approaches for Extracting Information from the Co-Occurrence Matrix.," PloS one Vol.8, Issue. 12, pp. 1-9, 2013.
[13] A.D. Ker,”Quantitative Evaluation of Pairs and RS Steganalysis”. In the Proceddings of SPIE 5306. Security, Steganography, and Watermarking of Multimedia Contents VI, Vol. 5306,SPIE,San Jose, pp. 83-97,2004.
[14] H. Zhang, H. Tang, “A Novel Image Steganography Algorithm Against Statistical Analysis.” In the Proceedings of International Conference on Machine Learning and Cybernetics, IEEE, Hong Kong, pp. 3884-3888, 2007.
[15] X. Luo,F. Liu,P. Lu, “A LSB Steganography Approach Against Pixels Sample Pairs Steganalysis”, International Journal of Innovative Computing, Information and Control, Vol.3, Issue.3, pp. 575-588,2007.
[16] S. Manoharan, “An Empirical Analysis of RS Steganalysis” In the Proceedings of the Third International Conference on Internet Monitoring and Protection, IEEE, Bucharest, pp.172-177, 2008.
[17] T. Qian, S. Manoharan, “A Comparative Review of Steganalysis Techniques”, In the Proceedings of 2nd International Conference on Information Science and Security (ICISS), IEEE, Seoul,pp.1-4, 2015.
[18] N. Prokhozhev, , O. Mikhailichenko, , A. Sivachev, , D. Bashmakov, A. Korobeynikov, “Passive Steganalysis Evaluation: Reliabilities of Modern Quantitative Steganalysis Algorithms”, In the Proceedings of the First International Scientific Conference Intelligent Information Technologies for Industry (IITI’16). Advances in Intelligent Systems and Computing, Vol. 451. Springer, Cham, pp. 89-94, 2016.
[19] R. A. Solodukha, I. V. Atlasov, “Modification of RS-Steganalysis to Attacks Based on Known Stego-Program”, In the Proceedings of Second Russia and Pacific Conference on Computer Technology and Applications (RPC), IEEE, Vladivostok, pp. 176-179, 2017.
[20] N. Mewalal, W. S. Leung “Improving Hidden Message Extraction Using LSB Steganalysis Techniques”, In the Proceedings of International Conference on Information Science and Applications, Lecture Notes in Electrical Engineering. Vol. 514, Springer, Singapore, pp. 273-284, 2018.
[21] W. Lin, T. Lai, C. Chou “Chi-Square-based Steganalysis Method Against Modified Pixel-Value Differencing Steganography”, Arabian Journal for Science and Engineering, Vol.46, Issue.9,pp. 8525-8533,2021.
[22] H. B. Kekre, A. A. Athawale, S. A. Patki, "Improved Steganalysis of LSB Embedded Color Images Based On Stego-Sensitive Threshold Close Color Pair Signature", International Journal of Engineering Science and Technology (IJEST), Vol. 3, Issue. 2, pp. 836-842,2011.
[23] H. B. Kekre, A. A. Athawale and S. A. Patki., "Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix", International Journal of image processing (IJIP), Vol. 5, Issue. 1, pp. 36-45, 2011.
[24] Z. Xia, X. Wang, X. Sun,B. Wang, "Steganalysis of Least Significant Bit Matching using Multi?Order Difference," Security and Communication Networks, Vol. 7, Issue. 8, pp. 1283-1291, 2014.
[25] A. Anjum, S. Islam, "LSB Steganalysis Using Modified Weighted Stego-Image Method," In the Proceedings of the 3rd International Conference on Signal Processing and Integrated Networks (SPIN), IEEE,Noida, pp. 630-635,2016.
[26] O. J. Sandoval, M. C. Hernandez, G. S. Perez, K. T. Medina, H. P. Meana, M. N. Miyatake, "Compact Image Steganalysis For LSB-Matching Steganography", In the Proceedings of the 5th International Workshop on Biometrics and Forensics (IWBF), IEEE, Coventry, pp. 1-6,2017.
[27] Z. Sun, M. Hui, C. Guan, "Steganalysis Based on Co-occurrence Matrix of Differential Image", In the Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE, Harbin, pp. 1097-1100, 2008.
[28] S. Ghanbari, M. Keshtegary, N. Ghanbari,, "New Steganalysis Method using GLCM and Neural Network", International Journal of Computer Applications Vol.42, Issue. 2, pp. 45-50, 2012.
[29] I. A. Khalifa, S. R. Zeebaree, M. Ata?, F. M. Khalifa, "Image Steganalysis In Frequency Domain Using Co-Occurrence Matrix and BPNN" Science Journal of University of Zakho Vol. 7, Issue. 1, pp. 27-32, 2019.
[30] J. Fridrich, M. Goljan, D. Soukal, “Higher-Order Statistical Steganalysis of Palette Images”, In the Proceedings of SPIE 5020, Security and Watermarking of Multimedia Contents V, SPIE , Santa Clara, pp. 178 - 190, 2003.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
