Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles

This work tackles a recent challenge in digital image processing: how to identify the steganographic images from a steganographer, who is unknown among multiple innocent actors. The method does not need a large number of samples to train classification model, and thus it is significantly different from the traditional steganalysis. The proposed scheme consists of textural features and clustering ensembles. Local ternary patterns (LTP) are employed to design low-dimensional textural features which are considered to be more sensitive to steganographic changes in texture regions of image. Furthermore, we use the extracted low-dimensional textural features to train a number of hierarchical clustering results, which are integrated as an ensemble based on the majority voting strategy. Finally, the ensemble is used to make optimal decision for suspected image. Extensive experiments show that the proposed scheme is effective and efficient and outperforms the state-of-the-art steganalysis methods with an average gain from 4 % to 6 % .

[1]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[2]  Yun Q. Shi,et al.  Textural Features for Steganalysis , 2012, Information Hiding.

[3]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[4]  Florent Retraint,et al.  A local adaptive model of natural images for almost optimal detection of hidden data , 2014, Signal Process..

[5]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[6]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[7]  Mi Wen,et al.  Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles , 2016, IEEE Transactions on Information Forensics and Security.

[8]  Tao Zhang,et al.  A fast and effective steganalytic technique against JSteg-like algorithms , 2003, SAC '03.

[9]  Tomás Pevný,et al.  A new paradigm for steganalysis via clustering , 2011, Electronic Imaging.

[10]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[11]  Xinpeng Zhang,et al.  Digital image steganalysis based on local textural features and double dimensionality reduction , 2016, Secur. Commun. Networks.

[12]  Jessica J. Fridrich,et al.  Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.

[13]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[14]  Andrew D. Ker,et al.  The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.

[15]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[16]  David A. Huffman,et al.  A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.

[17]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[18]  Bernhard Schölkopf,et al.  A Kernel Method for the Two-Sample-Problem , 2006, NIPS.

[19]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[20]  Florent Retraint,et al.  Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm , 2014, IEEE Transactions on Image Processing.

[21]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[22]  Rainer Böhme,et al.  Weighted Stego-Image Steganalysis for JPEG Covers , 2008, Information Hiding.

[23]  Jessica J. Fridrich,et al.  Quantitative Structural Steganalysis of Jsteg , 2010, IEEE Transactions on Information Forensics and Security.

[24]  Florent Retraint,et al.  Steganalysis of JSteg algorithm using hypothesis testing theory , 2015, EURASIP J. Inf. Secur..

[25]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[26]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[27]  Jessica J. Fridrich,et al.  Further study on the security of S-UNIWARD , 2014, Electronic Imaging.

[28]  David Megías,et al.  Unsupervised steganalysis based on artificial training sets , 2016, Eng. Appl. Artif. Intell..

[29]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[30]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[31]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[32]  Tomás Pevný,et al.  Identifying a steganographer in realistic and heterogeneous data sets , 2012, Other Conferences.