Feature Mining and Pattern Recognition in Multimedia Forensics—Detection of JPEG Image Based Steganography, Double-Compression, Interpolation and WAV Audio Based Steganography

Steganography, the ancient art for secretive communications, has revived on the Internet by way of hiding secret data, in completely imperceptible manners, into a digital file. Thus, the steganography has created a serious threat to cyber security due to the covert channel it provides that can be readily exploited for various illegal purposes. Likewise, image tampering or forgery, which has been greatly facilitated and proliferated by photo processing tools, is increasingly causing problems concerning the authenticity of digital images. JPEG images constitute one of the most popular media on the Internet; yet they can be easily used for the steganography as well as easily tampered by, e.g., removing, adding, or splicing objects without leaving any clues. Therefore, there is a critical need to develop reliable methods for steganalysis (analysis of multimedia for the steganography) and for forgery detection in JPEG images to serve applications in national security, law enforcement, cybercrime fighting, digital forensics, and network security, etc. This article presents some recent results on detecting JPEG steganograms, doubly compressed JPEG images, and resized JPEG images based on a unified framework of feature mining and pattern recognition approaches. At first, the neighboring joint density features and marginal density features of the DCT coefficients of the JPEG image are extracted; then learning classifiers are applied to the features for the detection. Experimental results indicate that the method prominently improves the detection performances in JPEG images when compared to a previously well-studied method. Also, it is demonstrated that detection performance deteriorates with increasing image complexity; hence, a complete evaluation of the detection performance of different algorithms should include image complexity—in addition to other relevant factors such as hiding ratio or compression ratio—as a significant and independent parameter.

[1]  Nasir D. Memon,et al.  Image tamper detection based on demosaicing artifacts , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[2]  Qingzhong Liu,et al.  Feature Mining and Intelligent Computing for MP3 Steganalysis , 2009, 2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing.

[3]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[4]  Siwei Lyu,et al.  Steganalysis of recorded speech , 2005, IS&T/SPIE Electronic Imaging.

[5]  Jana Dittmann,et al.  Mel-cepstrum-based steganalysis for VoIP steganography , 2007, Electronic Imaging.

[6]  Nikola K. Kasabov,et al.  DENFIS: dynamic evolving neural-fuzzy inference system and its application for time-series prediction , 2002, IEEE Trans. Fuzzy Syst..

[7]  Qingzhong Liu,et al.  Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images , 2007, IJCAI.

[8]  Alberto Leon-Garcia,et al.  Estimation of shape parameter for generalized Gaussian distributions in subband decompositions of video , 1995, IEEE Trans. Circuits Syst. Video Technol..

[9]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[10]  Qingzhong Liu,et al.  Predicting embedding strength in audio steganography , 2010, 9th IEEE International Conference on Cognitive Informatics (ICCI'10).

[11]  Thorsten Joachims,et al.  Estimating the Generalization Performance of an SVM Efficiently , 2000, ICML.

[12]  Jung-Hua Chou,et al.  A Robust and Friendly Human-Robot Interface System Based on Natural Human Gestures , 2010, Int. J. Pattern Recognit. Artif. Intell..

[13]  Toby Sharp,et al.  An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.

[14]  Sargur N. Srihari,et al.  Image Pattern Recognition - Synthesis and Analysis in Biometrics , 2007, Image Pattern Recognition.

[15]  Qingzhong Liu,et al.  An improved approach to steganalysis of JPEG images , 2010, Inf. Sci..

[16]  Anindya Sarkar,et al.  Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.

[17]  Noboru Babaguchi,et al.  Breaking the YASS algorithm via pixel and DCT coefficients analysis , 2008, 2008 19th International Conference on Pattern Recognition.

[18]  Patrick Shen-Pei Wang,et al.  Biometric technologies and applications , 2007, Artificial Intelligence and Applications.

[19]  Nasir D. Memon,et al.  Tamper Detection Based on Regularity of Wavelet Transform Coefficients , 2007, 2007 IEEE International Conference on Image Processing.

[20]  Wei Su,et al.  A machine learning based scheme for double JPEG compression detection , 2008, 2008 19th International Conference on Pattern Recognition.

[21]  Thorsten Joachims,et al.  Making large scale SVM learning practical , 1998 .

[22]  Qingzhong Liu,et al.  Image complexity and feature mining for steganalysis of least significant bit matching steganography , 2008, Inf. Sci..

[23]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[24]  Hyoung Joong Kim,et al.  Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding , 2009, MM&Sec '09.

[25]  Qingzhong Liu,et al.  Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).

[26]  Qingzhong Liu,et al.  Neighboring joint density-based JPEG steganalysis , 2011, TIST.

[27]  Darko Kirovski,et al.  Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..

[28]  Qingzhong Liu,et al.  Novel stream mining for audio steganalysis , 2009, MM '09.

[29]  Yun Q. Shi,et al.  JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[30]  Qingzhong Liu,et al.  Improved detection and evaluation for JPEG steganalysis , 2009, ACM Multimedia.

[31]  Anindya Sarkar,et al.  YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.

[32]  Wei Zeng,et al.  A Novel Steganalysis Algorithm of Phase Coding in Audio Signal , 2007, Sixth International Conference on Advanced Language Processing and Web Information Technology (ALPIT 2007).

[33]  Tien D. Bui,et al.  Multivariate statistical modeling for image denoising using wavelet transforms , 2005, Signal Process. Image Commun..

[34]  Bin Li,et al.  Steganalysis of YASS , 2009, IEEE Trans. Inf. Forensics Secur..

[35]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[36]  Tomás Pevný,et al.  Modern steganalysis can detect YASS , 2010, Electronic Imaging.

[37]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[38]  Yue Lu,et al.  Face Recognition Using Scale Invariant Feature Transform and Support Vector Machine , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[39]  Tomás Pevný,et al.  Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.

[40]  Andrew D. Ker Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.

[41]  Ruimin Hu,et al.  An algorithm of echo steganalysis based on power cepstrum and pattern classification , 2008, 2008 International Conference on Audio, Language and Image Processing.

[42]  Anindya Sarkar,et al.  Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme , 2008, 2008 15th IEEE International Conference on Image Processing.

[43]  Qingzhong Liu,et al.  A Method to Detect JPEG-Based Double Compression , 2011, ISNN.

[44]  Petra Mutzel,et al.  A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.

[45]  Qingzhong Liu,et al.  Revealing real quality of double compressed MP3 audio , 2010, ACM Multimedia.

[46]  Qingzhong Liu,et al.  Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images , 2008, Pattern Recognit..

[47]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[48]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[49]  Qingzhong Liu,et al.  Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.

[50]  Thorsten Joachims,et al.  Learning to classify text using support vector machines - methods, theory and algorithms , 2002, The Kluwer international series in engineering and computer science.

[51]  Jens-Rainer Ohm Multimedia Communication Technology: Representation,Transmission and Identification of Multimedia Signals , 2004 .

[52]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[53]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .

[54]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[55]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[56]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[57]  Nasir D. Memon,et al.  An Ensemble of Classifiers Approach to Steganalysis , 2010, 2010 20th International Conference on Pattern Recognition.

[58]  Siwei Lyu,et al.  How realistic is photorealistic , 2005 .

[59]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[60]  Ingrid Daubechies,et al.  Ten Lectures on Wavelets , 1992 .

[61]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[62]  Dana S. Richards,et al.  Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.

[63]  Yan Chen,et al.  Dynamic Structural Statistical Model Based Online Signature Verification , 2009, Int. J. Digit. Crime Forensics.

[64]  Nasir D. Memon,et al.  Detection of audio covert channels using statistical footprints of hidden messages , 2006, Digit. Signal Process..

[65]  Qingzhong Liu,et al.  Steganalysis of MP3Stego , 2009, 2009 International Joint Conference on Neural Networks.

[66]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.