Document Type : Research Article



So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a new analytical method for detecting stego images, which is robust against some of the embedding patterns designed specifically to foil steganalysis attempts. The proposed approach is based on the analysis of the eigenvalues of the cover correlation matrix used for the purpose of the study. Image cloud partitioning, vertical correlation function computation, constellation of the correlated data, and eigenvalues examination are the major challenging stages of this analysis method. The proposed method uses the LSB plane of images in spatial domain, extendable to transform domain, to detect low embedding rates-a major concern in the area of the LSB steganography. The simulation results based on deviation detection and rate estimation methods indicated that the proposed approach outperforms some well-known LSB steganalysis methods, specifically at low embedding rates.


[1] S. Dumitrescu, X. Wu, and N. Memon. On steganalysis of random lsb embedding in continuoustone images. In Proceedings IEEE International Conference on Image Processing, ICIP 2002, pages 324-339, Rochester, NY, September 22-25, 2002.
[2] J. Fridrich, R. Du and L. Meng. Steganalysis of lsb encoding in color images. In Proceedings IEEE International Conference on Multimedia and Expo, July 30-August 2, New Yourk, NY, 2000.
[3] S.R. Khosravi-rad, T. Eghlidos, and S. Ghaemmaghami. Higher-order statistical steganalysis of random lsb steganography. In IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), pages 629-632, May 2009.
[4] G. Gul and F. Kurugollu. Svd-based universal spatial domain image steganalysis. IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, JUNE 2010.
[5] R.A. Horn and C.R. Johnson. Matrix analysis. Cambridge university press, 1990.
[6] J. Fridrich and M. Goljan. Practical steganalysis of digital images-state of the art. In Proceedings of SPIE, volume 4675, pages 1-13, 2002.
[7] J. Fridrich and M. Goljan. Reliable detection of lsb steganography in color and grayscale images. Proceedings ACM Workshop on Multimedia and Security, pages 27{30, 2001.
[8] J. Fridrich, M. Goljan, and D. Soukal. Higher- order statistical steganalysis of palette images. In Electronic Imaging 2003, pages 178-190. International Society for Optics and Photonics, 2003.
[9] A.D. Ker. Steganalysis of lsb matching in grayscale images. IEEE Signal Processing Letters, 12(6):441-444, 2005.
[10] A. Ker. A general framework for structural steganalysis of lsb replacement. In Proceedings of the 7th Information Hiding Workshop, volume 3727, pages 296-311. Springer, 2005.
[11] S. Dumitrescu, X. Wu, and Z. Wang. Detection of lsb steganography via sample pair analysis. In IEEE Transactions on Signal Processing, vol. 51, no. 7, pages 1995-2007, 2003.
[12] S. Dumitrescu and X.Wu. Steganalysis of lsb embedding in multimedia signals. In IEEE International Conference on Multimedia and Expo, 2002. ICME02., volume 1, pages 581-584, August 2002.
[13] P. Lu, X. Luo, Q. Tang, and L. Shen. An improved sample pairs method for detection of lsb embedding. In Proceedings of the 6th Information Hiding Workshop, Springer LNCS 3200, pages 116-127, 2004.
[14] L.I. Smith. A tutorial on principal components analysis. Cornell University, USA, 2002.
[15] Boss website. BOSSFinal/.
[16] Nrcs website.
[17] Nrcs website.
[18] D.L. Donoho and I.M. Johnstone. Adapting to unknown smoothness via wavelet shrinkage. Journal of the American statistical association, 90(432): 1200-1224, 1995.
[19] J. Mielikainen. Lsb matching revisited. IEEE Signal Processing Letter, 13(5):285-287, May 2006.
[20] H. Wu, J.L. Dugelay, and Y. Cheung. A data mapping method for steganography and its application to images. In Lecture notes in computer science. Proceedings of the 10th information hiding workshop, pages 236-250. Berlin:Springer, 2008.
[21] T. Pevny`, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In Information Hiding, 12th International Workshop, Lecture Notes in Computer Science, Calgary, Canada, pages 161-177. Springer, 2010.
[22] Patrick Bas, Tomáš Filler, and Tomáš Pevn y`. Break our steganographic system: The ins and outs of organizing boss. In Information Hiding, pages 59-70. Springer, 2011.