Data hiding domain classification for blind image steganalysis

A statistical feature-based scheme is proposed to identify the data hiding domain of an embedded signal in this research. Two phenomena are observed for images before and after data hiding. First, the gradient energy increases as the continuity of gray levels between adjacent pixels is disturbed by the embedded signal. Second, the statistical variance of the coefficient distribution in macro-blocks tends to decrease after data hiding. These phenomena are analyzed mathematically. Then, statistical features in the pixel, DCT, and DWT domains are extracted and a maximum likelihood ratio test is adopted to solve the hiding domain classification problem. The proposed scheme has demonstrated good classification results

[1]  Chengyun Yang,et al.  Effective steganalysis based on statistical moments of wavelet characteristic function , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[2]  Chengyun Yang,et al.  Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique , 2004, IWDW.

[3]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[4]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[5]  N. Ansari,et al.  Interleaving for combating bursts of errors , 2004, IEEE Circuits and Systems Magazine.

[6]  Jiwu Huang,et al.  Analysis of the role played by error correcting coding in robust watermarking , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[7]  Yun Q. Shi,et al.  Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA) , 2006, IWDW.

[8]  Zhicheng Ni,et al.  Lossless data hiding based on integer wavelet transform , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[9]  Jiwu Huang,et al.  A DWT-Based Fragile Watermarking Tolerant of JPEG Compression , 2002, IWDW.

[10]  Chengyun Yang,et al.  A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition , 2004, IWDW.

[11]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[12]  Jiwu Huang,et al.  A robust DWT-based video watermarking algorithm , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[13]  Jiwu Huang,et al.  Image fragile watermarking based on fusion of multi-resolution tamper detection , 2002 .

[14]  David G. Stork,et al.  Pattern Classification , 1973 .

[15]  Yun Q. Shi,et al.  3D interleaving for enhancing the robustness of watermark signals embedded in video sequences , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[16]  Wei Su,et al.  Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[17]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[18]  Jiwu Huang,et al.  Efficiently self-synchronized audio watermarking for assured audio data transmission , 2005, IEEE Transactions on Broadcasting.

[19]  Jiwu Huang,et al.  Robust Watermarking with Adaptive Receiving , 2003, IWDW.

[20]  Yun Q. Shi,et al.  A unified authentication framework for JPEG2000 , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[21]  Yun Q. Shi,et al.  Enhancing robustness of digital watermarking against geometric attack based on fractal transform , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[22]  Yun-Qing Shi,et al.  A new two-dimensional interleaving technique using successive packing , 2002 .

[23]  Yun Q. Shi,et al.  A content-based image authentication system with lossless data hiding , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[24]  Chengyun Yang,et al.  Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[25]  Reginald L. Lagendijk,et al.  Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[26]  Wei Su,et al.  Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition , 2006, IWDW.

[27]  Zhicheng Ni,et al.  Distortionless data hiding based on integer wavelet transform , 2002 .

[28]  Qiang Liu,et al.  Sample domain integration of medical data for multimedia diagnosis , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[29]  Jiwu Huang,et al.  Achieving non-ambiguity of quantization-based watermarking , 2006, Electronic Imaging.

[30]  Yun Q. Shi,et al.  Image Steganalysis Based on Statistical Moments of Wavelet Subband Histograms in DFT Domain , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.

[31]  Yun Q. Shi,et al.  2-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Still Images , 2000, IEEE International Conference on Multimedia and Expo.

[32]  Yong Wang,et al.  A blind audio watermarking algorithm with self-synchronization , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[33]  Yun Q. Shi,et al.  Identity Verification System Using Data Hiding and Fingerprint Recognition , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.

[34]  Jiwu Huang,et al.  Self-synchronized audio watermark in DWT domain , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[35]  Y. Shi,et al.  STEGANALYSIS BASED ON MOMENTS OF CHARACTERISTIC FUNCTIONS USING WAVELET DECOMPOSITION, PREDICTION-ERROR IMAGE, AND NEURAL NETWORK , 2005 .

[36]  Yun Q. Shi,et al.  Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function , 2006, 2006 International Conference on Image Processing.

[37]  Yun Q. Shi,et al.  Lossless data hiding: fundamentals, algorithms and applications , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[38]  Jiwu Huang,et al.  Image watermarking algorithm applying CDMA , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[39]  Chengyun Yang,et al.  Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.

[40]  Chengyun Yang,et al.  Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets , 2006, IWDW.