logo

SCIENCE CHINA Information Sciences, Volume 61, Issue 11: 119103(2018) https://doi.org/10.1007/s11432-017-9328-2

Extracting hidden messages of MLSB steganography based on optimal stego subset

More info
  • ReceivedNov 11, 2017
  • AcceptedDec 29, 2017
  • PublishedSep 12, 2018

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by National Natural Science Foundation of China (Grant Nos. 61302159, 61401512, 61772549, 61379151, 61602508, U1736214) and Science and Technology Research Project of Henan Province, China (Grant No. 152102210005).


Supplement

Appendixes A–E.


References

[1] Liu J, Tian Y, Han T. Stego key searching for LSB steganography on JPEG decompressed image. Sci China Inf Sci, 2016, 59: 032105 CrossRef Google Scholar

[2] Fridrich J, Goljan M, Soukal D. Searching for the stego-key. In: Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, 2004. 70--82. Google Scholar

[3] Ker A D. Locating steganographic payload via WS residuals. In: Proceedings of 10th Workshop on Multimedia and Security, Oxford, 2008. 27--31. Google Scholar

[4] Ker A D, Lubenko I. Feature reduction and payload location with WAM steganalysis. In: Proceedings of SPIE 7254, Media Forensics and Security, San Jose, 2009. 72540A. Google Scholar

[5] Quach T T. Optimal cover estimation methods and steganographic payload location. IEEE TransInformForensic Secur, 2011, 6: 1214-1222 CrossRef Google Scholar

[6] Quach T T. Cover estimation and payload location using Markov random fields. In: Proceedings of SPIE 9028, Electronic Imaging, Media Watermarking, Security, and Forensics, San Francisco, 2014. 90280H. Google Scholar

[7] Liu J, Tian Y, Han T. LSB steganographic payload location for JPEG-decompressed images. Digital Signal Processing, 2015, 38: 66-76 CrossRef Google Scholar

[8] Huang Y F, Tao H Z, Xiao B. Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys. Sci China Technol Sci, 2017, 60: 1585-1596 CrossRef Google Scholar

  • Figure 1

    (Color online) Performance of the proposed algorithms and previous algorithms for 2LSB steganography. (a) Performance of the stego key recovery algorithms; (b) performance of the payload location algorithms when the embedding ratio $p=0.5$.

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1