New framework for using image contents in blind steganalysis systems

Although current blind image steganalysis systems utilize a wide variety of features and classifiers, a common shortcoming in all of them is that they almost have similar processes for all images and they do not take advantage of the content diversity of different images. In this paper, a new framework is proposed that enables us to employ the content of images in these systems. All blind image steganalysis methods can be adapted to the proposed framework. In the training phase of our framework, the input images are first divided into classes according to an image content evaluation criterion and then the training process is specialized for each class. In the testing phase, a fuzzy approach is used to include different classes in the decision making process. Experimental results demonstrate that the proposed framework significantly enhance the detection accuracy of these systems.

[1]  Jessica J. Fridrich,et al.  Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.

[2]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[3]  Wei Liang,et al.  JPEG image steganalysis using joint discrete cosine transform domain features , 2010, J. Electronic Imaging.

[4]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[5]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[6]  Hedieh Sajedi,et al.  Adaptive batch steganography considering image embedding capacity , 2009 .

[7]  E. Delp,et al.  Security, steganography, and watermarking of multimedia contents , 2004 .

[8]  John F. Canny,et al.  A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[9]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[10]  Fenlin Liu,et al.  A review on blind detection for image steganography , 2008, Signal Process..

[11]  Gregg H. Gunsch,et al.  Wavelet-based steganalysis using a computational immune system approach , 2003, Visual Communications and Image Processing.

[12]  B. S. Manjunath,et al.  Steganalysis of quantization index modulation data hiding , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[13]  Yun Q. Shi,et al.  Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA) , 2006, IWDW.

[14]  Bin Li,et al.  Steganalysis of YASS , 2009, IEEE Transactions on Information Forensics and Security.

[15]  Jessica J. Fridrich,et al.  Calibration revisited , 2009, MM&Sec '09.

[16]  Sangjin Lee,et al.  Category Attack for LSB Steganalysis of JPEG Images , 2006, IWDW.

[17]  Hany Farid,et al.  Detecting Steganographic Messages in Digital Images , 2001 .

[18]  Ming Guo,et al.  Image Steganalysis Based on Spatial Domain and DWT Domain Features , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.

[19]  Jessica J. Fridrich,et al.  Perturbed quantization steganography , 2005, Multimedia Systems.

[20]  Yao Zhao,et al.  PM1 steganography in JPEG images using genetic algorithm , 2008, Soft Comput..

[21]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[22]  Christian Ullerich,et al.  Weaknesses of MB2 , 2007, IWDW.

[23]  Sorina Dumitrescu,et al.  Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..

[24]  Guo-Shiang Lin,et al.  A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.

[25]  Nasir D. Memon,et al.  Steganalysis of watermarking techniques using image quality metrics , 2001, IS&T/SPIE Electronic Imaging.

[26]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[27]  Yun Q. Shi,et al.  JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.

[28]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[29]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[30]  Bülent Sankur,et al.  Statistical evaluation of image quality measures , 2002, J. Electronic Imaging.

[31]  Chiang-Lung Liu,et al.  High-performance JPEG steganography using complementary embedding strategy , 2008, Pattern Recognit..

[32]  Lei Guo,et al.  Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[33]  Anindya Sarkar,et al.  YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.

[34]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[35]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[36]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.