Neighboring joint density-based JPEG steganalysis

The threat posed by hackers, spies, terrorists, and criminals, etc. using steganography for stealthy communications and other illegal purposes is a serious concern of cyber security. Several steganographic systems that have been developed and made readily available utilize JPEG images as carriers. Due to the popularity of JPEG images on the Internet, effective steganalysis techniques are called for to counter the threat of JPEG steganography. In this article, we propose a new approach based on feature mining on the discrete cosine transform (DCT) domain and machine learning for steganalysis of JPEG images. First, neighboring joint density features on both intra-block and inter-block are extracted from the DCT coefficient array and the absolute array, respectively; then a support vector machine (SVM) is applied to the features for detection. An evolving neural-fuzzy inference system is employed to predict the hiding amount in JPEG steganograms. We also adopt a feature selection method of support vector machine recursive feature elimination to reduce the number of features. Experimental results show that, in detecting several JPEG-based steganographic systems, our method prominently outperforms the well-known Markov-process based approach.

[1]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[2]  Noboru Babaguchi,et al.  Breaking the YASS algorithm via pixel and DCT coefficients analysis , 2008, 2008 19th International Conference on Pattern Recognition.

[3]  Alberto Leon-Garcia,et al.  Estimation of shape parameter for generalized Gaussian distributions in subband decompositions of video , 1995, IEEE Trans. Circuits Syst. Video Technol..

[4]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[5]  Tien D. Bui,et al.  Multivariate statistical modeling for image denoising using wavelet transforms , 2005, Signal Process. Image Commun..

[6]  Qingzhong Liu,et al.  An improved approach to steganalysis of JPEG images , 2010, Inf. Sci..

[7]  Qingzhong Liu,et al.  Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images , 2007, IJCAI.

[8]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[9]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[10]  Siwei Lyu,et al.  How realistic is photorealistic , 2005 .

[11]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[12]  Anindya Sarkar,et al.  Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.

[13]  Chin-Chen Chang,et al.  Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..

[14]  Siwei Lyu,et al.  How realistic is photorealistic? , 2005, IEEE Transactions on Signal Processing.

[15]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[16]  Bin Li,et al.  Steganalysis of YASS , 2009, IEEE Trans. Inf. Forensics Secur..

[17]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[18]  Qingzhong Liu,et al.  Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images , 2008, Pattern Recognit..

[19]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[20]  Qingzhong Liu,et al.  Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.

[21]  Thorsten Joachims,et al.  Estimating the Generalization Performance of an SVM Efficiently , 2000, ICML.

[22]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[23]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[24]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[25]  Hyoung Joong Kim,et al.  Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding , 2009, MM&Sec '09.

[26]  Qingzhong Liu,et al.  Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).

[27]  Jens-Rainer Ohm,et al.  Multimedia Communication Technology , 2004 .

[28]  Qingzhong Liu,et al.  Novel stream mining for audio steganalysis , 2009, MM '09.

[29]  Dana S. Richards,et al.  Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.

[30]  Jason Weston,et al.  Gene Selection for Cancer Classification using Support Vector Machines , 2002, Machine Learning.

[31]  Nikola K. Kasabov,et al.  DENFIS: dynamic evolving neural-fuzzy inference system and its application for time-series prediction , 2002, IEEE Trans. Fuzzy Syst..

[32]  Petra Mutzel,et al.  A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.

[33]  Toby Sharp,et al.  An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.

[34]  Tomás Pevný,et al.  Modern steganalysis can detect YASS , 2010, Electronic Imaging.

[35]  Qingzhong Liu,et al.  A new approach for JPEG resize and image splicing detection , 2009, MiFor '09.

[36]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[37]  Roberto Basili,et al.  Learning to Classify Text Using Support Vector Machines: Methods, Theory, and Algorithms by Thorsten Joachims , 2003, Comput. Linguistics.

[38]  Anindya Sarkar,et al.  Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme , 2008, 2008 15th IEEE International Conference on Image Processing.

[39]  William A. Pearlman,et al.  Kernel Fisher discriminant for steganalysis of JPEG hiding methods , 2004, IS&T/SPIE Electronic Imaging.

[40]  Qingzhong Liu,et al.  Improved detection and evaluation for JPEG steganalysis , 2009, ACM Multimedia.

[41]  Anindya Sarkar,et al.  YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.

[42]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[43]  Qingzhong Liu,et al.  Derivative-based audio steganalysis , 2011, TOMCCAP.

[44]  Qingzhong Liu,et al.  Image complexity and feature mining for steganalysis of least significant bit matching steganography , 2008, Inf. Sci..

[45]  Yun Q. Shi,et al.  JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[46]  Thorsten Joachims,et al.  Making large scale SVM learning practical , 1998 .

[47]  Andrew D. Ker Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.

[48]  Jens-Rainer Ohm Multimedia Communication Technology: Representation,Transmission and Identification of Multimedia Signals , 2004 .

[49]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[50]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .