Single Actor Pooled Steganalysis

This paper considers a more practical situation for pooled steganalysis that only a single actor is observed, so that the steganalyst needed to analyze the actor independently without comparing with other actors. We propose a pooled steganalysis method for this situation. For a given actor that has emitted a number of images, feature sets are extracted from each image, respectively, and then feed to a binary classifier popularly used in single object steganalysis. Combining all the results output by the classifier, a final decision is made ensemble to label the given actor as “guilty” or “innocent” with the minimal detection error. Experimental results show that the proposed method is effective for single actor pooled steganalysis.

[1]  Yi Zhang,et al.  Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.

[2]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[3]  Yun Q. Shi,et al.  Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Mi Wen,et al.  Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles , 2016, IEEE Transactions on Information Forensics and Security.

[5]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[6]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[7]  Andrew D. Ker Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.

[8]  Xinpeng Zhang,et al.  Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization , 2018, IEEE Signal Processing Letters.

[9]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[10]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[11]  Bin Li,et al.  New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator , 2017, IEEE Transactions on Information Forensics and Security.

[12]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[13]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[14]  Jiangqun Ni,et al.  Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.

[15]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[16]  Andrew D. Ker,et al.  The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.

[17]  Tomás Pevný,et al.  A new paradigm for steganalysis via clustering , 2011, Electronic Imaging.

[18]  Rainer Bhme Advanced Statistical Steganalysis , 2010 .

[19]  Tomás Pevný,et al.  Optimizing pooling function for pooled steganalysis , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[20]  Tomás Pevný,et al.  Identifying a steganographer in realistic and heterogeneous data sets , 2012, Other Conferences.