Steganalysis Using Partially Ordered Markov Models

The field of steganalysis has blossomed prolifically in the past few years, providing the community with a number of very good blind steganalyzers. Features for blind steganalysis are generated in many different ways, typically using statistical measures. This paper presents a new image modeling technique for steganalysis that uses as features the conditional probabilities described by a stochastic model called a partially ordered Markov model (POMM). The POMM allows concise modeling of pixel dependencies among quantized discrete cosine transform coefficients. We develop a steganalyzer based on support vector machines that distinguishes between cover and stego JPEG images using 98 POMM features. We show that the proposed steganalyzer outperforms two comparative Markov-based steganalyzers [25,6] and outperforms a third steganalyzer [23] on half of the tested classes, by testing our approach with many different image databases on five embedding algorithms, with a total of 20,000 images.

[1]  B. S. Manjunath,et al.  Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.

[2]  Edward J. Delp,et al.  Media Forensics and Security , 2009 .

[3]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.

[4]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[5]  E. Delp,et al.  Security, steganography, and watermarking of multimedia contents , 2004 .

[6]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[7]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[8]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[9]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[10]  Laveen N. Kanal,et al.  Classification of binary random patterns , 1965, IEEE Trans. Inf. Theory.

[11]  Yun Q. Shi,et al.  JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[12]  Jessica J. Fridrich,et al.  Calibration revisited , 2009, MM&Sec '09.

[13]  Ingemar J. Cox,et al.  Steganalysis for LSB Matching in Images with High-frequency Noise , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.

[14]  N. Cressie,et al.  Image analysis with partially ordered Markov models , 1998 .

[15]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[16]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[17]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[18]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[19]  Christopher J. C. Burges,et al.  A Tutorial on Support Vector Machines for Pattern Recognition , 1998, Data Mining and Knowledge Discovery.

[20]  Noel Cressie,et al.  Optimal closed boundary identification in gray-scale imagery , 2005, Journal of Mathematical Imaging and Vision.

[21]  Jana Dittmann,et al.  Proceedings of the 10th ACM workshop on Multimedia and security , 2008 .

[22]  Noel Cressie,et al.  Texture synthesis and pattern recognition for partially ordered Markov models , 1999, Pattern Recognit..

[23]  Andrew D. Ker,et al.  Feature reduction and payload location with WAM steganalysis , 2009, Electronic Imaging.