Critical review of image steganalysis techniques

Steganography is the art of covert communication aims at hiding information onto a digital cover media. The choice of the cover medium could be audio, image or video files. Owing to the illegal use of such secret communications, steganalysis the art of code breaking steganography has gained momentum. This paper presents the recent trends in image steganalysis techniques. The two prominent methods have been identified as embedding specific and universal blind steganalysis. As universal blind steganalysis does not demand the prior knowledge of the embedding method, it has become the choice of many steganalysers. It has been identified that universal steganalysis is a two class classification problem and could be implemented with statistical analyses or computational intelligence. As this classification depends on the chosen feature set or the image model, this paper has detailed the feature-based image steganalysis techniques. The curse of dimensionality increased computational time of the chosen feature sets compel the use of statistical feature reduction methods. Hence, the features set optimisation technique have been reviewed in detail.

[1]  Ying Wang,et al.  Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.

[2]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[4]  Deng Qian-lan,et al.  The blind detection of information hiding in color image , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[5]  Tomás Pevný,et al.  Modern steganalysis can detect YASS , 2010, Electronic Imaging.

[6]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[7]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[8]  Deepa D. Shankar,et al.  Feature Based Steganalysis Using Wavelet Decomposition and Magnitude Statistics , 2010, 2010 International Conference on Advances in Computer Engineering.

[9]  T. Gireesh Kumar,et al.  Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector Machine , 2010, ICT.

[10]  Minh N. Do,et al.  Wavelet-based texture retrieval using generalized Gaussian density and Kullback-Leibler distance , 2002, IEEE Trans. Image Process..

[12]  Guo-Shiang Lin,et al.  A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.

[13]  Zhuo Li,et al.  Steganalysis Algorithm Based on the D Reduction of Improved Differential Matrix in Images , 2010, 2010 Chinese Conference on Pattern Recognition (CCPR).

[14]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[15]  Azman Samsudin,et al.  Digital steganalysis: Computational intelligence approach , 2009 .

[16]  Rahul Agrawal,et al.  Performance Evaluation of Exponential Discriminant Analysis with Feature Selection for Steganalysis , 2012 .

[17]  Ziwen Sun,et al.  An image steganalysis method based on characteristic function moments and PCA , 2011, Proceedings of the 30th Chinese Control Conference.

[18]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[19]  Chao Guan,et al.  Steganalysis Based on Co-occurrence Matrix of Differential Image , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[20]  Jing Dong,et al.  Blind image steganalysis based on run-length histogram analysis , 2008, 2008 15th IEEE International Conference on Image Processing.

[21]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[22]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[23]  Wei Su,et al.  Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[24]  Hong-Bin Zhang,et al.  Blind Steganalysis using Wavelet Statistics and ANOVA , 2007, 2007 International Conference on Machine Learning and Cybernetics.

[25]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[26]  Patrick P. K. Chan,et al.  Blind steganalysis with high generalization capability for different image databases using L-GEM , 2011, 2011 International Conference on Machine Learning and Cybernetics.

[27]  Fenlin Liu,et al.  Image universal steganalysis based on wavelet packet transform , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[28]  Xinpeng Zhang,et al.  JPEG Steganalysis With High-Dimensional Features and Bayesian Ensemble Classifier , 2013, IEEE Signal Processing Letters.

[29]  Qingzhong Liu,et al.  Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images , 2008, Pattern Recognit..

[30]  Jessica J. Fridrich,et al.  Random projections of residuals as an alternative to co-occurrences in steganalysis , 2013, Electronic Imaging.

[31]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[32]  N. Kamaraj,et al.  Optimized Image Steganalysis through Feature Selection using MBEGA , 2010, ArXiv.

[33]  Amaury Lendasse,et al.  Reliable Steganalysis Using a Minimum Set of Samples and Features , 2009, EURASIP J. Inf. Secur..

[34]  Chengyun Yang,et al.  Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[35]  Mansour Sheikhan,et al.  Blind image steganalysis via joint co-occurrence matrix and statistical moments of contourlet transform , 2010, 2010 10th International Conference on Intelligent Systems Design and Applications.

[36]  Shaohui Liu,et al.  Steganalysis based on wavelet texture analysis and neural network , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).

[37]  Mostafa Mehdipour-Ghazi,et al.  Universal Steganalysis Based on Local Prediction Error in Wavelet Domain , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[38]  Hedieh Sajedi,et al.  A Steganalysis Method Based on Contourlet Transform Coefficients , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[39]  Siwei Lyu,et al.  Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.

[40]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[41]  Yeuan-Kuen Lee,et al.  High capacity image steganographic model , 2000 .

[42]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[43]  Stefanos Gritzalis,et al.  On the Typical Statistic Features for Image Blind Steganalysis , 2011, IEEE Journal on Selected Areas in Communications.

[44]  Guoming Chen,et al.  Particle Swarm Optimization Feature Selection for Image Steganalysis , 2012, 2012 Fourth International Conference on Digital Home.

[45]  Jessica J. Fridrich,et al.  JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts , 2012, Information Hiding.

[46]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[47]  Jing-Qu Lin,et al.  JPEG image steganalysis method based on binary similarity measures , 2009, 2009 International Conference on Machine Learning and Cybernetics.