A new feature extraction scheme in wavelet transform for stego image classification

In steganalysis, there exist a good number of feature extraction techniques; the most commonly used feature extraction technique is based on the Discrete Wavelet Transform (DWT). Almost all of the techniques give a higher detection rate even for short messages, but they are limited to statistical moments such as Characteristic Function (CF) and Probability Density Function (PDF) moments to build their feature sets. A new feature extraction scheme in wavelet transform is presented in this paper. It is based on the adaptation of Zipf’s law to wavelet transform to extract new features obtained from the statistical distributions of wavelet pattern subbands that are represented by a graphical representation called a curve of Zipf. The originality of this work can be shown through two perspectives: the adaptation of Zipf’s law to wavelet subbands, which involves the determination of the pattern size used to count the frequency of pattern appearance, and an encoding model, which makes the distribution of pattern frequencies more significant. Moreover, this novel scheme proposes a new feature set extracted from the curve of Zipf of the wavelet subband coefficients, which is the first such attempt in DWT and the field of steganalysis. A Random Forest classifier (RF) is then used to model the resulting features. Experimental results show that the proposed steganalytic method has the best classification performance in terms of accuracy, which achieved 88.9, 78.25, 84.27 and 60.1%, compared with three feature sets based on CF moments and Markov features, histogram features, and co-occurrence matrix features, respectively.

[1]  Hs Sudhira,et al.  An approach to regional planning in India , 2012, Int. J. Syst. Syst. Eng..

[2]  Anindya Sarkar,et al.  YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.

[3]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[4]  John L. Casti,et al.  Bell curves and monkey languages: When do empirical relations become a law of nature? , 1995, Complex.

[5]  L. Egghe,et al.  The power of power laws and an interpretation of Lotkaian informetric systems as self-similar fractals , 2005, J. Assoc. Inf. Sci. Technol..

[6]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..

[7]  Qingzhong Liu,et al.  Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images , 2008, Pattern Recognit..

[8]  Lucien Benguigui,et al.  Beyond the power law - a new approach to analyze city size distributions , 2007, Comput. Environ. Urban Syst..

[9]  Wei Su,et al.  Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[10]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[11]  Siwei Lyu,et al.  Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.

[12]  Wen-hua Zhang,et al.  Effective Steganalysis of YASS Based on Statistical Moments of Wavelet Characteristic Function and Markov Process , 2012 .

[13]  Deepa D. Shankar,et al.  Feature Based Steganalysis Using Wavelet Decomposition and Magnitude Statistics , 2010, 2010 International Conference on Advances in Computer Engineering.

[14]  Xinpeng Zhang,et al.  JPEG Steganalysis With High-Dimensional Features and Bayesian Ensemble Classifier , 2013, IEEE Signal Processing Letters.

[15]  Andrew D. Ker Steganalysis of Embedding in Two Least-Significant Bits , 2007, IEEE Transactions on Information Forensics and Security.

[16]  N. Vincent,et al.  Compressed image quality and Zipf law , 2000, WCC 2000 - ICSP 2000. 2000 5th International Conference on Signal Processing Proceedings. 16th World Computer Congress 2000.

[17]  Guoming Chen,et al.  Particle Swarm Optimization Feature Selection for Image Steganalysis , 2012, 2012 Fourth International Conference on Digital Home.

[18]  George Kingsley Zipf,et al.  Human behavior and the principle of least effort , 1949 .

[19]  Laimeche Lakhdar,et al.  A Novel Technique of Steganalysis in Uncompressed Image through Zipf's Law , 2012 .

[20]  Stefanos Gritzalis,et al.  On the Typical Statistic Features for Image Blind Steganalysis , 2011, IEEE Journal on Selected Areas in Communications.

[21]  Chengyun Yang,et al.  Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.

[22]  Jerome M. Shapiro,et al.  Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..

[23]  Jessica J. Fridrich,et al.  JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts , 2012, Information Hiding.

[24]  Gerard Leng,et al.  On the power law relationship of the critical transmitting range and the number of nodes of ad hoc networks , 2010, Int. J. Sens. Networks.

[25]  G. J. Burton,et al.  Color and spatial structure in natural scenes. , 1987, Applied optics.

[26]  Nicole Vincent,et al.  A method for detecting artificial objects in natural environments , 2002, Object recognition supported by user interaction for service robots.

[27]  Mostafa Mehdipour-Ghazi,et al.  Universal Steganalysis Based on Local Prediction Error in Wavelet Domain , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[28]  Laimeche Lakhdar,et al.  The power laws: Zipf and inverse Zipf for automated segmentation and classification of masses within mammograms , 2015, Evol. Syst..

[29]  Chengyun Yang,et al.  Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[30]  Jessica J. Fridrich,et al.  Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.

[31]  Rajesh Kumar Tiwari,et al.  Secure image transmission using steganographic methodologies , 2010, Int. J. Multim. Intell. Secur..

[32]  Ying Wang,et al.  Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.

[33]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[34]  N. Vincent,et al.  A medical acoustic signal analysis method based on Zipf law , 2002, 2002 14th International Conference on Digital Signal Processing Proceedings. DSP 2002 (Cat. No.02TH8628).

[35]  Markus G. Kuhn,et al.  Information hiding-A survey : Identification and protection of multimedia information , 1999 .

[36]  A. C. Rencher Methods of multivariate analysis , 1995 .

[37]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[38]  Nicole Vincent,et al.  Use of power law models in detecting region of interest , 2007, Pattern Recognit..

[39]  Mansour Sheikhan,et al.  Blind image steganalysis via joint co-occurrence matrix and statistical moments of contourlet transform , 2010, 2010 10th International Conference on Intelligent Systems Design and Applications.

[40]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[41]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[42]  Hong-Bin Zhang,et al.  Blind Steganalysis using Wavelet Statistics and ANOVA , 2007, 2007 International Conference on Machine Learning and Cybernetics.

[43]  Fenlin Liu,et al.  Image universal steganalysis based on wavelet packet transform , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[44]  G. Cocho,et al.  Universality of Rank-Ordering Distributions in the Arts and Sciences , 2009, PloS one.

[45]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[46]  Omed Khalind,et al.  Single-mismatch 2LSB embedding steganography , 2013, IEEE International Symposium on Signal Processing and Information Technology.

[47]  Lin Ma,et al.  Universal Steganalysis Based on Statistical Models Using Reorganization of Block-based DCT Coefficients , 2009, 2009 Fifth International Conference on Information Assurance and Security.