Adaptive Threshold Displacement algorithm for removing hidden information from digital images

The growth of the Internet and online social media, especially in recent years, also gave rise to a proliferation of online multimedia content creation and distribution. The use of modern steganography methods - the art of hiding information within multimedia - presents an unprecedented opportunity for malicious uses of these materials. Therefore, developing an effective technique to avoid the distribution of secret data is a significant problem that is addressed in this paper for digital images. We introduce a novel algorithm to remove the steganography information embedded in an image without changing the quality of the image and with no prior knowledge of the utilized steganography technique. Our new algorithm called Adaptive Threshold Displacement (ATD) is applied to images in the spatial domain. ATD divides the whole image into different segments and within a given segment, some pixels are displaced according to their contents as well as their neighboring pixel values. For evaluating the effectiveness of our proposed algorithm, we apply ATD to different images that contain hidden information, embedded using two different widely used steganography techniques. The presented results show that virtually all of the hidden information is destroyed by our proposed ATD algorithm, with a retrieval BER of over 40% in average. However, the quality of the images does not change and the PSNR of the resulting images is above 32 dB.

[1]  Ana Kuzmanić Skelin,et al.  Fast two-step histogram-based image segmentation , 2011 .

[2]  Yuan-Pei Lin,et al.  Wavelet tree quantization for copyright protection watermarking , 2004, IEEE Transactions on Image Processing.

[3]  Larbi Boubchir,et al.  The 2nd BOWS Contest: Wavelet-Based Bayesian Denoising Attack on Image Watermarking , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[4]  Jiwu Huang,et al.  Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Thierry Pun,et al.  Second Generation Benchmarking and Application Oriented Evaluation , 2001, Information Hiding.

[6]  Darko Kirovski,et al.  Blind pattern matching attack on watermarking systems , 2003, IEEE Trans. Signal Process..

[7]  Chun-Shien Lu,et al.  Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection , 2006, IEEE Transactions on Multimedia.

[8]  Amar Mitiche,et al.  Unsupervised Variational Image Segmentation/Classification Using a Weibull Observation Model , 2006, IEEE Transactions on Image Processing.

[9]  M. Jamzad,et al.  A new watermarking attack based on content-aware image resizing , 2009, 2009 International Multimedia, Signal Processing and Communication Technologies.

[10]  Nikolas P. Galatsanos,et al.  Digital watermarking robust to geometric distortions , 2005, IEEE Transactions on Image Processing.

[11]  Mauro Barni,et al.  Expanding the class of watermark de-synchronization attacks , 2007, MM&Sec.

[12]  Amirhossein Taherinia,et al.  A New Watermarking Attack Using Long-Range Correlation Image Restoration , 2009, 2009 International Conference on Availability, Reliability and Security.