Steganalysis for Markov cover data with applications to images

The difficult task of steganalysis, or the detection of the presence of hidden data, can be greatly aided by exploiting the correlations inherent in typical host or cover signals. In particular, several effective image steganalysis techniques are based on the strong interpixel dependencies exhibited by natural images. Thus, existing theoretical benchmarks based on independent and identically distributed (i.i.d.) models for the cover data underestimate attainable steganalysis performance and, hence, overestimate the security of the steganography technique used for hiding the data. In this paper, we investigate detection-theoretic performance benchmarks for steganalysis when the cover data are modeled as a Markov chain. The main application explored here is steganalysis of data hidden in images. While the Markov chain model does not completely capture the spatial dependencies, it provides an analytically tractable framework whose predictions are consistent with the performance of practical steganalysis algorithms that account for spatial dependencies. Numerical results are provided for image steganalysis of spread-spectrum and perturbed quantization data hiding.

[1]  Rajarathnam Chandramouli,et al.  A Bayesian image steganalysis approach to estimate the embedded secret message , 2005, MM&Sec '05.

[2]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[3]  Sorina Dumitrescu,et al.  Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..

[4]  Nasir D. Memon,et al.  Benchmarking steganographic and steganalysis techniques , 2005, IS&T/SPIE Electronic Imaging.

[5]  Neil J. Hurley,et al.  ML detection of steganography , 2005, IS&T/SPIE Electronic Imaging.

[6]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[7]  Jessica J. Fridrich,et al.  On estimation of secret message length in LSB steganography in spatial domain , 2004, IS&T/SPIE Electronic Imaging.

[8]  Maxim Sidorov,et al.  Hidden Markov models and steganalysis , 2004, MM&Sec '04.

[9]  Tomás Pevný,et al.  Towards Multi-class Blind Steganalyzer for JPEG Images , 2005, IWDW.

[10]  B. S. Manjunath,et al.  Steganalysis of spread spectrum data hiding exploiting cover memory , 2005, IS&T/SPIE Electronic Imaging.

[11]  Jean-Marc Chassery,et al.  Improving LSB steganalysis using marginal and joint probabilistic distributions , 2004, MM&Sec '04.

[12]  B. S. Manjunath,et al.  Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.

[13]  Elke Franz Steganography Preserving Statistical Properties , 2002, Information Hiding.

[14]  Richard E. Blahut,et al.  Principles and practice of information theory , 1987 .

[15]  Bernd Girod,et al.  Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.

[16]  Rajarathnam Chandramouli,et al.  A mathematical framework for active steganalysis , 2003, Multimedia Systems.

[17]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[18]  B. S. Manjunath,et al.  Steganalysis of quantization index modulation data hiding , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[19]  Andrew D. Ker Resampling and the detection of LSB matching in color bitmaps , 2005, IS&T/SPIE Electronic Imaging.

[20]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[21]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1991, CACM.

[22]  Thorsten Joachims,et al.  Making large scale SVM learning practical , 1998 .

[23]  A. Habibi Comparison of nth-Order DPCM Encoder With Linear Transformations and Block Quantization Techniques , 1971 .

[24]  Nasir D. Memon,et al.  Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.

[25]  J. Fridrich,et al.  Attacking the OutGuess , 2002 .

[26]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[27]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[28]  A. Murat Tekalp,et al.  Universal image steganalysis using rate-distortion curves , 2004, IS&T/SPIE Electronic Imaging.

[29]  Venkat Anantharam A large deviations approach to error exponents in source coding and hypothesis testing , 1990, IEEE Trans. Inf. Theory.

[30]  Niels Provos,et al.  Detecting Steganographic Content on the Internet , 2002, NDSS.

[31]  Tao Zhang,et al.  A new approach to reliable detection of LSB steganography in natural images , 2003, Signal Process..

[32]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[33]  Kai Lai Chung,et al.  Markov Chains with Stationary Transition Probabilities , 1961 .

[34]  Jessica J. Fridrich,et al.  Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.

[35]  Ying Wang,et al.  Steganalysis of block-DCT image steganography , 2003, IEEE Workshop on Statistical Signal Processing, 2003.

[36]  S. Natarajan,et al.  Large deviations, hypotheses testing, and source coding for finite Markov chains , 1985, IEEE Trans. Inf. Theory.

[37]  Ying Wang,et al.  Steganalysis of block-structured stegotext , 2004, IS&T/SPIE Electronic Imaging.

[38]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[39]  Pierre Moulin,et al.  New results on steganographic capacity , 2004 .

[40]  I. D. Longstaff,et al.  Improving Co-occurrence Matrix Feature Discrimination , 1995 .

[41]  Michael A. Arbib,et al.  The handbook of brain theory and neural networks , 1995, A Bradford book.

[42]  N. D. Memon,et al.  Steganography capacity: a steganalysis perspective , 2003, IS&T/SPIE Electronic Imaging.

[43]  Jessica J. Fridrich,et al.  Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.

[44]  Edward J. Delp,et al.  A Review of Data Hiding in Digital Images , 1999, PICS.

[45]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[46]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[47]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[48]  Tuomas Aura,et al.  Practical Invisibility in Digital Communication , 1996, Information Hiding.

[49]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[50]  Siwei Lyu,et al.  Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.

[51]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[52]  Edward J. Delp,et al.  Benchmarking of image watermarking algorithms for digital rights management , 2004, Proceedings of the IEEE.

[53]  Phil Sallee,et al.  Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..

[54]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.