this technique, a few examples are: Camouflage
(Camouflage, 2007) , JpegX (JpegX, 2007) , Safe &
Quick Hide Files (Safe, 2007) and Data Stash
(DataStash, 2007).
The other main steganography embedding
methods are discussed next according to their order
of robustness against statistical steganalysis attacks.
2.1 LSB Sequential Embedding
In this process every byte of the image represents a
color value which can be changed by 1 without
leaving a trace in the output image. Thus the LSB of
the image at position 2
0
is used (Cole and Krutz,
2003) (Katzenbeisser and Petitcolas, 2000), (Provos
and Honeyman, 2003). The secret message is
distributed sequentially on the LSB of each byte of
the image.
The main limitation of this approach is that the
secret message may change the LSB by a probability
of 0.5, thus in the steganalysis process this can be
utilized by checking the pairs which has 0.5
distribution of 1’s and 0’s. Where a pair is considered
as any two bytes in which the 7 MSB are the same,
for example 0101 1010 and 0101 1011 represent a
pair.
2.2 LSB Random Embedding
This approach is somewhat similar to the previous
one except that the LSB embedding is done randomly
instead of being sequential. This technique is more
robust to steganalysis attacks compared to the
sequential technique because of distributing the
secret message across the image without affecting the
statistical property of the contiguous color values.
However; if the secret message uses all the
available LSBs in the cover image then the
embedding process can be easily detected by the
steganalysis operations since all the LSBs were
modified which is similar to the sequential method
(Katzenbeisser and Petitcolas, 2000), (Lenti, 2000),
(Johnson and Jajodia, 1998).
Any randomly selected LSB should not be reused
again in the embedding process otherwise it will be
overwritten. In our proposed system in section 4 we
describe a swapping process that is developed to
obtain an unrepeated sequence of LSBs.
2.3 Changing Pairs
Changing pairs can be considered as one of the
hardest LSB embedding methods to detect by
steganalysis. It is relatively better than the random
method because it randomizes the embedding process
without modifying the bit that will be used in the
embedding process.
This process increments or decrements the color
value by an odd value (mainly 1 or 3) which may
result in changing the whole 8 bits used to represent a
color value but the actual colour value (intensity) is
only incremented or decremented by a small amount
such that the difference is not easily noticeable by the
human eye (Soukal and Goljan, 2005) .
For example, if the color value is 127 (0111 1111
in binary) and the secret bit is 0, then in the normal
LSB embedding the result will be 0111 1110 which
is 126 but the pair 0111 111 was not changed,
however when using the changing pair method if the
selection was to increment then 127 will become 128
which is 1000 0000, so the LSB still contains the
secret bit which is 0 but at the same time the pair has
been changed from 0111 111 to 1000 000 which
clearly makes a difference in statistical terms for the
steganalysis.
The Changing Pairs algorithm can be summarized as
follows:
1. Read all Bytes of the Image.
2. Select one byte randomly using a key.
3. Decide whether the LSB of that byte is to be
changed by comparing the LSB with the secret
bit.
4. If yes, flip a coin to decide whether to increment
or to decrement by an odd value.
5. Repeat processes 1, 2, 3 and 4 until the end of
the secret message.
6. Write all bytes to the output Image.
3 SPATIAL-DOMAIN
STEGANALYSIS
Even though stego-images can rarely be spotted by
the naked eye, they usually leave behind some traces
or statistical hints that they have been modified. It is
that discrepancy which an analysis tool may be able
to detect. Since some techniques and their effects are
commonly known, a statistical analysis of an image
can be performed to check for the presence of a
hidden message.
There are two main types of steganalysis
methods: the visual steganalysis and the statistical
steganalysis. These tests can be applied on a given
image to check if a secret message is embedded in it
or not.
SIGMAP 2007 - International Conference on Signal Processing and Multimedia Applications
242