culate a threshold value σ which can then be used for
further monitoring. The evaluation indicated that the
conjecture that SD can be used for detecting attribute
permutation steganography was correct.
The paper (L.Polak and Z.Kotulski, 2010) in-
troduced an algorithm for attribute permutation
steganography detection using a different statistical
measure W which is based on the concept of pre-
dominant order between the pairs of attributes, it
grows linearly with the occupancy of the stego chan-
nel and similarly to our method can be used for thresh-
old based detection. The authors of (L.Polak and
Z.Kotulski, 2010) discuss the issue of stego detection
in the web pages with dynamic content and speculate
that the detection may take into account the dynamic
behavior of W : for the page containing stego mes-
sages W should either have constant high value, or
fluctuate heavily. On the other hand, natural changes
should be regular and periodical. No specific proce-
dure to distinguish these cases was proposed though.
We notice that our monitoring procedure can be easily
deployed with computing W instead of SD.
The paper (W.Jian-feng et al., 2014) proposes the
detection method for attribute permutation steganog-
raphy utilizing the statistics measures and SVM clas-
sification. English translation of (W.Jian-feng et al.,
2014) is not available to us at the moment, but based
in particular on Fig. 1 from the paper, one may con-
clude that the proposed method includes computing
two statistical measures of HTML page: mean of at-
tribute positions and variance of attribute positions,
which are both used as the inputs to a SVM classi-
fier. The paper presents the experimental results on
detection rates varying between 72.4% and 84.6% but
it is not clear for us what was exactly the setting and
whether the dependencies on the channel occupancy
have been addressed.
Future work includes the evaluation of the pro-
posed monitoring procedure for the detection the mes-
sages embedded by other steganographic algorithms
utilizing attribute permutations and its comparison
with the procedures from (L.Polak and Z.Kotulski,
2010) and (W.Jian-feng et al., 2014) on the same set
of steganographic algorithms.
REFERENCES
Huang, H., Zhong, S., and Sun, X. (2008). An algorithm of
webpage information hiding based on attributes per-
mutation. In 4th International Conference on Intelli-
gent Information Hiding and Multimedia Signal Pro-
cessing (IIH-MSP 2008), pages 257–260.
L.Polak and Z.Kotulski (2010). Sending hidden data
through www pages detection and prevention. En-
gng.Trans., 58:75–89.
S.Forrest (2006). Introduction to deogol.
http://www.wandership.ca/projects/deogol.
Shen, D. and Zhao, H. (2010). A novel scheme of webpage
information hiding based on attributes. In Information
Theory and Information Security (ICITIS), 2010 IEEE
International Conference on, pages 1147–1150.
Sui, X.-G. and Luo, H. (2004). A new steganography
method based on hypertext. In Radio Science Con-
ference, 2004. Proceedings. 2004 Asia-Pacific, pages
181–184.
Wendzel, S., Mazurczyk, W., Caviglione, L., and Meier,
M. (2014). Hidden and uncontrolled - on the emer-
gence of network steganographic threats. CoRR,
abs/1407.2029.
W.Jian-feng, H.Liu-sheng, Miao-miao, T., C.Zhi-li, and
M.Hai-bo (2014). Detection of html steganography
based on statistics and svm. Journal of Chinese Com-
puter Systems, 35(6):1221–1225.
Zhao, Q. and Lu, H. (2007). Pca-based web page water-
marking. Pattern Recogn., 40(4):1334–1341.
Zieli
´
nska, E., Mazurczyk, W., and Szczypiorski, K. (2014).
Trends in steganography. Commun. ACM, 57(3):86–
95.
A Statistical Approach to the Detection of HTML Attribute Permutation Steganography
527