Stego anomaly detection in images exploiting the curvelet higher order statistics using evolutionary support vector machine

Steganalysis is an important extension to existing security infrastructure, and is gaining more research focus of forensic investigators and information security researchers. This paper reports the design principles and evaluation results of a new experimental blind image steganalysing system. This work approaches the steganalysis task as a pattern classification problem. The detection accuracy of the steganalyser depends on the selection of low-dimensional informative features. We investigate this problem as a three step process and propose a novel steganalyser with the following implications: a) Selection of the Curvelet sub-band image representation that offers better discrimination ability for detecting stego anomalies in images, than other conventional wavelet transforms. b) Exploiting the empirical moments of the transformation as effective steganalytic features c) Realizing the system using an efficient classifier, evolutionary-Support Vector Machine (SVM) model that provides promising classification rate. An extensive empirical evaluation on a database containing 5600 clean and stego images shows that the proposed scheme is a state-of-the-art steganalyser that outperforms other previous steganalytic methods.

[1]  Guo-Shiang Lin,et al.  Robust image watermarking on the DCT domain , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[2]  David J. Field,et al.  Emergence of simple-cell receptive field properties by learning a sparse code for natural images , 1996, Nature.

[3]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[4]  Yeuan-Kuen Lee,et al.  High capacity image steganographic model , 2000 .

[5]  Hedieh Sajedi,et al.  CBS: Contourlet-Based Steganalysis Method , 2010, J. Signal Process. Syst..

[6]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..

[7]  C.-C. Jay Kuo,et al.  Block-based image steganalysis: Algorithm and performance evaluation , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.

[8]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[9]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.

[10]  Thomas S. Huang,et al.  An additive approach to transform-domain information hiding and optimum detection structure , 2001, IEEE Trans. Multim..

[11]  David G. Stork,et al.  Pattern Classification , 1973 .

[12]  Bin Gu,et al.  Incremental Support Vector Learning for Ordinal Regression , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[13]  Jessica J. Fridrich,et al.  CFA-aware features for steganalysis of color images , 2015, Electronic Imaging.

[14]  Xiaoming Huo,et al.  Sparse image representation via combined transforms , 1999 .

[15]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[16]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[17]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[18]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.

[19]  Jessica J. Fridrich,et al.  New methodology for breaking steganographic techniques for JPEGs , 2003, IS&T/SPIE Electronic Imaging.

[20]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[21]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[22]  Fang Min A Novel Intrusion Detection Method Based on Combining Ensemble Learning With Induction-Enhanced Particle Swarm Algorithm , 2007, Third International Conference on Natural Computation (ICNC 2007).

[23]  Jia-jun Lin,et al.  Steganalysis based on feature reducts of rough set by using genetic algorithm , 2008, 2008 7th World Congress on Intelligent Control and Automation.

[24]  Emmanuel J. Candès,et al.  The curvelet transform for image denoising , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[25]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[26]  Xinpeng Zhang,et al.  JPEG Steganalysis With High-Dimensional Features and Bayesian Ensemble Classifier , 2013, IEEE Signal Processing Letters.

[27]  Naokazu Yokoya,et al.  Data embedding into pictorial images with less distortion using discrete cosine transform , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[28]  Hong-Juan Zhang,et al.  Steganalysis of audio: attacking the Steghide , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[29]  Paolo Gubian,et al.  Blind Multi-Class Steganalysis System Using Wavelet Statistics , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[30]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[31]  Fernando Pérez-González,et al.  Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..

[32]  Anindya Sarkar,et al.  YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.

[33]  O-Hyung Kwon,et al.  Wavelet based watermarking method for digital images using the human visual system , 1999 .

[34]  Wen Gao,et al.  Neural network based steganalysis in still images , 2003, ICME.

[35]  Bo Xu,et al.  Improved BSS Based Schemes for Active Steganalysis , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[36]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[37]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[38]  Jessica J. Fridrich,et al.  Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.

[39]  N. Kamaraj,et al.  StegoHunter: Steganalysis of LSB Embedded Images Based on Stego-Sensitive Threshold Close Color Pair Signature , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.

[40]  Yin-Cheng Qi,et al.  Wavelet domain audio steganalysis based on statistical moments and PCA , 2007, 2007 International Conference on Wavelet Analysis and Pattern Recognition.

[41]  Wen-Nung Lie,et al.  Data hiding in images with adaptive numbers of least significant bits based on the human visual system , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[42]  Guo-Shiang Lin,et al.  A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.

[43]  Peng Liu,et al.  Research on RTOS-Integrated TMR for Fault Tolerant Systems , 2007 .

[44]  Chengyun Yang,et al.  Effective steganalysis based on statistical moments of wavelet characteristic function , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[45]  E. Candès,et al.  Curvelets: A Surprisingly Effective Nonadaptive Representation for Objects with Edges , 2000 .

[46]  Gabriel Bugar,et al.  Universal Image Steganalytic Method , 2014 .

[47]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[48]  James E. Baker,et al.  Adaptive Selection Methods for Genetic Algorithms , 1985, International Conference on Genetic Algorithms.

[49]  Zheng Zhang,et al.  Detection of block DCT-based steganography in gray-scale images , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[50]  John H. Holland,et al.  Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .

[51]  Zhihua Xia,et al.  Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.

[52]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[53]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[54]  Jiwu Huang,et al.  Adaptive image watermarking scheme based on visual masking , 1998 .

[55]  Ioannis Pitas,et al.  Robust image watermarking in the spatial domain , 1998, Signal Process..

[56]  Tomás Pevný,et al.  Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.