The Influence of the Image Basis on Modeling and Steganalysis Performance

We compare two image bases with respect to their capabilities for image modeling and steganalysis. The first basis consists of wavelets, the second is a Laplacian pyramid. Both bases are used to decompose the image into subbands where the local dependency structure is modeled with a linear Bayesian estimator. Similar to existing approaches, the image model is used to predict coefficient values from their neighborhoods, and the final classification step uses statistical descriptors of the residual. Our findings are counter-intuitive on first sight: Although Laplacian pyramids have better image modeling capabilities than wavelets, steganalysis based on wavelets is much more successful. We present a number of experiments that suggest possible explanations for this result.

[1]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[2]  E. Delp,et al.  Security, steganography, and watermarking of multimedia contents , 2004 .

[3]  I. Johnstone,et al.  Ideal spatial adaptation by wavelet shrinkage , 1994 .

[4]  Matthias O. Franz,et al.  Simple algorithmic modifications for improving blind steganalysis performance , 2010, MM&Sec '10.

[5]  Alexander J. Smola,et al.  Learning with Kernels: support vector machines, regularization, optimization, and beyond , 2001, Adaptive computation and machine learning series.

[6]  S. Geisser,et al.  A Predictive Approach to Model Selection , 1979 .

[7]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[8]  Edward H. Adelson,et al.  IMAGE DATA COMPRESSION WITH THE LAPLACIAN PYRAMID , 1981 .

[9]  Andrew D. Ker Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.

[10]  Alexander J. Smola,et al.  Learning with kernels , 1998 .

[11]  D. Signorini,et al.  Neural networks , 1995, The Lancet.

[12]  John W. Woods,et al.  Subband Image Coding , 1990 .

[13]  Jessica J. Fridrich,et al.  Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.

[14]  Gunnar Rätsch,et al.  Advanced Lectures on Machine Learning , 2004, Lecture Notes in Computer Science.

[15]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[16]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[17]  Eero P. Simoncelli,et al.  Image compression via joint statistical characterization in the wavelet domain , 1999, IEEE Trans. Image Process..

[18]  Jessica J. Fridrich,et al.  Stochastic approach to secret message length estimation in ±k embedding steganography , 2005, IS&T/SPIE Electronic Imaging.

[19]  Carl E. Rasmussen,et al.  Gaussian processes for machine learning , 2005, Adaptive computation and machine learning.

[20]  Bart De Decker,et al.  Communications and Multimedia Security , 2011, Lecture Notes in Computer Science.