Novel steganalysis schemes for BPCS steganography

被引:2
|
作者
Lou, D. -C. [1 ]
Lin, C. -L. [1 ]
Liu, C. -L. [1 ]
机构
[1] Natl Def Univ, Chung Cheng Inst Technol, Dept Elect Engn, Tao Yuan 33509, Taiwan
来源
IMAGING SCIENCE JOURNAL | 2008年 / 56卷 / 04期
关键词
information hiding; least significant bit (LSB) substitution; bitplane complexity segmentation (BPCS) steganography; x(2) attacks; extend x(2) attacks;
D O I
10.1179/174313108X283964
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
The content of message can be protected by using cryptographic technology, and the encrypted message can be further hidden by information hiding technology. least significant bit (LSB) substitution is a popular steganographic technique in spatial domain and it becomes a trendy topic in studying of detecting the LSB substitution technique. Bitplane complexity segmentation (BPCS) steganography proposed by Kawaguchi and Eason increases the embedding capacity to 50% while the capacity of the tradition LSB substitution only 10% of the cover media. Some BPCS steganalysis schemes are proposed based on the statistical characteristics, in which messages are embedded into least significant bitplane using the BPCS steganography. In the case of the messages embedding bypasses the LSB or into one more bitplanes, the foregoing steganalysis technique will become invalid. In this paper, two novel BPCS steganalysis schemes are proposed to overcome these attacks and to enhance the detective ability of BPCS steganalysis. Experiment results show the feasibility and correctness of the proposed schemes.
引用
收藏
页码:232 / 242
页数:11
相关论文
共 50 条
  • [1] Intensity histogram steganalysis in BPCS-Steganography
    Niimi, M
    Eason, RO
    Noda, H
    Kawaguchi, E
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 : 555 - 564
  • [2] Detection of BPCS-Steganography Using SMWCF Steganalysis and SVM
    Lopez-Hernandez, Julio
    Martinez-Noriega, Raul
    Nakano-Miyatake, Mariko
    Yamaguchi, Kazuhiko
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 689 - +
  • [3] Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis
    Tan, Shunquan
    Huang, Jiwu
    Shi, Yun Q.
    DIGITAL WATERMARKING, PROCEEDINGS, 2008, 5041 : 112 - +
  • [4] JPEG Steganography Using BPCS
    Andrieux, Flavien
    Deltel, Clement
    PROCEEDINGS OF THE 20TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION (SIGITE '19), 2019, : 163 - 163
  • [5] Reliable detection of BPCS steganography
    Wu, Jia
    Zhang, Ru
    Niu, Xin-Xin
    Yang, Yi-Xian
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (04): : 113 - 116
  • [6] Defensive Steganography: A Novel Way against Steganalysis
    Li, Wanqi
    Wang, Heng
    He, Zhiwei
    WEB INFORMATION SYSTEMS AND MINING, PT I, 2011, 6987 : 320 - +
  • [7] Principle and applications of BPCS-steganography
    Kawaguchi, E
    Eason, RO
    MULTIMEDIA SYSTEMS AND APPLICATIONS-BOOK, 1999, 3528 : 464 - 473
  • [8] BPCS-Steganography - Principle and applications
    Kawaguchi, E
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 4, PROCEEDINGS, 2005, 3684 : 289 - 299
  • [9] Steganalysis of transcoding steganography
    Janicki, Artur
    Mazurczyk, Wojciech
    Szczypiorski, Krzysztof
    ANNALS OF TELECOMMUNICATIONS, 2014, 69 (7-8) : 449 - 460
  • [10] Application of BPCS steganography to wavelet compressed video
    Noda, H
    Furuta, T
    Niimi, M
    Kawaguchi, E
    ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 2147 - 2150