Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT

Published: 01 February 2015 Publication History

Abstract

This paper introduces a novel feature set for steganalysis of JPEG images. The features are engineered as first-order statistics of quantized noise residuals obtained from the decompressed JPEG image using 64 kernels of the discrete cosine transform (DCT) (the so-called undecimated DCT). This approach can be interpreted as a projection model in the JPEG domain, forming thus a counterpart to the projection spatial rich model. The most appealing aspect of this proposed steganalysis feature set is its low computational complexity, lower dimensionality in comparison with other rich models, and a competitive performance with respect to previously proposed JPEG domain steganalysis features.

References

[1]
I. Avcibas, N. D. Memon, and B. Sankur, “Steganalysis of watermarking techniques using image quality metrics,” Proc. SPIE, vol. 4314, pp. 523–531, Jan. 2001.
[2]
P. Bas, T. Filler, and T. Pevný, “‘Break our steganographic system’: The ins and outs of organizing BOSS,” in Proc. 13th Int. Conf. Inf. Hiding, Prague, Czech Republic, May 2011, pp. 59–70.
[3]
S. Bayram, A. E. Dirik, H. T. Sencar, and N. Memon, “An ensemble of classifiers approach to steganalysis,” in Proc. 20th Int. Conf. Pattern Recognit. (ICPR), Istanbul, Turkey, Aug. 2010, pp. 4376–4379.
[4]
R. Böhme, “Weighted stego-image steganalysis for JPEG covers,” in Proc. 10th Int. Workshop Inf. Hiding, vol. 5284, pp. 178–194, Jun. 2007.
[5]
L. Breiman, “Bagging predictors,” Mach. Learn., vol. 24, no. 2, pp. 123–140, Aug. 1996.
[6]
C. Chen and Y. Q. Shi, “JPEG image steganalysis utilizing both intrablock and interblock correlations,” in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), Seattle, WA, USA, May 2008, pp. 3029–3032.
[7]
R. Cogranne and F. Retraint, “Application of hypothesis testing theory for optimal detection of LSB matching data hiding,” Signal Process., vol. 93, no. 7, pp. 1724–1737, Jul. 2013.
[8]
H. Farid and L. Siwei, “Detecting hidden messages using higher-order statistics and support vector machines,” in Proc. 5th Int. Workshop Inf. Hiding, Oct. 2002, pp. 340–354.
[9]
J. Fridrich, M. Goljan, and D. Hogea, “Steganalysis of JPEG images: Breaking the F5 algorithm,” in Proc. 5th Int. Workshop Inf. Hiding, Oct. 2002, pp. 310–323.
[10]
J. Fridrich and J. Kodovský, “Rich models for steganalysis of digital images,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868–882, Jun. 2011.
[11]
J. Fridrich, T. Pevný, and J. Kodovský, “Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities,” in Proc. 9th ACM Multimedia Security Workshop, Sep. 2007, pp. 3–14.
[12]
L. Guo, J. Ni, and Y.-Q. Shi, “An efficient JPEG steganographic scheme using uniform embedding,” in Proc. 4th IEEE Int. Workshop Inf. Forensics Security, Tenerife, Spain, Dec. 2012, pp. 169–174.
[13]
V. Holub and J. Fridrich, “Random projections of residuals for digital image steganalysis,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1996–2006, Dec. 2013.
[14]
V. Holub and J. Fridrich, “Universal distortion design for steganography in an arbitrary domain,” EURASIP J. Inf. Security, vol. 2014, no. 1, pp. 1–13, 2014.
[15]
F. Huang, J. Huang, and Y.-Q. Shi, “New channel selection rule for JPEG steganography,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1181–1191, Aug. 2012.
[16]
A. D. Ker, “Implementing the projected spatial rich features on a GPU,” Proc. SPIE, vol. 9028, pp. 1801–1810, Feb. 2014.
[17]
A. D. Ker and T. Pevný, “Identifying a steganographer in realistic and heterogeneous data sets,” Proc. SPIE, vol. 8303, pp. 83030N-1–83030N-13, Jan. 2012.
[18]
A. D. Ker and T. Pevný, “Calibration revisited,” in Proc. 11th ACM Multimedia Security Workshop, Sep. 2009, pp. 63–74.
[19]
J. Kodovský and J. Fridrich, “Quantitative structural steganalysis of Jsteg,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 681–693, Dec. 2010.
[20]
J. Kodovský and J. Fridrich, “Steganalysis of JPEG images using rich models,” Proc. SPIE, vol. 8303, pp. 83030A-1–83030A-13, Jan. 2012.
[21]
J. Kodovský, J. Fridrich, and V. Holub, “Ensemble classifiers for steganalysis of digital media,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432–444, Apr. 2012.
[22]
L. Li, H. T. Sencar, and N. Memon, “A cost-effective decision tree based approach to steganalysis,” Proc. SPIE, vol. 8665, pp. 86650P-1–86650P-7, Feb. 2013.
[23]
Q. Liu, “Steganalysis of DCT-embedding based adaptive steganography and YASS,” in Proc. 13th ACM Multimedia Security Workshop, Sep. 2011, pp. 77–86.
[24]
Q. Liu and Z. Chen, “Improved approaches to steganalysis and seam-carved forgery detection in JPEG images,” ACM Trans. Intell. Syst. Tech. Syst., vol. 5, no. 4, pp. 39:1–39:30, 2014.
[25]
I. Lubenko and A. D. Ker, “Going from small to large data in steganalysis,” Proc. SPIE, vol. 8303, pp. 83030M-1–83030M-10, Jan. 2012.
[26]
S. Lyu and H. Farid, “Steganalysis using higher-order image statistics,” IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111–119, Mar. 2006.
[27]
T. Pevný and J. Fridrich, “Merging Markov and DCT features for multi-class JPEG steganalysis,” Proc. SPIE, vol. 6505, pp. 650503-1–650503-14, Feb. 2007.
[28]
T. Pevný and J. Fridrich, “Novelty detection in blind steganalysis,” in Proc. 10th ACM Multimedia Security Workshop, Sep. 2008, pp. 167–176.
[29]
Y. Q. Shi, C. Chen, and W. Chen, “A Markov process based approach to effective attacking JPEG steganography,” in Proc. 8th Int. Workshop Inf. Hiding, Jul. 2006, pp. 249–264.
[30]
T. H. Thai, R. Cogranne, and F. Retraint, “Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm,” IEEE Trans. Image Process., vol. 23, no. 5, pp. 1980–1993, May 2014.
[31]
A. Westfeld, “Generic adoption of spatial steganalysis to transformed domain,” in Proc. 10th Int. Workshop Inf. Hiding, Jun. 2007, pp. 161–177.
[32]
A. Westfeld and A. Pfitzmann, “Attacks on steganographic systems,” in Proc. 3rd Int. Workshop Inf. Hiding, Sep./Oct. 1999, pp. 61–75.
[33]
T. Zhang and X. Ping, “A fast and effective steganalytic technique against JSteg-like algorithms,” in Proc. ACM Symp. Appl. Comput., Melbourne, FL, USA, Mar. 2003, pp. 307–311.
[34]
C. Zitzmann, R. Cogranne, L. Fillatre, I. Nikiforov, F. Retraint, and P. Cornu, “Hidden information detection based on quantized Laplacian distribution,” in Proc. IEEE ICASSP, Kyoto, Japan, Mar. 2012, pp. 1793–1796.

Cited By

View all
  • (2024)Image Steganography Approaches and Their Detection Strategies: A SurveyACM Computing Surveys10.1145/369496557:2(1-40)Online publication date: 10-Oct-2024
  • (2024)Model-Based Non-Independent Distortion Cost Design for Effective JPEG SteganographyProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3681681(2419-2427)Online publication date: 28-Oct-2024
  • (2024)Exploring Diffusion-Inspired Pixel Predictors for WS SteganalysisProceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security10.1145/3658664.3659645(75-86)Online publication date: 24-Jun-2024
  • Show More Cited By

Index Terms

  1. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image IEEE Transactions on Information Forensics and Security
          IEEE Transactions on Information Forensics and Security  Volume 10, Issue 2
          Feb. 2015
          217 pages

          Publisher

          IEEE Press

          Publication History

          Published: 01 February 2015

          Author Tags

          1. features
          2. Image
          3. steganalysis
          4. JPEG
          5. DCT

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 25 Nov 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Image Steganography Approaches and Their Detection Strategies: A SurveyACM Computing Surveys10.1145/369496557:2(1-40)Online publication date: 10-Oct-2024
          • (2024)Model-Based Non-Independent Distortion Cost Design for Effective JPEG SteganographyProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3681681(2419-2427)Online publication date: 28-Oct-2024
          • (2024)Exploring Diffusion-Inspired Pixel Predictors for WS SteganalysisProceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security10.1145/3658664.3659645(75-86)Online publication date: 24-Jun-2024
          • (2024)Linking Intrinsic Difficulty and Regret to Properties of Multivariate Gaussians in Image SteganalysisProceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security10.1145/3658664.3659643(31-39)Online publication date: 24-Jun-2024
          • (2024)Statistical Correlation as a Forensic Feature to Mitigate the Cover-Source MismatchProceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security10.1145/3658664.3659638(87-94)Online publication date: 24-Jun-2024
          • (2024)Robust Adaptive Steganography Based on Adaptive STC-ECCIEEE Transactions on Multimedia10.1109/TMM.2023.333448726(5477-5489)Online publication date: 1-Jan-2024
          • (2024)Centralized Error Distribution-Preserving Adaptive Steganography for HEVCIEEE Transactions on Multimedia10.1109/TMM.2023.332149626(4255-4270)Online publication date: 1-Jan-2024
          • (2024)Upward Robust Steganography Based on Overflow AlleviationIEEE Transactions on Multimedia10.1109/TMM.2023.326462826(299-312)Online publication date: 1-Jan-2024
          • (2024)Natias: Neuron Attribution-Based Transferable Image Adversarial SteganographyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.342189319(6636-6649)Online publication date: 1-Jan-2024
          • (2024)Size-Independent Reliable CNN for RJCA SteganalysisIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.337984919(4420-4431)Online publication date: 20-Mar-2024
          • Show More Cited By

          View Options

          View options

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media