Abstract
The SRM (Spatial Rich Model) is a very effective steganalysis method. It uses statistics of neighboring noise residual samples as features to capture the dependency changes caused by embedding. Because the noise residuals are the high-frequency components of image and closely tied to image content, the residuals of different types of image regions have different statistical properties and effectiveness for steganalysis. In this paper, the effectiveness of the residuals is investigated. Then the effectiveness of the statistics collected from different types of neighboring residual samples is investigated from the FLD (Fisher Linear Discriminant) viewpoint, and ineffective, effective and high-effective neighboring residual samples are defined. The ineffective neighboring residual samples are not likely to change during embedding, and if they are counted in statistics, they may mix the features with noise and make the features impure. Pure SRM features are extracted based on neighboring noise residual sample selection strategy. Furthermore, multi-order statistical features are proposed to increase the statistical diversity. Steganalysis performances of the statistical features collected from different types of neighboring residual samples are investigated on three content adaptive steganographic algorithms. Experimental results demonstrate that the proposed method can achieve a more accurate detection than SRM.
Similar content being viewed by others
References
Avcibas I, Memon N, Sankur B (2000) Steganalysis of watermarking techniques using image quality metrics. In: Proceedings of the SPIE, Security and Watermarking of Multimedia Contents II, vol 4314, pp 523–531
Bas P, Filler T, Pevný T (2011) Break our steganographic system C the ins and outs of organizing BOSS. In: Information Hiding, 13th International Conference Filler T, Pevný T, Ker A, Craver S (eds). vol 6958 of Lecture Notes in Computer Science, pp 59–70, Prague, Czech Republic
Böhme R (2010) Advanced Statistical Steganalysis. Springer, Heidelberg
Chen C, Shi YQ (2008) JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Proceedings IEEE Int. Symp. Circuits and Systems, ISCAS, pp 3029–3032
Denemark T, Fridrich J, Holub V (2014) Further study on the security of SCUNIWARD. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics, vol 9028. San Francisco, CA, pp 2–6
Duda RO, Hart PE, Stork DG (2001) Pattern Classification, 2nd edition. John Wiley & Sons, Inc., New York
Farid H, Siwei L, Petitcolas FAP (eds) (2002) Detecting hidden messages using higher-order statistics and support vector machines. in Information Hiding, 5th Int. Workshop, Noordwijkerhout, The Netherlands. vol 2578, Lecture Notes in Computer Science, pp 340-354
Fridrich J, Kodovský J (2011) Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7(3):868–882. http://dde.binghamton.edu/kodovsky/pdf/TIFS2012-SRM.pdf
Filler T, Fridrich J (2010) Gibbs construction in steganography. IEEE Transactions on Information Forensics and Security 5(4):705–720. http://www.ws.binghamton.edu/fridrich/Research/gibbs-construction10.pdf
Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security 6(3):920–935
Gül G, Kurugollu F, Filler T, Pevný T, Ker A, Crave S (eds) (2011) A new methodology in steganalysis: Breaking highly undetactable steganograpy (HUGO), in Proc. Information Hiding, 13th Int. Workshop. Prague, Czech Republic. vol 6958, Lecture Notes in Computer Science, pp 71-84
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In Fourth IEEE InternationalWorkshop on Information Forensics and Security. Tenerife, Spain
Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Puech W, Chaumont M, Dittmann J, Campisi P (eds) 1st ACM IH & MMSec. Workshop. Montpellier, France
Holub V, Fridrich J (2013) Random projections of residuals for digital image steganalysis. IEEE Transactions on Information Forensics and Security 8(12):1996–2006
Kodovský J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2):432–444. http://dde.binghamton.edu/download/ensemble/TIFS-2011-ensemble.pdf
Pevný T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security 5(2):215–224. 1
Westfeld A, Pfitzmann A (1999) Attacks on steganographic systems. In: Proceedings of Information Hiding, Third Int. Workshop. Dresden, Germany, pp 61–75
Zou D, Shi YQ, Su W, Xuan G (2006) Steganalysis based on Markov model of thresholded prediction-error image. In: Proceedings IEEE, International Conference on Multimedia and Expo. Toronto, Canada, pp 1365–1368
Acknowledgments
This work was supported by the Natural Science Foundation of China (No.61302178 and 61402009), and the Excellent Youth Foundation of Anhui University of Technology (AHUT) (No. QZ201014). The authors would like to thank the Network Center of Anhui University of Technology (AHUT) for providing cloud services to support this work.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, P., Wei, Z. & Xiao, L. Pure spatial rich model features for digital image steganalysis. Multimed Tools Appl 75, 2897–2912 (2016). https://doi.org/10.1007/s11042-015-2521-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2521-9