# Searching for the stego-key

@inproceedings{Fridrich2004SearchingFT, title={Searching for the stego-key}, author={Jessica J. Fridrich and Miroslav Goljan and David Soukal}, booktitle={IS\&T/SPIE Electronic Imaging}, year={2004} }

Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedding, recover the stego key, and finally extract the hidden message. In this paper, we present a methodology for identifying the stego key in key-dependent steganographic schemes. Previous approaches for stego key search were exhaustive searches looking for some recognizable structure (e.g., header) in the extracted bit… Expand

#### Topics from this paper

#### 79 Citations

Stego key searching for LSB steganography on JPEG decompressed image

- Mathematics, Computer Science
- Science China Information Sciences
- 2015

The proposed method can successfully recover the stego key in LSB replacement and LSB matching, i.e., the extracting attack is successful, and it outperforms three previous methods in terms of computational complexity. Expand

On the Unicity Distance of Stego Key

- Computer Science
- ArXiv
- 2005

The difficulty of extracting hidden information is analyzed with information-theoretic method in the terms of unicity distance of steganographic key (abbreviated stego key), which shows the relations between key rate, message rate, hiding capacity and difficulty of extraction. Expand

Extracting hidden messages of MLSB steganography based on optimal stego subset

- Computer Science
- Science China Information Sciences
- 2018

Algorithms can be used to effectively extract all hidden message bits of LSB steganography under certain specific conditions and there is still a lack of effective algorithms to extract the hidden messages of most steganographic algorithms. Expand

Stego key recovery based on the optimal hypothesis test

- Computer Science
- Multimedia Tools and Applications
- 2017

Methods of recovering the stego key for least significant bit (LSB) steganography in the JPEG domain based on the differences in the statistical properties of the discrete cosine transform coefficients between the paths generated by the correct and incorrect keys are studied. Expand

Efficient stego key recovery based on distribution differences of extracting message bits

- Computer Science
- Journal of Real-Time Image Processing
- 2018

The methods of efficient stego key recovery for LSB steganography in JPEG domain by utilizing the distribution differences between message bits extracted by the correct and incorrect keys and a stegO key recovery method based on parametric hypothesis test is proposed. Expand

Cryptographic Secrecy Analysis of Adaptive Steganographic Syndrome-Trellis Codes

- Computer Science
- Secur. Commun. Networks
- 2021

In this manuscript, the cryptographic secrecy of this kind of steganography is analyzed, on condition of two common attacks: stego-only attack and known-cover attack, respectively, from three perspectives: steganographic key equvocation, message equivocation, and unicity distance of the steganographical key. Expand

Forensic steganalysis: determining the stego key in spatial domain steganography

- Mathematics, Engineering
- IS&T/SPIE Electronic Imaging
- 2005

It is shown that in the spatial domain the stego key search can be made significantly more efficient by working with the noise component of the image obtained using a denoising filter. Expand

Extracting hidden messages in steganographic images

- Computer Science
- Digit. Investig.
- 2014

It is shown that the expected mean residuals contain enough information to logically order the located payload provided that the size of the payload in each stego image is not fixed. Expand

Stego key recovery method for F5 steganography with matrix encoding

- Computer Science
- EURASIP J. Image Video Process.
- 2020

Experimental results show that the proposed method can recover the stego key accurately and efficiently, even when the existing Xu’s method fails for the high or very low embedding ratio. Expand

A review of forensic approaches to digital image Steganalysis

- Computer Science
- Multimedia Tools and Applications
- 2019

Details about important forensic techniques as available in the steganalysis literature are given and digital image domain for determination of the embedding algorithm, estimation of the secret message payload and stego key determination are presented. Expand

#### References

SHOWING 1-10 OF 22 REFERENCES

New methodology for breaking steganographic techniques for JPEGs

- Mathematics, Engineering
- IS&T/SPIE Electronic Imaging
- 2003

This paper identifies two limitations of the proposed approach and shows how they can be overcome to obtain accurate detection in every case and outlines a condition that must be satisfied by all secure high-capacity steganographic algorithms for JPEGs. Expand

Higher-order statistical steganalysis of palette images

- Computer Science, Engineering
- IS&T/SPIE Electronic Imaging
- 2003

A new higher-order steganalytic method called Pairs Analysis for detection of secret messages embedded in digital images, which enables more reliable and accurate message detection than previous methods. Expand

Defending Against Statistical Steganalysis

- Computer Science
- USENIX Security Symposium
- 2001

Improved methods for information hiding are presented and an a priori estimate is presented to determine the amount of data that can be hidden in the image while still being able to maintain frequency count based statistics. Expand

Digital image steganography using stochastic modulation

- Mathematics, Engineering
- IS&T/SPIE Electronic Imaging
- 2003

A new steganographic paradigm for digital images in raster formats that achieves oblivious data transfer without using noise extraction algorithms or error correction, and extends stochastic modulation to a content-dependent device noise. Expand

On the limits of steganography

- Computer Science
- IEEE J. Sel. Areas Commun.
- 1998

It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography. Expand

Steganographic system based on higher-order statistics

- Engineering, Computer Science
- IS&T/SPIE Electronic Imaging
- 2003

This work investigates the well known steganographic tool Jsteg as well as a newer approach proposed by Eggers et al., which relies on histogram-preserving data mapping, which shows weaknesses leading to a certain detectability. Expand

A new approach to reliable detection of LSB steganography in natural images

- Mathematics, Computer Science
- Signal Process.
- 2003

A physical quantity derived from the transition coefficients between difference image histograms of an image and its processed version produced by setting all bits in the LSB plane to zero appears to be a good measure of the weak correlation between successive bit planes and can be used to discriminate stego-images from cover images. Expand

Detecting Low Embedding Rates

- Computer Science, Mathematics
- Information Hiding
- 2002

This paper shows three approaches for detecting steganograms with low change density, a steganographic algorithm with a very low embedding rate, and another algorithm (Hide), constructed to be secure against visual and statistical chi-square attacks. Expand

On estimation of secret message length in LSB steganography in spatial domain

- Mathematics, Computer Science
- IS&T/SPIE Electronic Imaging
- 2004

The concept of a weighted stego image is introduced and the problem of determining the unknown message length as a simple optimization problem is formulated to obtain more stable and accurate results for a wide spectrum of natural images. Expand

Steganalysis of additive-noise modelable information hiding

- Mathematics, Engineering
- IS&T/SPIE Electronic Imaging
- 2003

It is shown that these embedding methods are equivalent to a lowpass filtering of histograms that is quantified by a decrease in the HCF center of mass (COM). Expand