Reliable detection of BPCS steganography

被引:0
|
作者
Wu, Jia [1 ,2 ]
Zhang, Ru [1 ,2 ]
Niu, Xin-Xin [1 ,2 ]
Yang, Yi-Xian [1 ,2 ]
机构
[1] State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
[2] National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
来源
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications | 2009年 / 32卷 / 04期
关键词
Graphic methods - Steganography - Signal detection;
D O I
暂无
中图分类号
学科分类号
摘要
Bit-plane complexity segmentation (BPCS) steganography replaces bit-plane pixel blocks of high complexity with secret data. The continuity of the complexity histogram of the pixel block is affected by the embedded data. Based on the analysis of the security flaw in the BPCS steganography, a detection algorithm against BPCS embedding is proposed. The algorithm can reliably detect the existence of hidden data. It is easy to implement and computationally efficient, and suitable for real-time detection.
引用
收藏
页码:113 / 116
相关论文
共 50 条
  • [31] Retransmission steganography and its detection
    Wojciech Mazurczyk
    Miłosz Smolarczyk
    Krzysztof Szczypiorski
    Soft Computing, 2011, 15 : 505 - 515
  • [32] Toward network steganography detection
    Krzysztof Szczypiorski
    Wojciech Mazurczyk
    Telecommunication Systems, 2012, 49 : 161 - 162
  • [33] Universal detection of JPEG steganography
    Barbier, Johann
    Filiol, Éric
    Mayoura, Kichenakoumar
    Journal of Multimedia, 2007, 2 (02): : 1 - 9
  • [34] Steganography detection using RBFNN
    Chen, Mei-Ching
    Agaian, Sos S.
    Chen, C. L. Philip
    Rodriguez, Benjamin M.
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3720 - +
  • [35] Blind Detection for JPEG Steganography
    Yu, Wenqiong
    Li, Zhuo
    Ping, Lingdi
    2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, : 128 - 132
  • [36] Effective Linguistic Steganography Detection
    Chen Zhi-Li
    Huang Liu-Sheng
    Yu Zhen-Shan
    Zhao Xin-Xin
    Zheng Xue-Ling
    8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, : 224 - 229
  • [37] A LSB steganography detection algorithm
    Li, Z
    Sui, AF
    Yang, YX
    PIMRC 2003: 14TH IEEE 2003 INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS PROCEEDINGS, VOLS 1-3 2003, 2003, : 2780 - 2783
  • [38] A Reliable Covert Channel over IEEE 802.15.4 using Steganography
    Nain, Ajay Kumar
    Rajalakshmi, P.
    2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 711 - 716
  • [39] Cover image preprocessing for more reliable LSB replacement steganography
    Shreelekshmi, R.
    Wilscy, M.
    Madhavan, C. E. Veni
    2010 INTERNATIONAL CONFERENCE ON SIGNAL ACQUISITION AND PROCESSING: ICSAP 2010, PROCEEDINGS, 2010, : 153 - 156
  • [40] Reliable steganalysis of HUGO steganography based on partially known plaintext
    Gan, Junjun
    Liu, Jiufen
    Luo, Xiangyang
    Yang, Chunfang
    Liu, Fenlin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18007 - 18027