MBNS Steganogram Detection and Payload Capacity Estimation Exploiting the Statistical Moments of Entropy Measure

ABSTRACT Multiple Base Notational System (MBNS) steganography (Zhang & Wang, 2005) scheme employs human vision sensitivity to hide a large amount of secret bits into a still image with a high imperceptibility and is demonstrated to be robust to statistical analysis. In MBNS steganography, secret data are converted into symbols in a notational system with multiple bases. The pixels of a host image are then altered such that their remainders are equal to the symbols, when the pixel values are divided by the bases. Empirically it is observed that the moments of the entropy measure of the remainders in a stego image are larger than that of its clean counterpart. Based on this observation, we propose an active steganalytic approach which effectively breaks the MBNS steganography even with 5% payload capacity, utilizing these moments as features and also makes an estimation of the embedding rate. Experimental results demonstrate that the proposed scheme significantly outperforms prior arts in classification accuracy.

[1]  Simon Haykin,et al.  Neural Networks: A Comprehensive Foundation , 1998 .

[2]  A. Touir,et al.  A New Image Steganography Technique , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[3]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[4]  John Langford,et al.  Provably Secure Steganography , 2002, IEEE Transactions on Computers.

[5]  Ling-di Ping,et al.  A New Steganography Algorithm Based on Spatial Domain , 2009, 2009 Second International Symposium on Information Science and Engineering.

[6]  M. S. Sutaone,et al.  Image based steganography using LSB insertion technique , 2008 .

[7]  Weiguo Gong,et al.  A novel steganography algorithm based on Curvelet transform against JPEG attacks , 2010, 2010 8th World Congress on Intelligent Control and Automation.

[8]  Thomas J. Watson,et al.  An empirical study of the naive Bayes classifier , 2001 .

[9]  Xinpeng Zhang,et al.  Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..

[10]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[11]  Sushil Kumar,et al.  Secure image steganography based on Slantlet transform , 2009, 2009 Proceeding of International Conference on Methods and Models in Computer Science (ICM2CS).

[12]  Xinpeng Zhang,et al.  Multibit Assignment Steganography in Palette Images , 2008, IEEE Signal Processing Letters.

[13]  David E. Goldberg,et al.  Genetic Algorithms in Search Optimization and Machine Learning , 1988 .

[14]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[15]  Tung-Shou Chen,et al.  Lossless Steganography for AMBTC-Compressed Images , 2008, 2008 Congress on Image and Signal Processing.

[16]  Leonardo Noriega,et al.  Multilayer Perceptron Tutorial , 2005 .

[17]  Adnan Abdul-Aziz Gutub,et al.  RGB Intensity Based Variable-Bits Image Steganography , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[18]  Bin Li,et al.  Steganalysis of Multiple-Base Notational System Steganography , 2008, IEEE Signal Processing Letters.

[19]  Mahdi Ramezani,et al.  Adaptive Image Steganography with Mod-4 Embedding Using Image Contrast , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[20]  Min-Shiang Hwang,et al.  A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..

[21]  M. S. Sutaone,et al.  Image based steganography using LSB insertion , 2008 .

[22]  Liang Zhang,et al.  A High-Capacity Steganography Scheme for JPEG2000 Baseline System , 2009, IEEE Transactions on Image Processing.

[23]  Xinpeng Zhang,et al.  Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..

[24]  Adnan Abdul-Aziz Gutub,et al.  Triple-A: Secure RGB image steganography based on randomization , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.

[25]  Anjali A. Shejul,et al.  A DWT Based Approach for Steganography Using Biometrics , 2010, 2010 International Conference on Data Storage and Data Engineering.

[26]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[27]  B. Luo,et al.  A Color Images Steganography Method by Multiple Embedding Strategy Based on Sobel Operator , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[28]  Lior Rokach,et al.  Top-down induction of decision trees classifiers - a survey , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[29]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[30]  R. Shreelekshmi,et al.  Cover Image Preprocessing for More Reliable LSB Replacement Steganography , 2010, 2010 International Conference on Signal Acquisition and Processing.

[31]  Chih-Jen Lin,et al.  A Practical Guide to Support Vector Classication , 2008 .

[32]  D. Lakshmi Narayana,et al.  High Capacity Image Steganography in Wavelet Domain , 2022 .