On the probability density function and characteristic function moments of image steganalysis in the log prediction error wavelet subband

Abstract. Extracting informative statistic features is the most essential technical issue of steganalysis. Among various steganalysis methods, probability density function (PDF) and characteristic function (CF) moments are two important types of features due to the excellent ability for distinguishing the cover images from the stego ones. The two types of features are quite similar in definition. The only difference is that the PDF moments are computed in the spatial domain, while the CF moments are computed in the Fourier-transformed domain. Then, the comparison between PDF and CF moments is an interesting question of steganalysis. Several theoretical results have been derived, and CF moments are proved better than PDF moments in some cases. However, in the log prediction error wavelet subband of wavelet decomposition, some experiments show that the result is opposite and lacks a rigorous explanation. To solve this problem, a comparison result based on the rigorous proof is presented: the first-order PDF moment is proved better than the CF moment, while the second-order CF moment is better than the PDF moment. It tries to open the theoretical discussion on steganalysis and the question of finding suitable statistical features.

[1]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[2]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[3]  Siwei Lyu,et al.  Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.

[4]  Zhihua Xia,et al.  Steganalysis of least significant bit matching based on image histogram and correlation , 2013, J. Electronic Imaging.

[5]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[6]  Chengyun Yang,et al.  Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.

[7]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.

[8]  Zhihua Xia,et al.  Fingerprint liveness detection using gradient-based texture features , 2016, Signal, Image and Video Processing.

[9]  Pedro Comesaña Alfaro,et al.  Improving Selection-Channel-Aware Steganalysis Features , 2016, Media Watermarking, Security, and Forensics.

[10]  Hassan Qjidaa,et al.  Image analysis using separable discrete moments of Charlier-Hahn , 2014, Multimedia Tools and Applications.

[11]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[12]  Stefanos Gritzalis,et al.  On the Typical Statistic Features for Image Blind Steganalysis , 2011, IEEE Journal on Selected Areas in Communications.

[13]  Xingming Sun,et al.  Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.

[14]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[15]  Jessica J. Fridrich,et al.  Steganalysis Features for Content-Adaptive JPEG Steganography , 2016, IEEE Transactions on Information Forensics and Security.

[16]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[17]  Xiaofeng Song,et al.  Entropy Feature Based on 2D Gabor Wavelets for JPEG Steganalysis , 2016, SpaCCS Workshops.

[18]  Tieyong Zeng,et al.  A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.

[19]  Bo Li,et al.  Preestimation-Based Array Interpolation Approach to Coherent Source Localization Using Multiple Sparse Subarrays , 2009, IEEE Signal Processing Letters.

[20]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[21]  Dimitris E. Koulouriotis,et al.  A Unified Methodology for Computing Accurate Quaternion Color Moments and Moment Invariants , 2014, IEEE Transactions on Image Processing.

[22]  Jordan B. L. Smith,et al.  Audio Properties of Perceived Boundaries in Music , 2014, IEEE Transactions on Multimedia.

[23]  Gang Xiong,et al.  Image textural features for steganalysis of spatial domain steganography , 2012, J. Electronic Imaging.

[24]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[25]  Chengyun Yang,et al.  Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[26]  Jessica J. Fridrich,et al.  Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.

[27]  Hong-Xia Wang,et al.  Pseudo-zernike moments-based audio content authentication algorithm robust against feature-analysed substitution attack , 2012, Multimedia Tools and Applications.

[28]  Bin Li,et al.  Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[29]  Jiasong Wu,et al.  Fast Computation of Sliding Discrete Tchebichef Moments and Its Application in Duplicated Regions Detection , 2015, IEEE Transactions on Signal Processing.

[30]  Bin Li,et al.  Steganalysis of a PVD-based content adaptive image steganography , 2013, Signal Process..

[31]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[32]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[33]  Onkar Dikshit,et al.  Spectral–Spatial Classification of Hyperspectral Imagery Based on Moment Invariants , 2015, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing.

[34]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[35]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[36]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[37]  Bin Gu,et al.  Incremental Support Vector Learning for Ordinal Regression , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[38]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[39]  Mohammad Rahmati,et al.  New framework for using image contents in blind steganalysis systems , 2011, J. Electronic Imaging.

[40]  Weiming Zhang,et al.  Matrix embedding in finite abelian group , 2015, Signal Process..

[41]  Bin Li,et al.  Textural features based universal steganalysis , 2008, Electronic Imaging.

[42]  Ying Wang,et al.  Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.