A Steganalysis Algorithm Based on Denoising of Source Image Using ICA and SVM

In this paper we propose a new method for feature extraction in the context of still image steganalysis. At first, a denoising algorithm is employed to generate a new version of the observation form the original image. FastICA is employed to separate two sources from the two versions of the input image. Features are extracted from these two estimated sources. At the end Support Vector Machine (SVM) is used as classifiers. This supervised learning method classifies the input image into either stego-image or clean-image. The performance of this algorithm is verified using some test samples. The results of our empirical tests show that detection accuracy of our method reaches 72% for true positive and 79% for true negative when 100% capacity of image is used for steganography.

[1]  Nikos Paragios,et al.  Uniform and Textured Regions Separation in Natural Images Towards MPM Adaptive Denoising , 2007, SSVM.

[2]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[3]  Pierre Comon,et al.  Independent component analysis, A new concept? , 1994, Signal Process..

[4]  Thai Duy Hien,et al.  RDWT/ICA for image authentication , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

[5]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[6]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[7]  Erkki Oja,et al.  Independent component analysis: algorithms and applications , 2000, Neural Networks.

[8]  Martin J. Wainwright,et al.  Image denoising using scale mixtures of Gaussians in the wavelet domain , 2003, IEEE Trans. Image Process..

[9]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[10]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[11]  Kiyoshi Tanaka,et al.  StegErmelc: A Novel DCT-Based Steganographic Method Using Three Strategies , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[12]  Y. Shi,et al.  STEGANALYSIS BASED ON MOMENTS OF CHARACTERISTIC FUNCTIONS USING WAVELET DECOMPOSITION, PREDICTION-ERROR IMAGE, AND NEURAL NETWORK , 2005 .

[13]  Anil Kumar,et al.  A Robust Watermarking using Blind Source Separation , 2008 .

[14]  B. S. Manjunath,et al.  Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.

[15]  Fenlin Liu,et al.  A review on blind detection for image steganography , 2008, Signal Process..

[16]  Min-Shiang Hwang,et al.  Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..

[17]  Peng Liu,et al.  Research on RTOS-Integrated TMR for Fault Tolerant Systems , 2007 .

[18]  Erkki Oja,et al.  Independent Component Analysis , 2001 .

[19]  Chengyun Yang,et al.  Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[20]  Bo Xu,et al.  Improved BSS Based Schemes for Active Steganalysis , 2007 .

[21]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[22]  Mostafa Kaveh,et al.  Fourth-order partial differential equations for noise removal , 2000, IEEE Trans. Image Process..

[23]  Tapio Seppänen,et al.  Increasing robustness of LSB audio steganography using a novel embedding method , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[24]  Ingemar J. Cox,et al.  A comparative study of ± steganalyzers , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.