Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory

The machine learning paradigm currently predominantly used for steganalysis of digital images works on the principle of fusing the decisions of many weak base learners. In this paper, we employ a statistical model of such an ensemble and replace the majority voting rule with a likelihood ratio test. This allows us to train the ensemble to guarantee desired statistical properties, such as the false-alarm probability and the detection power, while preserving the high detection accuracy of original ensemble classifier. It also turns out the proposed test is linear. Moreover, by replacing the conventional total probability of error with an alternative criterion of optimality, the ensemble can be extended to detect messages of an unknown length to address composite hypotheses. Finally, the proposed well-founded statistical formulation allows us to extend the ensemble to multi-class classification with an appropriate criterion of optimality and an optimal associated decision rule. This is useful when a digital image is tested for the presence of secret data hidden by more than one steganographic method. Numerical results on real images show the sharpness of the theoretically established results and the relevance of the proposed methodology.

[1]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[2]  Florent Retraint,et al.  An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection , 2013, IEEE Transactions on Information Forensics and Security.

[3]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[4]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[5]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[6]  Qionghai Dai,et al.  Similarity-based online feature selection in content-based image retrieval , 2006, IEEE Transactions on Image Processing.

[7]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[8]  L. L. Cam,et al.  Asymptotic Methods In Statistical Decision Theory , 1986 .

[9]  Jessica J. Fridrich,et al.  Steganalysis of JPEG images using rich models , 2012, Other Conferences.

[10]  Florent Retraint,et al.  Statistical Decision Methods in Hidden Information Detection , 2011, Information Hiding.

[11]  Wen Gao,et al.  Hierarchical Ensemble of Global and Local Classifiers for Face Recognition , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[12]  Jessica J. Fridrich,et al.  Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.

[13]  Tomás Pevný Detecting messages of unknown length , 2011, Electronic Imaging.

[14]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[15]  Andrew D. Ker Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.

[16]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[17]  Tomás Pevný,et al.  Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[18]  Tamás Szántai,et al.  Computing Multivariate Normal Probabilities: A New Look , 2002 .

[19]  A. Genz,et al.  Computation of Multivariate Normal and t Probabilities , 2009 .

[20]  Jessica J. Fridrich,et al.  Theoretical model of the FLD ensemble classifier based on hypothesis testing theory , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[21]  Stephen E. Fienberg,et al.  Testing Statistical Hypotheses , 2005 .

[22]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[23]  Florent Retraint,et al.  Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm , 2014, IEEE Transactions on Image Processing.

[24]  Tomás Pevný,et al.  A mishmash of methods for mitigating the model mismatch mess , 2014, Electronic Imaging.

[25]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[26]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.

[27]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[28]  Jiangqun Ni,et al.  An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[29]  Florent Retraint,et al.  A Cover Image Model For Reliable Steganalysis , 2011, Information Hiding.

[30]  Tomás Pevný,et al.  From Blind to Quantitative Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.

[31]  Gerald S. Rogers,et al.  Mathematical Statistics: A Decision Theoretic Approach , 1967 .

[32]  John A. Nelder,et al.  A Simplex Method for Function Minimization , 1965, Comput. J..

[33]  Alfred O. Hero,et al.  Optimal simultaneous detection and estimation under a false alarm constraint , 1995, IEEE Trans. Inf. Theory.

[34]  Yun Q. Shi,et al.  An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[35]  Matthias O. Franz,et al.  Simple algorithmic modifications for improving blind steganalysis performance , 2010, MM&Sec '10.

[36]  Carl W. Helstrom,et al.  Elements of signal detection and estimation , 1994 .

[37]  Tomás Pevný,et al.  Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.

[38]  A. Gualtierotti H. L. Van Trees, Detection, Estimation, and Modulation Theory, , 1976 .

[39]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[40]  Florent Retraint,et al.  A local adaptive model of natural images for almost optimal detection of hidden data , 2014, Signal Process..

[41]  Florent Retraint,et al.  Statistical detection of data hidden in least significant bits of clipped images , 2014, Signal Process..

[42]  Jessica J. Fridrich,et al.  Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.

[43]  John Bowman Thomas,et al.  An introduction to statistical communication theory , 1969 .

[44]  Florent Retraint,et al.  Hidden information detection based on quantized Laplacian distribution , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[45]  FridrichJessica,et al.  Rich Models for Steganalysis of Digital Images , 2012 .

[46]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[47]  Jianping Fan,et al.  Integrating Concept Ontology and Multitask Learning to Achieve More Effective Classifier Training for Multilevel Image Annotation , 2008, IEEE Transactions on Image Processing.

[48]  Marc Chaumont,et al.  Steganalysis by ensemble classifiers with boosting by regression, and post-selection of features , 2012, 2012 19th IEEE International Conference on Image Processing.

[49]  B. S. Manjunath,et al.  Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.