Benchmarking steganographic and steganalysis techniques

There have been a number of steganography embedding techniques proposed over the past few years. In turn the development of these techniques have led to an increased interest in steganalysis techniques. More specifically Universal steganalysis techniques have become more attractive since they work independently of the embedding technique. In this work, our goal is to compare a number of universal steganalysis techniques proposed in the literature which include techniques based on binary similarity measures, wavelet coefficients' statistics, and DCT based image features. These universal steganalysis techniques are tested against a number of well know embedding techniques, including Outguess, F5, Model based, and perturbed quantization. Our experiments are done using a large dataset of JPEG images, obtained by randomly crawling a set of publicly available websites. The image dataset is categorized with respect to the size and quality. We benchmark embedding rate versus detectability performances of several widely used embedding as well as universal steganalysis techniques. Furthermore, we provide a framework for benchmarking future techniques.

[1]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..

[2]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[3]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.

[4]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[5]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[6]  Jessica J. Fridrich,et al.  Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.

[7]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[8]  Husrev T. Sencar,et al.  Image Steganography: Concepts and Practice , 2004 .

[9]  William A. Pearlman,et al.  Kernel Fisher discriminant for steganalysis of JPEG hiding methods , 2004, IS&T/SPIE Electronic Imaging.

[10]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[11]  Tom Fawcett,et al.  ROC Graphs: Notes and Practical Considerations for Researchers , 2007 .

[12]  Siwei Lyu,et al.  Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.

[13]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[14]  C.-C. Jay Kuo,et al.  Steganography in JPEG2000 compressed images , 2003, IEEE Trans. Consumer Electron..

[15]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[16]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.