A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics

Steganalysis relies on steganalytic features and classification techniques. Because of the complexity and different characteristics of cover images, to make steganalysis more applicable toward detecting stego images in real applications, we need to train different classifiers so as to match different images according to their characteristics. Selection of classifiers according to characteristics of images is the key point to improve accuracy of steganalysis. In our work, we study the methods of classifier selection based on characteristics of images including image size, quantization factor, or matrix. Besides, we also discuss other characteristics, such as texture, cover source, which makes an appreciable difference to steganalysis.

[1]  Jie Zhu,et al.  On More Paradigms of Steganalysis , 2016, Int. J. Digit. Crime Forensics.

[2]  Yi Zhang,et al.  Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.

[3]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Jessica J. Fridrich,et al.  Rich model for Steganalysis of color images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[5]  Jessica J. Fridrich,et al.  Study of cover source mismatch in steganalysis and ways to mitigate its impact , 2014, Electronic Imaging.

[6]  Tomás Pevný,et al.  A mishmash of methods for mitigating the model mismatch mess , 2014, Electronic Imaging.

[7]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[8]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[9]  Jessica J. Fridrich,et al.  Steganalysis in resized images , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[10]  Jessica J. Fridrich,et al.  Effect of Cover Quantization on Steganographic Fisher Information , 2012, IEEE Transactions on Information Forensics and Security.

[11]  Yun Q. Shi,et al.  An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[12]  Andrew D. Ker,et al.  Steganalysis with mismatched covers: do simple classifiers help? , 2012, MM&Sec '12.

[13]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[14]  Yun Q. Shi,et al.  Textural Features for Steganalysis , 2012, Information Hiding.

[15]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[16]  Jessica J. Fridrich,et al.  Steganalysis of JPEG images using rich models , 2012, Other Conferences.

[17]  Jessica J. Fridrich,et al.  Breaking HUGO - The Process Discovery , 2011, Information Hiding.

[18]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[19]  Mauro Barni,et al.  Forensics aided steganalysis of heterogeneous images , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[20]  J. Fridrich Steganography in Digital Media: Principles, Algorithms, and Applications , 2009 .

[21]  Jessica J. Fridrich,et al.  Calibration revisited , 2009, MM&Sec '09.

[22]  Tomás Pevný,et al.  The square root law of steganographic capacity , 2008, MM&Sec '08.

[23]  Tomás Pevný,et al.  Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.

[24]  Chih-Jen Lin,et al.  LIBLINEAR: A Library for Large Linear Classification , 2008, J. Mach. Learn. Res..

[25]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[26]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[27]  Dana S. Richards,et al.  Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.

[28]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[29]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[30]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[31]  Phil Sallee,et al.  Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..