Abstract
In parity assignment-based steganography for palette images, all colors in a host image are divided into two subsets, and each pixel is used to carry one secret bit. This paper describes an analytic method against the parity assignment-based steganographic techniques. By finding the rule of color modifications, a steganalyst can attempt to recover the original histogram in a way that is a reverse of data embedding. Because of the abnormal colors in the original image, an excessive operation will cause some negative values in the recovered histogram. This provides a clue for revealing the presence of secret message and estimating the length of embedded bit sequence.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding–A Survey. Proc. IEEE 87, 1062–1078 (1999)
Wang, H., Wang, S.: Cyber Warfare: Steganography vs. Steganalysis. Communication of ACM 47(10), 76–82 (2004)
Fridrich, J., Goljan, M.: Practical Steganalysis of Digital Images–State of the Art. In: Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE, vol. 4675, pp. 1–13 (2002)
Fridrich, J.: A New Steganographic Method for Palette-Based Images. In: Proc. of the IS&T PICS conference, pp. 285–289 (1998)
Fridrich, J., Du, R.: Secure Steganographic Methods for Palette Images. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 47–60. Springer, Heidelberg (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, X., Wang, S. (2005). Analysis of Parity Assignment Steganography in Palette Images. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3683. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11553939_144
Download citation
DOI: https://doi.org/10.1007/11553939_144
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28896-1
Online ISBN: 978-3-540-31990-0
eBook Packages: Computer ScienceComputer Science (R0)