Estimating hidden message length in binary image embedded by using boundary pixels steganography

Kang Leng Chiew, Josef Pieprzyk

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

14 Citations (Scopus)
12 Downloads (Pure)

Abstract

In this paper, we propose a new steganalytic method to detect the message hidden in a black and white image using the steganographic technique developed by Liang, Wang and Zhang. Our detection method estimates the length of hidden message embedded in a binary image. Although the hidden message embedded is visually imperceptible, it changes some image statistic (such as inter-pixels correlation). Based on this observation, we first derive the 512 patterns histogram from the boundary pixels as the distinguishing statistic, then we compute the histogram difference to determine the changes of the 512 patterns histogram induced by the embedding operation. Finally we propose histogram quotient to estimate the length of the embedded message. Experimental results confirm that the proposed method can effectively and reliably detect the length of the embedded message.

Original languageEnglish
Title of host publication 2010 International Conference on Availability, Reliability and Security (ARES 2010)
Place of PublicationPiscataway, N.J.
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages683-688
Number of pages6
ISBN (Electronic)9781424458806, 9780769539652
ISBN (Print)9781424458790
DOIs
Publication statusPublished - Feb 2010
Event5th International Conference on Availability, Reliability, and Security, ARES - 2010 - Krakow, Poland
Duration: 15 Feb 201018 Feb 2010

Other

Other5th International Conference on Availability, Reliability, and Security, ARES - 2010
CountryPoland
CityKrakow
Period15/02/1018/02/10

Bibliographical note

Copyright 2010 IEEE. Reprinted from Proceedings, the Fifth International Conference on Availability, Reliability and Security : Krakow, Poland, 15-18 February 2010. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Fingerprint Dive into the research topics of 'Estimating hidden message length in binary image embedded by using boundary pixels steganography'. Together they form a unique fingerprint.

Cite this