© The Institution of Engineering and Technology
In this study, a blind steganalysis approach which accurately discloses low rate data hiding schemes is proposed. The absolute values of neighbouring joint density (absNJ) are used for feature extraction. In this way, the intra- and inter-block situations are employed providing a variety of different features. Aside from the absolute values of discrete cosine transform (DCT) coefficients, the differential DCT coefficients are also exploited to extract the features. Moreover, the absNJ features will be extended and used over differential DCT coefficients. It is shown that applying the Pth power of the DCT coefficients instead of their first power gains more discriminative features. Then, using the ensemble classifier, the cover image is discriminated from the stego one. Experimental results indicate the efficiency of the new scheme in comparison with the previously presented schemes.
References
-
-
1)
-
15. Liu, Q., Sung, A.H., Qiao, M.: ‘Neighboring joint density-based JPEG steganalysis’, ACM Trans. Intell. Syst. Technol., 2011, 2, (2), (doi: 10.1145/1899412.1899420).
-
2)
-
4. Sallee, P.: ‘Model based steganography’, 2004 (2939), pp. 154–167.
-
3)
-
14. Liu, Q., Sung, A.H., Qiao, M.: ‘Improved detection and evaluation for JPEG steganalysis’. Proc. ACM Multimedia, 2009, pp. 873–876.
-
4)
-
T. Pevny ,
P. Bas ,
J. Fridrich
.
Steganalysis by subtractive pixel adjacency matrix.
IEEE Trans. Inf. Forensics Sec.
,
2 ,
215 -
224
-
5)
-
6. Kodovsky, J., Fridrich, J., Pevny, T.: ‘Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities’. Proc. Ninth ACM Multimedia and Security Workshop, 2007, pp. 3–14.
-
6)
-
N. Provos ,
P. Honeyman
.
Hide and seek: an introduction to steganography.
IEEE Secur. Priv.
,
3 ,
32 -
44
-
7)
-
1. Westfeld, A.: ‘F5 – a steganographic algorithm, high capacity despite better steganalysis’, 2001 (, 2137), pp. 289–302.
-
8)
-
17. Rencher, A.C.: ‘Methods of multivariate analysis’ (John Wiley, New York, 1995).
-
9)
-
8. Sarkar, A., Solanki, K., Manjunath, B.S.: ‘Further study on YASS: steganography based on randomized embedding to resist blind steganalysis’. Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, 2008, vol. 6819, pp. 16–31.
-
10)
-
7. Solanki, K., Sarkar, A., Manjunath, B.S.: ‘YASS: yet another steganographic scheme that resists blind steganalysis’. Proc. Ninth Int. Workshop Information Hiding, 2007, vol. 4567, pp. 16–31.
-
11)
-
10. Kodovsky, J., Fridrich, J.: ‘Calibration revisited’. Proc. 11th ACM Multimedia and Security Workshop, NJ, Princeton, 2009, pp. 63–74.
-
12)
-
11. Pevný, T., Fridrich, J.: ‘Merging Markov and DCT features for multiclass JPEG steganalysis’. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, 2007, vol. 6505, pp. 1–14.
-
13)
-
16. Liu, Q.: ‘Steganalysis of DCT-embedding based adaptive steganography and YASS’. Proc. 13th ACM Multimedia and Security Workshop, 2011, pp. 77–86.
-
14)
-
20. Kodovsky, J., Fridrich, J.: ‘Steganalysis in high dimensions: fusing classifiers built on random subspaces’. Proc. SPIE, Electronic Imaging, Media, Watermarking, Security and Forensics XIII, 2011, vol. 7880.
-
15)
-
3. Provos, N.: ‘Defending against statistical steganalysis’. Proc. 10th USENIX Security Symp., 2001.
-
16)
-
9. Chen, C., Shi, Y.Q.: ‘JPEG image steganalysis utilizing both intrablock and interblock correlations’. IEEE ISCAS, Int. Symp. on Circuits and Systems, 2008, pp. 3029–3032.
-
17)
-
18. Fridrich, J., Goljan, M., Soukal, D.: ‘Wet paper codes with improved embedding efficiency’, IEEE Trans. Inf. Forensics Sec., 2006, 1, (1), pp. 102–110 (doi: 10.1109/TIFS.2005.863487).
-
18)
-
30. Kodovsky, J., Fridrich, J., Holub, V.: ‘Ensemble classifiers for steganalysis of digital media’, IEEE Trans. Inf. Forensics Sec., 2012, 7, (2), pp. 432–444 (doi: 10.1109/TIFS.2011.2175919).
-
19)
-
5. Sallee, P.: ‘Model-based methods for steganography and steganalysis’, Int. J. Image Graphic, 2005, 5, (1), pp. 167–189 (doi: 10.1142/S0219467805001719).
-
20)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2013.0823
Related content
content/journals/10.1049/iet-ipr.2013.0823
pub_keyword,iet_inspecKeyword,pub_concept
6
6