Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Neighboring joint density-based JPEG steganalysis

Published: 24 February 2011 Publication History

Abstract

The threat posed by hackers, spies, terrorists, and criminals, etc. using steganography for stealthy communications and other illegal purposes is a serious concern of cyber security. Several steganographic systems that have been developed and made readily available utilize JPEG images as carriers. Due to the popularity of JPEG images on the Internet, effective steganalysis techniques are called for to counter the threat of JPEG steganography. In this article, we propose a new approach based on feature mining on the discrete cosine transform (DCT) domain and machine learning for steganalysis of JPEG images. First, neighboring joint density features on both intra-block and inter-block are extracted from the DCT coefficient array and the absolute array, respectively; then a support vector machine (SVM) is applied to the features for detection. An evolving neural-fuzzy inference system is employed to predict the hiding amount in JPEG steganograms. We also adopt a feature selection method of support vector machine recursive feature elimination to reduce the number of features. Experimental results show that, in detecting several JPEG-based steganographic systems, our method prominently outperforms the well-known Markov-process based approach.

References

[1]
Avcibas, I., Memon, N., and Sankur, B. 2003. Steganalysis using image quality metrics. IEEE Trans. Image Proc. 12, 2, 221--229.
[2]
Chang, C., Lin, C., Tseng, C., and Tai, W. 2007. Reversible hiding in DCT-based compressed images. Inf. Sci. 177, 13, 2768--2786.
[3]
Chen, C. and Shi, Y. 2008. JPEG image steganalysis utilizing both intrablock and interblock correlations. In Proceedings of the IEEE International Symposium on Circuits and Systems. 3029--3032.
[4]
Cho, D. and Bui, T. 2005. Multivariate statistical modeling for image denoising using wavelet transforms. Signal Process. Image Commun. 20, 1, 77--89.
[5]
Fridrich, J., Goljan, M., and Hogeam, D. 2002. Steganalysis of JPEG images: Breaking the F5 algorithm. In Proceedings of the 5th Information Hiding Workshop. 310--323.
[6]
Fridrich, J. 2004. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Lecture Notes in Computer Science, vol. 3200, 67--81.
[7]
Guyon, I., Weston, J., Barnhill, S., and Vapnik, V. N. 2002. Gene selection for cancer classification using support vector machines. Mach. Learn., 46, 1-3, 389--422.
[8]
Harmsen, J. and Pearlman, W. 2003. Steganalysis of additive noise modelable information hiding. In Proceedings of the SPIE, vol. 5020, 131--142.
[9]
Harmsen, J. and Pearlman, W. 2004. Kernel fisher discriminant for steganalysis of JPEG hiding methods. In Proceedings of the SPIE, vol. 5306, 13--22.
[10]
Hetzl, S. and Mutzel, P. 2005. A graph-theoretic approach to steganography. Lecture Notes in Computer Science, vol. 3677, 119--128.
[11]
Joachims, T. 1999. Making large-scale SVM learning practical. In Advances in Kernel Methods—Support Vector Learning, B. Schölkopf, C. Burges and A. Smola, Eds., MIT Press.
[12]
Joachims, T. 2000. Estimating the generalization performance of a SVM efficiently. In Proceedings of the 7th International Conference on Machine Learning, Morgan Kaufman.
[13]
Joachims, T. 2002. Learning to Classify Text Using Support Vector Machines. Kluwer.
[14]
Kasabov, N. K. and Song, Q. 2002. DENFIS: Dynamic evolving neural-fuzzy inference system and its application for time-series. IEEE Trans. Fuzzy Syst. 10, 2, 144--154.
[15]
Katzenbeisser, S. and Petitcolas, F. 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Books.
[16]
Ker, A. 2005. Improved detection of LSB steganography in grayscale images. Lecture Notes in Computer Science, vol. 3200, 97--115.
[17]
Kim, Y., Duric, Z., and Richards, D. 2006. Modified matrix encoding technique for minimal distortion stegangoraphy. In Proceedings of the 8th International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 4437, 314--327.
[18]
Kodovsky, J., Pevny, T., and Fridrich, J. 2010. Modern steganalysis can detect YASS. In Proceedings of the SPIE, Electronic Imaging, Media Forensics and Security XII, 02-01--02-11.
[19]
Li, B., Shi, Y., and Huang, J. 2009. Steganalysis of YASS. IEEE Trans. Inf. Foren. Sec. 4, 3, 369--382.
[20]
Liu, Q. and Sung, A. H. 2007. Feature mining and nuero-fuzzy inference system for steganalysis of LSB matching steganography in grayscale images. In Proceedings of the 20th International Joint Conference on Artificial Intelligence. 2808--2813.
[21]
Liu, Q., Sung, A. H., Chen, H., and Xu, J. 2008a. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Patt. Recog. 41, 1, 56--66.
[22]
Liu, Q., Sung, A. H., Ribeiro, B. M., Wei, M., Chen, Z., and Xu, J. 2008b. Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf. Sci. 178, 1, 21--36.
[23]
Liu, Q., Sung, A. H., Ribeiro, B., and Ferriera, R. 2008c. Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting. In Proceedings of the 21st International Joint Conference on Neural Networks, 3351--3356.
[24]
Liu, Q., Sung, A. H., and Qiao, M. 2009a. Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Foren. Sec. 4, 3, 359--368.
[25]
Liu, Q., Sung, A. H., and Qiao, M. 2009b. Novel stream mining for audio steganalysis. In Proceedings of the 17th ACM Conference on Multimedia. 95--104.
[26]
Liu, Q., Sung, A. H., and Qiao, M. 2009c. Improved detection and evaluation for JPEG steganalysis. In Proceedings of the 17th ACM Conference on Multimedia. 873--876.
[27]
Liu, Q. and Sung, A. H. 2009d. A new approach for JPEG resize and image splicing detection. In Proceedings of the ACM Multimedia Workshop on Multimedia Forensics. 43--47.
[28]
Liu, Q., Sung, A. H., Qiao, M., Chen, Z., and Ribeiro, B. 2010a. An improved approach to steganaysis of JPEG images. Inf. Sci. 180, 9, 1643--1655.
[29]
Liu, Q., Sung, A. H., and Qiao, M. 2010b. Derivative based audio steganalysis. ACM Trans. Multimed. Comput. Comm. Appl. To appear.
[30]
Lyu, S. and Farid, H. 2005. How realistic is photorealistic. IEEE Trans. Signal Proc. 53, 2, 845--850.
[31]
Marvel, L., Boncelet, C., and Retter, C. 1999. Spread spectrum image steganography. IEEE Trans. Image Proc. 8, 8, 1075--1083.
[32]
Mielikainen, J. 2006. LSB matching revisited. IEEE Sig. Proc. Lett. 13, 5, 285--287.
[33]
Ohm, J. R. 2004. Multimedia Communication Technology, Representation, Transmission and Identification of Multimedia Signals. Springer, Berlin.
[34]
Pevny, T. and Fridrich, J. 2007. Merging Markov and DCT features for multi-class JPEG steganalysis. In Proceedings of the SPIE, vol. 6505.
[35]
Pevny, T., Filler, T., and Bas, P. 2010. Using high-dimensional image models to perform highly undetectable steganography. In Proceedings of the 12th International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 6387, 161--177.
[36]
Provos, N. 2001. Defending against statistical steganalysis. In Proceedings of the 10th USENIX Security Symposium. 323--335.
[37]
Sachnev, V., Kim, H. J., and Zhang, R. 2009. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome code. In Proceedings of the 11th ACM Multimedia & Security Workshop. 131--140.
[38]
Sallee, P. 2004. Model based steganography. Lecture Notes in Computer Science, vol. 2939, 154--167.
[39]
Sarkar, A., Nataraj, L., Manjunath, B. S., and Madhow, U. 2008a. Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS—A randomized block based hiding scheme. In Proceedings of the 15th IEEE International Conference on Image Processing. 1292--1295.
[40]
Sarkar, A., Solanki, K., and Manjunath, B. S. 2008b. Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis. In Proceedings of the SPIE—Security, Steganography, and Watermarking of Multimedia Contents (X), vol. 6819.
[41]
Sharifi, K. and Leon-Garcia, A. 1995. Estimation of shape parameter for generalized Gaussian distributions in subband decompositions of video. IEEE Trans. Circuits Syst. Video Technol. 5, 52--56.
[42]
Sharp, T. 2001. An implementation of key-based digital signal steganography. Lecture Notes in Computer Science, vol. 2137, 13--26.
[43]
Shi, Y., Chen, C., and Chen, W. 2007. A Markov process based approach to effective attacking JPEG steganography. Lecture Notes in Computer Science, vol. 4437, 249--264.
[44]
Solanki, K., Sarkar, A., and Manjunath, B. 2007. YASS: Yet another steganogrpahic scheme that resists blind steganalysis. Lecture Notes in Computer Science, vol. 4567, 16--31.
[45]
Vapnik, V. 1998. Statistical Learning Theory, Wiley.
[46]
Westfeld, A. 2001. High capacity despite better steganalysis (F5—a steganographic algorithm). Lecture Notes in Computer Science, vol. 2137, 289--302.
[47]
Yu, X. and Babaguchi, N. 2008. Breaking the YASS algorithm via pixel and DCT coefficients analysis. In Proceedings of the 19th International Conference on Pattern Recognition. 1--4.

Cited By

View all
  • (2024)Lightweight Steganography Detection Method Based on Multiple Residual Structures and TransformerChinese Journal of Electronics10.23919/cje.2022.00.45233:4(965-978)Online publication date: Jul-2024
  • (2024)Modification in spatial, extraction from transform: Keyless side-information steganography for JPEGJournal of Visual Communication and Image Representation10.1016/j.jvcir.2024.104249103(104249)Online publication date: Aug-2024
  • (2023)A novel font color and compression text steganography technique2023 International Conference on Communication, Computing and Digital Systems (C-CODE)10.1109/C-CODE58145.2023.10139867(1-6)Online publication date: 17-May-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Intelligent Systems and Technology
ACM Transactions on Intelligent Systems and Technology  Volume 2, Issue 2
February 2011
175 pages
ISSN:2157-6904
EISSN:2157-6912
DOI:10.1145/1899412
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 February 2011
Accepted: 01 August 2010
Revised: 01 June 2010
Received: 01 February 2010
Published in TIST Volume 2, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. JPEG
  2. SVM
  3. SVMRFE
  4. classification
  5. neighboring joint density
  6. nuero-fuzzy
  7. steganalysis
  8. steganography

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)1
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Lightweight Steganography Detection Method Based on Multiple Residual Structures and TransformerChinese Journal of Electronics10.23919/cje.2022.00.45233:4(965-978)Online publication date: Jul-2024
  • (2024)Modification in spatial, extraction from transform: Keyless side-information steganography for JPEGJournal of Visual Communication and Image Representation10.1016/j.jvcir.2024.104249103(104249)Online publication date: Aug-2024
  • (2023)A novel font color and compression text steganography technique2023 International Conference on Communication, Computing and Digital Systems (C-CODE)10.1109/C-CODE58145.2023.10139867(1-6)Online publication date: 17-May-2023
  • (2023)Forensic discrimination between traditional and compressive imaging by blurring kernel investigationMultimedia Tools and Applications10.1007/s11042-023-16535-y83:14(41349-41374)Online publication date: 12-Oct-2023
  • (2022)Digital Image Steganalysis: Current Methodologies and Future ChallengesIEEE Access10.1109/ACCESS.2022.320290510(92321-92336)Online publication date: 2022
  • (2021)A part-level learning strategy for JPEG image recompression detectionMultimedia Tools and Applications10.1007/s11042-020-10200-4Online publication date: 9-Jan-2021
  • (2020)TADOC: Text analytics directly on compressionThe VLDB Journal — The International Journal on Very Large Data Bases10.1007/s00778-020-00636-330:2(163-188)Online publication date: 19-Sep-2020
  • (2019)Using Machine Learning to Predict Stealthy Watermarks in Files During Cyber Crime InvestigationsProceedings of the 2019 3rd International Conference on Compute and Data Analysis10.1145/3314545.3314561(20-25)Online publication date: 14-Mar-2019
  • (2019)Deep Multi-scale Discriminative Networks for Double JPEG Compression ForensicsACM Transactions on Intelligent Systems and Technology10.1145/330127410:2(1-20)Online publication date: 15-Feb-2019
  • (2019)An Audio Classification Approach Based on Machine Learning2019 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)10.1109/ICITBS.2019.00156(626-629)Online publication date: Jan-2019
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media