Fast projections of spatial rich model feature for digital image steganalysis

Spatial rich model (SRM) is a classic steganalysis method, which collects high-order co-occurrences from truncated noise residuals as feature to capture the local-range dependencies of an image. Increasing the truncation threshold and the co-occurrence order will lead to a higher-dimensional feature, which can exploit more statistical bins and capture dependencies across larger-range neighborhood, but this will suffer from the curse of dimensionality. In this paper, we propose a fast projection method to increase the statistical robustness of the higher-dimensional SRM feature while decreasing its dimensionality. The proposed projection method is applicable to co-occurrence-based steganalysis features. The detection performance and the computational complexity of the proposed method are investigated on three content-adaptive steganographic algorithms in spatial domain.

[1]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[2]  Nasir D. Memon,et al.  Steganalysis of watermarking techniques using image quality metrics , 2001, IS&T/SPIE Electronic Imaging.

[3]  Jessica J. Fridrich,et al.  Further study on the security of S-UNIWARD , 2014, Electronic Imaging.

[4]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[5]  Jessica J. Fridrich,et al.  Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.

[6]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[7]  Rainer Bhme Advanced Statistical Steganalysis , 2010 .

[8]  Heikki Mannila,et al.  Random projection in dimensionality reduction: applications to image and text data , 2001, KDD '01.

[9]  Jiwu Huang,et al.  New Channel Selection Rule for JPEG Steganography , 2012, IEEE Transactions on Information Forensics and Security.

[10]  Alfredo De Santis,et al.  E-mail-Based Covert Channels for Asynchronous Message Steganography , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[11]  Bo Li,et al.  Text split-based steganography in OOXML format documents for covert communication , 2012, Secur. Commun. Networks.

[12]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[13]  Jessica J. Fridrich,et al.  CFA-aware features for steganalysis of color images , 2015, Electronic Imaging.

[14]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[15]  Robert Wille,et al.  Foreword: Special Issue on Reversible Computation , 2012, J. Multiple Valued Log. Soft Comput..

[16]  Francesco Palmieri,et al.  New Steganographic Techniques for the OOXML File Format , 2011, ARES.

[17]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[18]  Alfredo De Santis,et al.  Steganography and Secure Communication on Online Social Networks and Online Photo Sharing , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.

[19]  Jessica J. Fridrich,et al.  Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.

[20]  Alfredo De Santis,et al.  An asynchronous covert channel using spam , 2012, Comput. Math. Appl..

[21]  Jessica J. Fridrich,et al.  Rich model for Steganalysis of color images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[22]  Rainer Böhme,et al.  Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.

[23]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[24]  Mazdak Zamani,et al.  An overview on audio steganography techniques , 2012 .

[25]  Pengfei Wang,et al.  Pure spatial rich model features for digital image steganalysis , 2015, Multimedia Tools and Applications.

[26]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[27]  Marco Botta,et al.  Fragile watermarking using Karhunen–Loève transform: the KLT-F approach , 2015, Soft Comput..

[28]  Leo Breiman,et al.  Bagging Predictors , 1996, Machine Learning.

[29]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[30]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[31]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[32]  Andrew D. Ker Implementing the projected spatial rich features on a GPU , 2014, Electronic Imaging.

[33]  Leo Breiman,et al.  Bagging Predictors , 1996, Machine Learning.

[34]  Benjamin Recht,et al.  Random Features for Large-Scale Kernel Machines , 2007, NIPS.

[35]  Wei Su,et al.  Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[36]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[37]  Kenli Li,et al.  Adaptive energy-efficient scheduling for real-time tasks on DVS-enabled heterogeneous clusters , 2012, J. Parallel Distributed Comput..

[38]  Eghbal G. Mansoori,et al.  GACH: a grid-based algorithm for hierarchical clustering of high-dimensional data , 2014, Soft Comput..

[39]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[40]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.