Blind steganalysis

a countermeasure for binary image steganography

Kang Leng Chiew, Josef Pieprzyk

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

17 Citations (Scopus)
66 Downloads (Pure)


In this paper, we propose a new blind steganalytic method to detect the presence of secret messages embedded in black and white images using the steganographic techniques. We start by extracting several sets of matrix, such as run length matrix, gap length matrix and pixel difference. We also apply characteristic function on these matrices to enhance their discriminative capabilities. Then we calculate the statistics which include mean, variance, kurtosis and skewness to form our feature sets. The presented empirical works demonstrate our proposed method can effectively detect three different types of steganography. This proves the universality of our proposed method as a blind steganalysis. In addition, the experimental results show our proposed method is capable of detecting small amount of the embedded message.

Original languageEnglish
Title of host publication 2010 International Conference on Availability, Reliability and Security (ARES 2010)
Place of PublicationPiscataway, N.J.
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages6
ISBN (Electronic)9781424458806, 9780769539652
ISBN (Print)9781424458790
Publication statusPublished - Feb 2010
Event5th International Conference on Availability, Reliability, and Security, ARES - 2010 - Krakow, Poland
Duration: 15 Feb 201018 Feb 2010


Other5th International Conference on Availability, Reliability, and Security, ARES - 2010

Bibliographical note

Copyright 2010 IEEE. Reprinted from Proceedings, the Fifth International Conference on Availability, Reliability and Security : Krakow, Poland, 15-18 February 2010. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Fingerprint Dive into the research topics of 'Blind steganalysis: a countermeasure for binary image steganography'. Together they form a unique fingerprint.

Cite this