Abstract
In this paper, we use the previously proposed calibrated DCT features [9] to construct a Support Vector Machine classifier for JPEG images capable of recognizing which steganographic algorithm was used for embedding. This work also constitutes a more detailed evaluation of the performance of DCT features as in [9] only a linear classifier was used. The DCT features transformed using Principal Component Analysis enable an interesting visualization of different stego programs in a three-dimensional space. This paper demonstrates that, at least under some simplifying assumptions in which the effects of double compression are ignored, it is possible to reliably classify stego images to their embedding techniques. The classifier is capable of generalizing to previously unseen techniques.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
JP Hide&Seek, http://linux01.gwdg.de/~alatham/stego.html
Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and Privacy Protection 16(4), 474–481 (1998)
Avcibas, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. In: Proceeedings of SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, vol. 4314, pp. 523–531 (2001)
Avcibas, I., Sankur, B., Memon, N.: Image steganalysis with binary similarity measures. In: Proceedings of International Conference on Image Processing, vol. 3, pp. 645–648 (2002)
Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)
Chandramouli, R., Kharrazi, M., Memon, N.: Image steganography and steganalysis. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 25–49. Springer, Heidelberg (2002)
Dumitrescu, S., Xiaolin, W., Wang, Z.: Detection of LSB steganography via sample pair analysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 355–374. Springer, Heidelberg (2003)
Farid, H., Siwei, L.: Detecting hidden messages using higher-order statistics and support vector machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340–354. Springer, Heidelberg (2003)
Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)
Fridrich, J., Goljan, M., Hogea, D., Soukal, D.: Quantitative steganalysis: Estimating secret message length. ACM Multimedia Systems Journal. Special issue on Multimedia Security 9(3), 288–302 (2003)
Harmsen, J.J., Pearlman, W.A.: Steganalysis of additive noise modelable information hiding. In: Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, CA, pp. 131–142 (2003)
Hsu, C., Chang, C., Lin, C.: A practical guide to support vector classification. Department of Computer Science and Information Engineering, National Taiwan University, Taiwan, http://www.csie.ntu.edu.tw/~cjlin/papers/guide/guide.pdf
Hsu, C., Lin, C.: A comparison of methods for multi-class support vector machines. Technical report, Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan (2001), http://citeseer.ist.psu.edu/hsu01comparison.html
Katzenbeisser, S., Petitcolas, F.A.P.: Security in steganographic systems. In: Proceedings of SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents IV, San Jose, CA, vol. 4675, pp. 50–56 (2002)
Ker, A.: Resampling and the detection of LSB matching in colour bitmaps. In: Proceedings of SPIE Electronic Imaging, Security, Steganography and Watermarking of Multimedia Contents VII, San Jose, CA (2005) (to appear)
Ker, A.: Steganalysis of LSB matching in grayscale images. IEEE Sig. Proc. Letters (2005) (to appear)
Kharrazi, M., Sencar, H.T., Memon, N.: Benchmarking steganographic and steganalytic techniques. In: Proceedings of SPIE Electronic Imaging, Security, Steganography and Watermarking of Multimedia Contents VII, San Jose, CA (2005) (to appear)
Lyu, S., Farid, H.: Steganalysis using color wavelet statistics and one-class support vector machines. In: Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, pp. 35–45 (2004)
Platt, J., Cristianini, N., Shawe-Taylor, J.: Large margin DAGs for multiclass classification. In: Solla, S.A., Leen, T.K., Mueller, K.-R. (eds.) Advances in Neural Information Processing Systems, vol. 12, pp. 547–553 (2000)
Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington DC (2001)
Sallee, P.: Model based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)
Soukal, D., Fridrich, J., Goljan, M.: Maximum likelihood estimation of secret message length embedded using PMK steganography in spatial domain. In: Proceedings of SPIE Electronic Imaging, Security, Steganography and Watermarking of Multimedia Contents VII, San Jose, CA (2005) (to appear)
Tzschoppe, R., Bäuml, R., Huber, J.B., Kaup, A.: Steganographic system based on higher-order statistics. In: Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, CA, pp. 156–166 (2003)
Westfeld, A.: High capacity despite better steganalysis (F5 a steganographic algorithm). In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 344–354. Springer, Heidelberg (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pevný, T., Fridrich, J. (2005). Towards Multi-class Blind Steganalyzer for JPEG Images. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_4
Download citation
DOI: https://doi.org/10.1007/11551492_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28768-1
Online ISBN: 978-3-540-32052-4
eBook Packages: Computer ScienceComputer Science (R0)