A new steganalysis paradigm based on image retrieval of similar image-inherent statistical properties and outlier detection

Conventional steganalysis method generally encounters the problems of embedding algorithm mismatch (EAM) and cover source mismatch (CSM). These problems cause difficulties in the use of steganalysis in the real world. Learning from the idea of image pre-classified, this study presents a JPEG steganalysis paradigm combining the similarity retrieval of image-inherent statistical properties (IISP) and unsupervised outlier detection. First, cover images with similar IISP to the test image are searched from massive image database to establish an aided sample set. Outlier detection is then performed in a test set composed of the test image and its aided sample set to judge the type of the test image. Experimental results show that the proposed paradigm can effectively avoid EAM and CSM. It demonstrates better performance than the steganalysis strategy using a mixed image set as the training sample. The proposed method has high detection efficiency with the unsupervised outlier detection.

[1]  Mohammad Rahmati,et al.  New framework for using image contents in blind steganalysis systems , 2011, J. Electronic Imaging.

[2]  Tomás Pevný,et al.  Batch steganography in the real world , 2012, MM&Sec '12.

[3]  Jessica J. Fridrich,et al.  Study of cover source mismatch in steganalysis and ways to mitigate its impact , 2014, Electronic Imaging.

[4]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[5]  Mohammad Rahmati,et al.  A DCT Statistics-Based Universal Image Steganalysis , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[6]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[7]  Andrew D. Ker,et al.  The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.

[8]  Mikhail Belkin,et al.  Laplacian Eigenmaps and Spectral Techniques for Embedding and Clustering , 2001, NIPS.

[9]  Tomás Pevný,et al.  Identifying a steganographer in realistic and heterogeneous data sets , 2012, Other Conferences.

[10]  Tao Zhang,et al.  Image Pre-classification to improve accuracy of universal steganalysis , 2014, 2014 IEEE 5th International Conference on Software Engineering and Service Science.

[11]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[12]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[13]  Tomás Pevný,et al.  Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.

[14]  Mauro Barni,et al.  Forensics aided steganalysis of heterogeneous images , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[15]  Tomás Pevný,et al.  A mishmash of methods for mitigating the model mismatch mess , 2014, Electronic Imaging.

[16]  Tomás Pevný,et al.  Novelty detection in blind steganalysis , 2008, MM&Sec '08.

[17]  Douglas M. Hawkins Identification of Outliers , 1980, Monographs on Applied Probability and Statistics.

[18]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[19]  Tomás Pevný,et al.  A new paradigm for steganalysis via clustering , 2011, Electronic Imaging.

[20]  Siwei Lyu,et al.  Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.