An Improved Steganalysis Method Using Feature Combinations

This paper proposes a new feature extraction method for steganalysis. In the improved method, the feature set is equipped with two parts. The first part is obtained by employing an existing feature extraction method on a suspicious image. With a content-correlative operation, differences of the image features are enlarge between the cover and the stego. The second part is obtained by employing the same feature extraction method on the obtained image. The two parts are combined together to form the new feature set. With the new feature set, the modifications made by steganography can be recognized more efficiently. Experimental results show that the detection accuracy of existing feature extraction methods is increased using the proposed method.

[1]  Xinpeng Zhang,et al.  Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation , 2019, Int. J. Digit. Crime Forensics.

[2]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Xinpeng Zhang,et al.  Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization , 2018, IEEE Signal Processing Letters.

[4]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[5]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[6]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[7]  Jiangqun Ni,et al.  Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.

[8]  Xinpeng Zhang,et al.  Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain , 2018 .

[9]  Bin Li,et al.  A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Jessica J. Fridrich,et al.  Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.

[11]  Xinpeng Zhang,et al.  Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images , 2019, IEEE Transactions on Image Processing.

[12]  Xinpeng Zhang,et al.  Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change , 2016, IWDW.

[13]  Ruohan Meng A fusion steganographic algorithm based on Faster R-CNN , 2018 .

[14]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[15]  Amaury Lendasse,et al.  A Feature Selection Methodology for Steganalysis , 2006, MRCS.

[16]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[17]  Jun Yu,et al.  Capacity Limits of Pseudorandom Channels in Deception Problems , 2015, IEEE Transactions on Information Forensics and Security.

[18]  Jessica J. Fridrich,et al.  Steganalysis of JPEG images using rich models , 2012, Other Conferences.

[19]  Yue Zhang,et al.  APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT , 2019, J. Netw. Comput. Appl..

[20]  Zhenxing Qian,et al.  On Improving Distortion Functions for JPEG Steganography , 2018, IEEE Access.

[21]  Xinpeng Zhang,et al.  Hybrid distortion function for JPEG steganography , 2016, J. Electronic Imaging.

[22]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[23]  Mi Wen,et al.  Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles , 2016, IEEE Transactions on Information Forensics and Security.

[24]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[25]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[26]  Jianhua Li,et al.  Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks , 2018, IEEE Transactions on Network and Service Management.

[27]  Bin Li,et al.  Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography , 2017, IEEE Transactions on Information Forensics and Security.

[28]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[29]  Mohammad Saniee Abadeh,et al.  Image steganalysis using a bee colony based feature selection algorithm , 2014, Eng. Appl. Artif. Intell..

[30]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[31]  Jessica J. Fridrich,et al.  Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.

[32]  Xintao Duan,et al.  Coverless Steganography for Digital Images Based on a Generative Model , 2018 .