Feature extraction optimization of JPEG steganalysis based on residual images

Abstract JPEG steganalysis is a technique for detecting the existence of secret information hidden in JPEG images. At present, JPEG steganalysis based on residual images has been widely studied due to its low complexity and good performance. Due to the use of different quality factors in the JPEG image, the features need to be scaled appropriately according to this quality factor to obtain better detection performance. However, the current method of selecting the appropriate scale is usually based on empirical formulas or experiments. To solve this problem, we propose a novel adaptive scale adjustment algorithm for feature extraction filters. This algorithm can adaptively adjust the scale of the feature extraction filter according to the quality factor of JPEG images for better performance. In addition, we also propose a new weighted histogram method. Before calculating the histogram features of the residual image, we do not perform the rounding operation as usual, and different weights are assigned according to the distance between each input and histogram bins. The experimental results on BossBase set show that the proposed method can improve the performance of steganalysis.

[1]  Yi Ma,et al.  Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms , 2017, IH&MMSec.

[2]  Xinpeng Zhang,et al.  Towards Robust Image Steganography , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Wei Zhang,et al.  Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection , 2018, Signal Process..

[4]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[5]  Saman Shojae Chaeikar,et al.  Ensemble SW image steganalysis: A low dimension method for LSBR detection , 2019, Signal Process. Image Commun..

[6]  Jessica J. Fridrich,et al.  Steganalysis of JPEG images using rich models , 2012, Other Conferences.

[7]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[9]  Jessica J. Fridrich,et al.  Phase-aware projection model for steganalysis of JPEG images , 2015, Electronic Imaging.

[10]  Yi Zhang,et al.  Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.

[11]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[12]  Florent Retraint,et al.  Statistical detection of data hidden in least significant bits of clipped images , 2014, Signal Process..

[13]  Zhenxing Qian,et al.  Diversity-Based Cascade Filters for JPEG Steganalysis , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[14]  Guo-Shiang Lin,et al.  A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.

[15]  Jessica J. Fridrich,et al.  Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.

[16]  Chin-Chen Chang,et al.  Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery , 2018, IEEE MultiMedia.

[17]  Ainuddin Wahid Abdul Wahab,et al.  Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..

[18]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[19]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[20]  Yun Q. Shi,et al.  Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.

[21]  Xinpeng Zhang,et al.  Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images , 2019, IEEE Transactions on Image Processing.

[22]  Florent Retraint,et al.  Quality factor estimation of JPEG compressed images , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).