PSW statistical LSB image steganalysis

Steganography is the art and science of producing covert communications by concealing secret messages in apparently innocent media, while steganalysis is the art and science of detecting the existence of these. This manuscript proposes a novel blind statistical steganalysis technique to detect Least Significant Bit (LSB) flipping image steganography. It shows that the technique has a number of major advantages. First, a novel method of pixel color correlativity analysis in Pixel Similarity Weight (PSW). Second, filtering out image pixels according to their statistically detected suspiciousness, thereby excluding neutral pixels from the steganalysis process. Third, ranking suspicious pixels according to their statistically detected suspiciousness and determining the influence of such pixels based on the level of detected anomalies. Fourth, the capability to classify and analyze pixels in three pixel classes of flat, smooth and edgy, thereby enhancing the sensitivity of the steganalysis. Fifth, achieving an extremely high efficiency level of 98.049% in detecting 0.25bpp stego images with only a single dimension analysis.

[1]  S. Selvakumar,et al.  Blind Image Steganalysis of JPEG images using feature extraction through the process of dilation , 2014, Digit. Investig..

[2]  Ting Ting Zhu,et al.  JPEG Steganalysis Based on Locality Preserving Projection Dimensionality Reduction Method , 2013 .

[3]  Sorina Dumitrescu,et al.  Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.

[4]  G. Kerns,et al.  Introduction to Probability and Statistics Using R , 2011 .

[5]  João Gama,et al.  Linear tree , 1999, Intell. Data Anal..

[6]  Florent Retraint,et al.  Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm , 2014, IEEE Transactions on Image Processing.

[7]  Azizah Bt Abdul Manaf,et al.  Azizah technique for efficiency measurement in steganography , 2012, 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012).

[8]  Subariah Ibrahim,et al.  Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..

[9]  Merrill Warkentin,et al.  Steganography and Steganalysis , 2006 .

[10]  David Megías,et al.  LSB matching steganalysis based on patterns of pixel differences and random embedding , 2013, Comput. Secur..

[11]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[12]  C.-C. Jay Kuo,et al.  Block-based image steganalysis: Algorithm and performance evaluation , 2010, ISCAS.

[13]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[14]  Mazdak Zamani,et al.  Current problems of substitution techniques of audio steganography , 2009 .

[15]  Mahendra Kumar,et al.  Steganography and Steganalysis of JPEG Images , 2011 .

[16]  Jiri Fridrich,et al.  Steganalysis of LSB encoding in color images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[17]  A. Murat Tekalp,et al.  Universal image steganalysis using rate-distortion curves , 2004, IS&T/SPIE Electronic Imaging.

[18]  Akram M. Zeki,et al.  Robust audio steganography via genetic algorithm , 2009, 2009 International Conference on Information and Communication Technologies.

[19]  Gilbert L. Peterson,et al.  A new blind method for detecting novel steganography , 2005, Digit. Investig..

[20]  Xiangyang Luo,et al.  An Improved Sample Pairs Method for Detection of LSB Embedding , 2004, Information Hiding.

[21]  Jessica J. Fridrich,et al.  Higher-order statistical steganalysis of palette images , 2003, IS&T/SPIE Electronic Imaging.

[22]  Jessica J. Fridrich,et al.  Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.

[23]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.

[24]  Earl Bogdanoff Introduction to descriptive statistics: a sequential approach , 1970 .

[25]  Bernhard Schölkopf,et al.  A tutorial on support vector regression , 2004, Stat. Comput..

[26]  Akram M. Zeki,et al.  An approach to improve the robustness of substitution techniques of audio steganography , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[27]  Hao Zhang,et al.  Multi-class Markov models for JPEG steganalysis , 2013, Other Conferences.

[28]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[29]  Fenlin Liu,et al.  Blind image steganalysis based on wavelet coefficient correlation , 2012, Digit. Investig..

[30]  Hossein Rouhani Zeidanloo,et al.  Genetic substitution-based audio steganography for high capacity applications , 2011 .

[31]  Earl W. Kooker Introduction to Descriptive Statistics , 1982 .

[32]  E. Lin,et al.  LSB steganalysis using support vector regression , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[33]  Mohammad Rahmati,et al.  A Model-Based Image Steganography Method Using Watson’s Visual Model , 2014 .

[34]  Mazdak Zamani,et al.  Capacity and quality improvement in reversible image watermarking approach , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[35]  Niels Provos,et al.  Detecting Steganographic Content on the Internet , 2002, NDSS.

[36]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[37]  Jaya Sil,et al.  Perceptually adaptive MC-SS image watermarking using GA-NN hybridization in fading gain , 2014, Eng. Appl. Artif. Intell..

[38]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[39]  Qingzhong Liu,et al.  MP3 audio steganalysis , 2013, Inf. Sci..

[40]  Ali Kanso,et al.  A robust chaotic algorithm for digital image steganography , 2014, Commun. Nonlinear Sci. Numer. Simul..

[41]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.

[42]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[43]  Tao Zhang,et al.  Reliable detection of LSB steganography based on the difference image histogram , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[44]  Il Kyu Eom,et al.  Performance improvement of LSB-based steganalysis using bit-plane decomposition of images , 2016 .

[45]  M. Zamani,et al.  An Introduction to Image Steganography Techniques , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[46]  Hossein Rouhani Zeidanloo,et al.  Interpretative Key Management (IKM), A Novel Framework , 2010, 2010 Second International Conference on Computer Research and Development.

[47]  Mohammad Saniee Abadeh,et al.  Image steganalysis using a bee colony based feature selection algorithm , 2014, Eng. Appl. Artif. Intell..

[48]  Wei Sun,et al.  Detect LSB Steganography with Bit Plane Randomness Tests , 2006, 2006 6th World Congress on Intelligent Control and Automation.

[49]  Henry Chu,et al.  Soft computing approach to steganalysis of LSB embedding in digital images , 2005, ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005..

[50]  Andreas Westfeld Detecting Low Embedding Rates , 2002, Information Hiding.

[51]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[52]  Mazdak Zamani,et al.  An overview on audio steganography techniques , 2012 .

[53]  Jessica J. Fridrich,et al.  Quantitative steganalysis using rich models , 2013, Electronic Imaging.

[54]  Andrew D. Ker Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.

[55]  Li Zhi,et al.  A LSB steganography detection algorithm , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[56]  David Megías,et al.  Unsupervised steganalysis based on artificial training sets , 2016, Eng. Appl. Artif. Intell..

[57]  Jean-Marc Chassery,et al.  Improving LSB steganalysis using marginal and joint probabilistic distributions , 2004, MM&Sec '04.

[58]  Hossein Rouhani Zeidanloo,et al.  Genetic Audio Watermarking , 2010, BAIP.

[59]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[60]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[61]  Jing Dong,et al.  An effective image steganalysis method based on neighborhood information of pixels , 2011, 2011 18th IEEE International Conference on Image Processing.

[62]  Xiaolin Wu,et al.  A new framework of LSB steganalysis of digital media , 2005, IEEE Transactions on Signal Processing.

[63]  Ahmad Reza Naghsh-Nilchi,et al.  A novel joint secret image sharing and robust steganography method using wavelet , 2013, Multimedia Systems.

[64]  Jiri Fridrich,et al.  Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).

[65]  Shahidan M. Abdullah,et al.  Mazdak Technique for PSNR Estimation in Audio Steganography , 2012 .

[66]  Mazdak Zamani,et al.  Genetic algorithm for fragile audio watermarking , 2014, Telecommunication Systems.

[67]  Andrew D. Ker Quantitative evaluation of pairs and RS steganalysis , 2004, IS&T/SPIE Electronic Imaging.

[68]  金田 重郎,et al.  C4.5: Programs for Machine Learning (書評) , 1995 .

[69]  Nasir D. Memon,et al.  Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.

[70]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[71]  Sos S. Agaian,et al.  Steganalysis Embedding Percentage Determination with Learning Vector Quantization , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.

[72]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[73]  Nello Cristianini,et al.  An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .