Chosen-key extracting attack to random LSB steganography

A chosen-key extracting attack based on random LSB steganography was proposed.By constructing an orient ring model for a sort of pseudo-random steganography algorithms,it proved that there are many equivalent keys and neighboring keys in the model,and then proposed a method to calculate the number o...

Full description

Saved in:
Bibliographic Details
Main Authors: CHEN Jia-yong1, ZHU Yue-fei1, ZHANG Wei-ming2, LIU Jiu-fen2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2010-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74647184/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537737893609472
author CHEN Jia-yong1
ZHU Yue-fei1
ZHANG Wei-ming2
LIU Jiu-fen2
author_facet CHEN Jia-yong1
ZHU Yue-fei1
ZHANG Wei-ming2
LIU Jiu-fen2
author_sort CHEN Jia-yong1
collection DOAJ
description A chosen-key extracting attack based on random LSB steganography was proposed.By constructing an orient ring model for a sort of pseudo-random steganography algorithms,it proved that there are many equivalent keys and neighboring keys in the model,and then proposed a method to calculate the number of equivalent keys.With the charac-ter of equivalent keys,neighboring keys and outlier detection method,the proposed scheme achieved lower computational complexity than the method proposed by Fridrich.Both academic results and experimental results indicated that the algorithm was reliable even with rather big error in estimating the embedding rate.
format Article
id doaj-art-8d9ed7ffdf0e409ca7280790c0a4e82f
institution Kabale University
issn 1000-436X
language zho
publishDate 2010-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-8d9ed7ffdf0e409ca7280790c0a4e82f2025-01-14T08:25:36ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-0131738074647184Chosen-key extracting attack to random LSB steganographyCHEN Jia-yong1ZHU Yue-fei1ZHANG Wei-ming2LIU Jiu-fen2A chosen-key extracting attack based on random LSB steganography was proposed.By constructing an orient ring model for a sort of pseudo-random steganography algorithms,it proved that there are many equivalent keys and neighboring keys in the model,and then proposed a method to calculate the number of equivalent keys.With the charac-ter of equivalent keys,neighboring keys and outlier detection method,the proposed scheme achieved lower computational complexity than the method proposed by Fridrich.Both academic results and experimental results indicated that the algorithm was reliable even with rather big error in estimating the embedding rate.http://www.joconline.com.cn/zh/article/74647184/steganographysteganalysispseudo-random permutationstego-keyextracting attackJSteg
spellingShingle CHEN Jia-yong1
ZHU Yue-fei1
ZHANG Wei-ming2
LIU Jiu-fen2
Chosen-key extracting attack to random LSB steganography
Tongxin xuebao
steganography
steganalysis
pseudo-random permutation
stego-key
extracting attack
JSteg
title Chosen-key extracting attack to random LSB steganography
title_full Chosen-key extracting attack to random LSB steganography
title_fullStr Chosen-key extracting attack to random LSB steganography
title_full_unstemmed Chosen-key extracting attack to random LSB steganography
title_short Chosen-key extracting attack to random LSB steganography
title_sort chosen key extracting attack to random lsb steganography
topic steganography
steganalysis
pseudo-random permutation
stego-key
extracting attack
JSteg
url http://www.joconline.com.cn/zh/article/74647184/
work_keys_str_mv AT chenjiayong1 chosenkeyextractingattacktorandomlsbsteganography
AT zhuyuefei1 chosenkeyextractingattacktorandomlsbsteganography
AT zhangweiming2 chosenkeyextractingattacktorandomlsbsteganography
AT liujiufen2 chosenkeyextractingattacktorandomlsbsteganography