Passive steganalysis based on higher order image statistics of curvelet transform

Steganographic techniques accomplish covert communication by embedding secret messages into innocuous digital images in ways that are imperceptible to the human eye. This paper presents a novel passive steganalysis strategy in which the task is approached as a pattern classification problem. A critical part of the steganalyser design depends on the selection of informative features. This paper is aimed at proposing a novel attack with improved performance indices with the following implications: 1) employing higher order statistics from a curvelet sub-band image representation that offers better discrimination ability for detecting stego anomalies in images, as compared to other conventional wavelet transforms; 2) increasing the sensitivity and specificity of the system by the feature reduction phase; 3) realizing the system using an efficient classification engine, a neuro-C4.5 classifier, which provides better classification rate. An extensive experimental evaluation on a database containing 5600 clean and stego images shows that the proposed scheme is a state-of-the-art steganalyser that outperforms other previous steganalytic methods.

[1]  E. Candès,et al.  New tight frames of curvelets and optimal representations of objects with piecewise C2 singularities , 2004 .

[2]  D. Donoho,et al.  Translation-Invariant De-Noising , 1995 .

[3]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[4]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[5]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[6]  Jessica J. Fridrich,et al.  Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.

[7]  Peng Liu,et al.  Research on RTOS-Integrated TMR for Fault Tolerant Systems , 2007 .

[8]  Leo Breiman,et al.  Bagging Predictors , 1996, Machine Learning.

[9]  Ioannis Pitas,et al.  Robust image watermarking in the spatial domain , 1998, Signal Process..

[10]  E. Candès,et al.  Curvelets: A Surprisingly Effective Nonadaptive Representation for Objects with Edges , 2000 .

[11]  Fernando Pérez-González,et al.  Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..

[12]  Jiwu Huang,et al.  Adaptive image watermarking scheme based on visual masking , 1998 .

[13]  O-Hyung Kwon,et al.  Wavelet based watermarking method for digital images using the human visual system , 1999 .

[14]  Zheng Zhang,et al.  Detection of block DCT-based steganography in gray-scale images , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[15]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[16]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[17]  S. Geetha,et al.  A neuro-genetic based short-term forecasting framework for network intrusion prediction system , 2009, Int. J. Autom. Comput..

[18]  S. T. Buckland,et al.  An Introduction to the Bootstrap. , 1994 .

[19]  Jun Wu,et al.  A feature-based robust digital image watermarking against desynchronization attacks , 2007, Int. J. Autom. Comput..

[20]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[21]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[22]  Emmanuel J. Candès,et al.  The curvelet transform for image denoising , 2002, IEEE Trans. Image Process..

[23]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[24]  Chengyun Yang,et al.  Effective steganalysis based on statistical moments of wavelet characteristic function , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[25]  N. Kamaraj,et al.  Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system , 2009, Comput. Secur..

[26]  Thomas S. Huang,et al.  An additive approach to transform-domain information hiding and optimum detection structure , 2001, IEEE Trans. Multim..

[27]  Nick G. Kingsbury,et al.  Redundant representation with complex wavelets: how to achieve sparsity , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[28]  N. Kamaraj,et al.  Stego-Breaker: Defeating the Steganographic Systems through Genetic-X-Means approach using Image Quality Metrics , 2008, 2008 16th International Conference on Advanced Computing and Communications.

[29]  Wei Tang,et al.  Ensembling neural networks: Many could be better than all , 2002, Artif. Intell..

[30]  N. Kamaraj,et al.  Close Color Pair Signature ensemble Adaptive Threshold based Steganalsis for LSB Embedding in Digital Images , 2008, Trans. Data Priv..

[31]  Bo Xu,et al.  Improved BSS Based Schemes for Active Steganalysis , 2007 .

[32]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[33]  Rajarathnam Chandramouli,et al.  Mathematical approach to steganalysis , 2002, IS&T/SPIE Electronic Imaging.

[34]  John H. Holland,et al.  Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .

[35]  Yeuan-Kuen Lee,et al.  High capacity image steganographic model , 2000 .

[36]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[37]  Zhi-Hua Zhou,et al.  Hybrid decision tree , 2002, Knowl. Based Syst..

[38]  N. Kamaraj,et al.  StegoHunter: Steganalysis of LSB Embedded Images Based on Stego-Sensitive Threshold Close Color Pair Signature , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.

[39]  Guo-Shiang Lin,et al.  Robust image watermarking on the DCT domain , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[40]  Zhi-Hua Zhou,et al.  NeC4.5: Neural Ensemble Based C4.5 , 2004, IEEE Trans. Knowl. Data Eng..

[41]  Naokazu Yokoya,et al.  Data embedding into pictorial images with less distortion using discrete cosine transform , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[42]  Guo-Shiang Lin,et al.  A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.

[43]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..