access icon free Steganalysis of JPEG images using enhanced neighbouring joint density features

In this study, a blind steganalysis approach which accurately discloses low rate data hiding schemes is proposed. The absolute values of neighbouring joint density (absNJ) are used for feature extraction. In this way, the intra- and inter-block situations are employed providing a variety of different features. Aside from the absolute values of discrete cosine transform (DCT) coefficients, the differential DCT coefficients are also exploited to extract the features. Moreover, the absNJ features will be extended and used over differential DCT coefficients. It is shown that applying the Pth power of the DCT coefficients instead of their first power gains more discriminative features. Then, using the ensemble classifier, the cover image is discriminated from the stego one. Experimental results indicate the efficiency of the new scheme in comparison with the previously presented schemes.

Inspec keywords: feature extraction; steganography; discrete cosine transforms; image coding

Other keywords: interblock situations; feature extraction; differential DCT coefficients; data hiding schemes; discrete cosine transform; enhanced neighbouring joint density features; absNJ features; steganalysis; intrablock situations; absolute values of neighbouring joint density; JPEG images; blind steganalysis approach

Subjects: Computer vision and image processing techniques; Image and video coding; Data security; Integral transforms; Cryptography; Integral transforms

References

    1. 1)
    2. 2)
      • 4. Sallee, P.: ‘Model based steganography’, 2004 (LNCS2939), pp. 154167.
    3. 3)
      • 14. Liu, Q., Sung, A.H., Qiao, M.: ‘Improved detection and evaluation for JPEG steganalysis’. Proc. ACM Multimedia, 2009, pp. 873876.
    4. 4)
    5. 5)
      • 6. Kodovsky, J., Fridrich, J., Pevny, T.: ‘Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities’. Proc. Ninth ACM Multimedia and Security Workshop, 2007, pp. 314.
    6. 6)
    7. 7)
      • 1. Westfeld, A.: ‘F5 – a steganographic algorithm, high capacity despite better steganalysis’, 2001 (LNCS, 2137), pp. 289302.
    8. 8)
      • 17. Rencher, A.C.: ‘Methods of multivariate analysis’ (John Wiley, New York, 1995).
    9. 9)
      • 8. Sarkar, A., Solanki, K., Manjunath, B.S.: ‘Further study on YASS: steganography based on randomized embedding to resist blind steganalysis’. Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, 2008, vol. 6819, pp. 1631.
    10. 10)
      • 7. Solanki, K., Sarkar, A., Manjunath, B.S.: ‘YASS: yet another steganographic scheme that resists blind steganalysis’. Proc. Ninth Int. Workshop Information Hiding, 2007, vol. 4567, pp. 1631.
    11. 11)
      • 10. Kodovsky, J., Fridrich, J.: ‘Calibration revisited’. Proc. 11th ACM Multimedia and Security Workshop, NJ, Princeton, 2009, pp. 6374.
    12. 12)
      • 11. Pevný, T., Fridrich, J.: ‘Merging Markov and DCT features for multiclass JPEG steganalysis’. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, 2007, vol. 6505, pp. 114.
    13. 13)
      • 16. Liu, Q.: ‘Steganalysis of DCT-embedding based adaptive steganography and YASS’. Proc. 13th ACM Multimedia and Security Workshop, 2011, pp. 7786.
    14. 14)
      • 20. Kodovsky, J., Fridrich, J.: ‘Steganalysis in high dimensions: fusing classifiers built on random subspaces’. Proc. SPIE, Electronic Imaging, Media, Watermarking, Security and Forensics XIII, 2011, vol. 7880.
    15. 15)
      • 3. Provos, N.: ‘Defending against statistical steganalysis’. Proc. 10th USENIX Security Symp., 2001.
    16. 16)
      • 9. Chen, C., Shi, Y.Q.: ‘JPEG image steganalysis utilizing both intrablock and interblock correlations’. IEEE ISCAS, Int. Symp. on Circuits and Systems, 2008, pp. 30293032.
    17. 17)
    18. 18)
    19. 19)
    20. 20)
      • 19. ‘BOWS-2 image database’, http://www.bows2.ec-lille.fr/.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2013.0823
Loading

Related content

content/journals/10.1049/iet-ipr.2013.0823
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading