The blind detection of information hiding in color image

As the 24 bits color images are the popular image format in internet and are often used to be the cover image to hide message, this paper proposed a steganalysis method based on the statistic moments of differential image in frequency domain towards the 24 bits color images. The difference is calculated in three directions, horizontal, vertical and diagonal towards adjacent pixels to obtain three-directional differential images for a color image. Then the features for steganalysis are extracted from the DFT of the 2D histograms of differential images. Support vector machine with RBF kernel is applied as classifier to distinguish between stego images and cover images. We test the performance of our proposed steganalysis method over spread spectrum data hiding method, LSB method and QIM data hiding method. The experiment results have proved that the proposed method is effective in attacking these steganograhic schemes applied in spatial domain.

[1]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[2]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[3]  Gregory W. Wornell,et al.  Digital watermarking and information embedding using dither modulation , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[4]  David Mumford,et al.  Statistics of natural images and models , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).

[5]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[6]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[7]  B. S. Manjunath,et al.  Steganalysis of spread spectrum data hiding exploiting cover memory , 2005, IS&T/SPIE Electronic Imaging.

[8]  B. S. Manjunath,et al.  Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.