Abstract
In this paper, we propose a new multi-class steganalysis for binary image. The proposed method can identify the type of steganographic technique used by examining on the given binary image. In addition, our proposed method is also capable of differentiating an image with hidden message from the one without hidden message. In order to do that, we will extract some features from the binary image. The feature extraction method used is a combination of the method extended from our previous work and some new methods proposed in this paper. Based on the extracted feature sets, we construct our multi-class steganalysis from the SVM classifier. We also present the empirical works to demonstrate that the proposed method can effectively identify five different types of steganography.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Böhme, R., Westfeld, A.: Breaking cauchy model-based jpeg steganography with first order statistics. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 125–140. Springer, Heidelberg (2004)
Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines (2001), Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm
Chang, C.-C., Tseng, C.-S., Lin, C.-C.: Hiding data in binary images. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) ISPEC 2005. LNCS, vol. 3439, pp. 338–349. Springer, Heidelberg (2005)
Chiew, K.L., Pieprzyk, J.: A countermeasure for binary image steganography. In: International Conference on Availability, Reliability and Security (2010)
Cortes, C., Vapnik, V.: Support-vector networks. Machine Learning 20(3), 273–297 (1995)
Dong, J., Wang, W., Tan, T.: Multi-class blind steganalysis based on image run-length analysis. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) Digital Watermarking. LNCS, vol. 5703, pp. 199–210. Springer, Heidelberg (2009)
Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)
Fridrich, J., Goljan, M., Soukal, D., Holotyak, T.: Forensic steganalysis: determining the stego key in spatial domain steganography. In: Proceedings of the SPIE on Security and Watermarking of Multimedia Contents VII, vol. 5681, pp. 631–642 (2005)
He, J., Huang, J.: Steganalysis of stochastic modulation steganography. Science in China Series F: Information Sciences 49(3), 273–285 (2006)
Hsu, C.-W., Lin, C.-J.: A comparison of methods for multiclass support vector machines. IEEE Transactions on Neural Networks 13, 415–425 (2002)
Jiang, M., Wu, X., Wong, E., Memon, A.: Steganalysis of boundary-based steganography using autoregressive model of digital boundaries. In: IEEE International Conference on Multimedia and Expo, vol. 2, pp. 883–886 (2004)
Liang, G.-l., Wang, S.-z., Zhang, X.-p.: Steganography in binary image by checking data-carrying eligibility of boundary pixels. Journal of Shanghai University (English Edition) 11(3), 272–277 (2007)
Liu, Z., Ping, L., Chen, J., Wang, J., Pan, X.: Steganalysis based on differential statistics. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 224–240. Springer, Heidelberg (2006)
Morkel, T., Eloff, J.H.P., Olivier, M.S.: Using image steganography for decryptor distribution. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 322–330. Springer, Heidelberg (2006)
Noble, W.S.: What is a support vector machine? Nature biotechnology 24(12) (2006)
Pan, H.-K., Chen, Y.-Y., Tseng, Y.-C.: A secure data hiding scheme for two-color images. In: 5th IEEE Symposium on Computers and Communications, pp. 750–755 (2000)
Pevný, T., Fridrich, J.: Multi-class blind steganalysis for jpeg images. In: Proceedings of the SPIE on Security and Watermarking of Multimedia Contents VIII, vol. 6072(1), pp. 257–269 (2006)
Pevny, T., Fridrich, J.: Merging markov and DCT features for multi-class jpeg steganalysis. In: Proceedings of the SPIE on Security and Watermarking of Multimedia Contents IX, vol. 6505(1), pp. 1–13 (2007)
Provos, N.: Defending against statistical steganalysis. In: Proceedings of the 10th conference on USENIX Security Symposium, vol. 10, pp. 323–335 (2001)
Rodriguez, B., Peterson, G.L.: Detecting steganography using multi-class classification. In: IFIP International Conference on Digital Forensics, vol. 242, pp. 193–204 (2007)
Savoldi, A., Gubian, P.: Blind multi-class steganalysis system using wavelet statistics. In: 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, vol. 2, pp. 93–96 (2007)
Shi, Y.Q., Chen, C., Chen, W.: A markov process based approach to effective attacking jpeg steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)
Tseng, Y.-C., Pan, H.-K.: Secure and invisible data hiding in 2-color images. In: Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 887–896 (2001)
Wang, P., Liu, F., Wang, G., Sun, Y., Gong, D.: Multi-class steganalysis for Jpeg stego algorithms. In: 15th IEEE International Conference on Image Processing, pp. 2076–2079 (2008)
Westfeld, A.: F5-A steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Wu, M., Liu, B.: Data hiding in binary image for authentication and annotation. IEEE transactions on multimedia 6(4), 528–538 (2004)
Yang, C.-Y.: Color image steganography based on module substitutions. In: 3rd IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, vol. 2, pp. 118–121 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chiew, K.L., Pieprzyk, J. (2010). Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds) Information Security, Practice and Experience. ISPEC 2010. Lecture Notes in Computer Science, vol 6047. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12827-1_25
Download citation
DOI: https://doi.org/10.1007/978-3-642-12827-1_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12826-4
Online ISBN: 978-3-642-12827-1
eBook Packages: Computer ScienceComputer Science (R0)