Joint-channel modeling to attack QIM steganography

This paper presents a statistical steganalysis framework to attack quantization index modulation (QIM) based steganography. The quantization process is generally modeled as an additive noise channel. The proposed method exploits the fact that plain-quantization (quantization without message embedding) decreases local-randomness (or increases local-correlation) in the resulting quantized image. Moreover, QIM-stego image exhibits relatively higher level of local-randomness than the corresponding quantized-cover, though both are obtained using same set of parameters. The local-randomness (or inter-block correlation) of the test-image is used to capture traces left behind by quantization. A parametric model is developed to characterize channel-dependent local-randomness. Maximum likelihood estimation (MLE) framework is used to estimate parameters of the distribution of local-randomness mask. Distributions of parameters, estimated from the quantized-cover and the QIM-stego images, are used to characterize quantization with and without message embedding. To investigate variations in the estimated parameters as a function of frequency, inter- (variations within each channel(or subband)) and intra-channel (across all channels), joint-channel modeling and single-channel modeling, respectively, is considered. For each approach, a set of parametric detectors based on generalized likelihood ratio test (GLRT) is used to distinguish between the cover- and the stego-images. To improve detection accuracy, decisions from both detectors are fused to generate the final stego-detection decision. Effectiveness of the proposed framework is evaluated using a dataset consisting of over 35000 test-images obtained from 880 uncompressed natural images. Experimental results show that the proposed scheme can successfully detect QIM-stego images with very low false rates. In addition, performance comparison with existing state-of-the-art also shows that the proposed method performs significantly superior than the selected methods.

[1]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[2]  B. S. Manjunath,et al.  LLRT based detection of LSB hiding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[3]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.

[4]  Bernd Girod,et al.  Informed Watermarking , 2002 .

[5]  K. P. Subbalakshmi,et al.  Steganalysis of QIM Steganography , 2013 .

[6]  Jessica J. Fridrich,et al.  Quantitative steganalysis using rich models , 2013, Electronic Imaging.

[7]  R. Chandramouli,et al.  Secret key estimation in sequential steganography , 2005 .

[8]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[9]  J. Fridrich,et al.  Attacking the OutGuess , 2002 .

[10]  Rajarathnam Chandramouli,et al.  Nonparametric steganalysis of QIM data hiding using approximate entropy , 2008, Electronic Imaging.

[11]  Tomás Pevný,et al.  Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.

[12]  B. Widrow,et al.  Statistical theory of quantization , 1996 .

[13]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[14]  Yun Q. Shi,et al.  JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.

[15]  Qingzhong Liu,et al.  Neighboring joint density-based JPEG steganalysis , 2011, TIST.

[16]  Jessica J. Fridrich,et al.  Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain , 2005, IS&T/SPIE Electronic Imaging.

[17]  Ying Wang,et al.  Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.

[18]  Rajarathnam Chandramouli,et al.  Current trends in steganalysis: a critical survey , 2004, ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..

[19]  Andrew D. Ker A General Framework for Structural Steganalysis of LSB Replacement , 2005, Information Hiding.

[20]  Guo-Shiang Lin,et al.  A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.

[21]  Yun Q. Shi,et al.  JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[22]  Kyung-Ae Moon,et al.  EM Estimation of Scale Factor for Quantization-Based Audio Watermarking , 2003, IWDW.

[23]  Yong-feng Huang,et al.  Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis , 2012, Journal of Zhejiang University SCIENCE C.

[24]  Rajarathnam Chandramouli,et al.  A mathematical framework for active steganalysis , 2003, Multimedia Systems.

[25]  Ja-Ling Wu,et al.  Digital-Invisible-Ink Data Hiding Based on Spread-Spectrum and Quantization Techniques , 2008, IEEE Transactions on Multimedia.

[26]  Aiming Wang,et al.  Detection of Quantization Data Hiding , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[27]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[28]  Jessica J. Fridrich,et al.  Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.

[29]  Bane V. Vasic,et al.  Simplification Resilient LDPC-Coded Sparse-QIM Watermarking for 3D-Meshes , 2012, IEEE Transactions on Multimedia.

[30]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[31]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[32]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[33]  Lionel Fillatre Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images , 2012, IEEE Transactions on Signal Processing.

[34]  A. Murat Tekalp,et al.  Universal image steganalysis using rate-distortion curves , 2004, IS&T/SPIE Electronic Imaging.

[35]  B. S. Manjunath,et al.  Steganalysis of quantization index modulation data hiding , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[36]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[37]  Chengyun Yang,et al.  Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.

[38]  Nasir D. Memon,et al.  On steganalysis of random LSB embedding in continuous-tone images , 2002, Proceedings. International Conference on Image Processing.

[39]  Siho Kim,et al.  Estimation of Quantization Step Size Against Amplitude Modification Attack in Scalar Quantization-Based Audio Watermarking , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[40]  Tomás Pevný,et al.  Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images , 2008, Electronic Imaging.

[41]  Zhihua Xia,et al.  Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.

[42]  C. Kelley Solving Nonlinear Equations with Newton's Method , 1987 .

[43]  Wei Su,et al.  Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[44]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[45]  Pierre Duhamel,et al.  Applied public-key steganography , 2002, IS&T/SPIE Electronic Imaging.

[46]  Ramamurti Chandramouli,et al.  Nonparametric Steganalysis of QIM Steganography Using Approximate Entropy , 2012, IEEE Transactions on Information Forensics and Security.

[47]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[48]  Andrew D. Ker,et al.  Going from small to large data in steganalysis , 2012, Other Conferences.

[49]  Hafiz Malik,et al.  Steganalysis of QIM steganography using irregularity measure , 2008, MM&Sec '08.

[50]  Jessica J. Fridrich,et al.  Steganalysis of JPEG images using rich models , 2012, Other Conferences.

[51]  Guo-Shiang Lin,et al.  A Framework of Enhancing Image Steganography With Picture Quality Optimization and Anti-Steganalysis Based on Simulated Annealing Algorithm , 2010, IEEE Transactions on Multimedia.

[52]  Hafiz Malik Statistical modeling of footprints of QIM steganography , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[53]  Rainer Böhme,et al.  Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.

[54]  H. Vincent Poor,et al.  An introduction to signal detection and estimation (2nd ed.) , 1994 .

[55]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[56]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[57]  Weiping Li,et al.  Revisit Steganalysis on QIM-Based Data Hiding , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[58]  B. S. Manjunath,et al.  High-volume data hiding in images: Introducing perceptual criteria into quantization based embedding , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[59]  Rajarathnam Chandramouli,et al.  Steganalysis of GIM-based data hiding using kernel density estimation , 2007, MM&Sec.