Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system

This paper reports the design principles and evaluation results of a new experimental universal, blind image steganalysing system. This system investigates the use of content independent statistical evidences left by the steganograms, as features for an image steganalyzer. The work is aimed at maximizing the sensitivity and specificity of the steganalyzer and to accomplish both security and system performance. A genetic-X-means classifier is constructed to realize the proposed model. For performance evaluation, a database composed of 5600 plain and stego images (generated by using seven different embedding schemes) was established. The results of our empirical experiment prove the vitality of the proposed scheme in detecting stego anomalies in images. In addition, the simulation results show that the effectiveness of steganalytic system can be enhanced by considering the content independent distortion measures and maximizing the sensitivity and specificity of the system.

[1]  Deli Yang,et al.  A New Steganalysis Approach Based on Both Complexity Estimate and Statistical Filter , 2002, IEEE Pacific Rim Conference on Multimedia.

[2]  Rajarathnam Chandramouli,et al.  Mathematical approach to steganalysis , 2002, IS&T/SPIE Electronic Imaging.

[3]  Naokazu Yokoya,et al.  Data embedding into pictorial images with less distortion using discrete cosine transform , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[4]  Carl E. Halford,et al.  Developing operational performance metrics using image comparison metrics and the concept of degradation space , 1999 .

[5]  Thomas S. Huang,et al.  An additive approach to transform-domain information hiding and optimum detection structure , 2001, IEEE Trans. Multim..

[6]  Andrew D. Ker A Weighted Stego Image Detector for Sequential LSB Replacement , 2007 .

[7]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[8]  Jiwu Huang,et al.  Adaptive image watermarking scheme based on visual masking , 1998 .

[9]  Ioannis Pitas,et al.  Robust image watermarking in the spatial domain , 1998, Signal Process..

[10]  Chin-Chen Chang,et al.  A virtual image cryptosystem based upon vector quantization , 1998, IEEE Trans. Image Process..

[11]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[12]  Scott J. Daly,et al.  Visible differences predictor: an algorithm for the assessment of image fidelity , 1992, Electronic Imaging.

[13]  O-Hyung Kwon,et al.  Wavelet based watermarking method for digital images using the human visual system , 1999 .

[14]  Thierry Pun,et al.  StegoWall: blind statistical detection of hidden data , 2002, IS&T/SPIE Electronic Imaging.

[15]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[16]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[17]  Nasir D. Memon,et al.  A distributed detection framework for Steganalysis , 2000, MULTIMEDIA '00.

[18]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[19]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[20]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[21]  Guo-Shiang Lin,et al.  A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.

[22]  Fang Min A Novel Intrusion Detection Method Based on Combining Ensemble Learning With Induction-Enhanced Particle Swarm Algorithm , 2007, Third International Conference on Natural Computation (ICNC 2007).

[23]  Maurice Maes,et al.  Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.

[24]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[25]  Andrew W. Moore,et al.  X-means: Extending K-means with Efficient Estimation of the Number of Clusters , 2000, ICML.

[26]  Zheng Zhang,et al.  Detection of block DCT-based steganography in gray-scale images , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[27]  Guo-Shiang Lin,et al.  Robust image watermarking on the DCT domain , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[28]  Fernando Pérez-González,et al.  Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..

[29]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[30]  Yeuan-Kuen Lee,et al.  High capacity image steganographic model , 2000 .

[31]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[32]  David G. Stork,et al.  Pattern Classification , 1973 .

[33]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[34]  Andrew B. Watson,et al.  Digital images and human vision , 1993 .