Abstract
Highly Undetectable steGO (HUGO steganography) is a well-known image steganography method proposed in recent years. The security of HUGO steganography is analyzed in this paper, and a corresponding steganalysis method is proposed based on the blind coding parameters recognition. Firstly, the principle of covert communication based on HUGO steganography and the characteristics of the Syndrome-Trellis codes (STCs) used in HUGO are analyzed; and then the potential security risk of HUGO is pointed out; Secondly, based on the idea of the blind parameters recognition for channel coding, the submatrix parameter of STCs is recognized correctly, and thus the message embedded by HUGO can be extracted correctly by decode algorithm of STCs. A series of experimental results show that the proposed steganalysis method can not only detect the stego-images reliably, but also extract the embedded message correctly; these validated the existence of security flaw of HUGO steganography.








Similar content being viewed by others
Notes
BossBase-1.01[EB/OL]. http://exile.felk.cvut.cz/boss/BOSSFinal/.2013
References
Fridrich J, Kodovsky J, Goljan M and Holub V (2011) Steganalysis of content-adaptive steganography in spatial domain. Proceedings of the 13th International Workshop on Information Hiding, Prague, 102–117
Guo LJ, Ni JQ, and Shi YQ (2012) An efficient JPEG steganographic scheme using uniform embedding. Proceedings of the 4th IEEE International Workshop on Information Forensics and Security, Tenerife, 169–174
Gul G, Kurugollu F. (2011) A new methodology in steganalysis: Breaking highly undetectable steganography. Proceedings of the 13th International Workshop on Information Hiding, Prague, 71–84
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. Proceedings of the 4th IEEE International Workshop on Information Forensics and Security, Tenerife, 69–76
Holub V, Fridrich J (2013) Digital image steganography using universal distortion. Proceedings of the 1st ACM workshop on information hiding and multimedia security. Montpellier, 59–68
Holub V, Fridrich J (2013) Random projections of residuals as an alternative to co-occurrences in steganalysis. In: Proceedings of SPIE, electronic imaging, media watermarking, security, and forensics, California, 8665:1–11
Huang FJ, Huang JW, Shi YQ (2012) New channel selection rule for JPEG steganography. IEEE Trans Inf Forensc Security 7(4):1181–1191
Kodovsky J, Fridrich J (2009) Calibration revisited. In: Proceedings of the 11th ACMWorkshop on Multimedia and Security, Montpellier, 63–74
Kodovsky J, Fridrich J, Holub V (2011) On dangers of overtraining steganography to incomplete cover model. Proceedings of the 13th ACM workshop on multimedia and security, Niagara Falls, 69–76
Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensc Security 7(2):432–444
Kodovsky J, Fridrich J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensc Security 7(3):868–882
Kodovsky J, Fridrich J (2013) Quantitative steganalysis using rich models. Proceedings of SPIE, Electronic Imaging, Security and Forensics of Multimedia XV, California, 1–11
Luo WQ, Huang FJ, Huang JW (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensc Security 5(2):182–193
Luo XY, Wang DX, Wang P, Liu FL (2008) A review on blind detection for image steganography. Signal Process 88(9):2138–2157
Luo XY, Liu FL, Lian SG, Yang CF (2011) On the Typical Statistic Features for Image Blind Steganalysis. IEEE J Selected AreasCommun 29(7):1404–1422
Li FY, Zhang XP, Yu J, Shen WF (2014) Adaptive JPEG steganography with new distortion function. Ann Telecommun 69(7–8):431–440
Provos N (2011) Defending against statistical steganalysis. In: Proceedings of the 10th conference on USENIX Security Symposium. Washington, 323–335
Rukhin A, Soto J, Nechvatal J (2008) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800–22
Shi Y Q, Sutthiwan P, Chen LC (2011) Textural features for steganalysis. Proceedings of the 14th International Workshop on Information Hiding. Berkeley, 63–77
Tomas P, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensc Security 5(2):215–224
Tomas P, Tomas F, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. Proceedings of the 12th International Workshop on Information Hiding, Calgary, 161–177
Tomas F, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensc Security 6(3):920–935
Tomass F, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, San Francisco, 2011, 1–14
Wang Y, Moulin P (2007) Optimized feature extraction for learning-based image steganalysis. IEEE Trans Inf Forensc Security 2(1):31–45
Westfeld A (2001) F5-a steganographic algorithm: high capacity despite better steganalysis. Proceedings of the 4th International Workshop on Information Hiding, Pittsburgh, 289–302
Acknowledgments
This work was supported by the National Natural Science Foundation of China (No. 61379151, 61272489, 61302159, 61401512 and 61373020), the Excellent Youth Foundation of Henan Province of China (No. 144100510001), and the Foundation of Science and Technology on Information Assurance Laboratory (No. KJ-14-108).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Luo, X., Song, X., Li, X. et al. Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75, 13557–13583 (2016). https://doi.org/10.1007/s11042-015-2759-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2759-2