Skip to main content

Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography

  • Conference paper
Transactions on Data Hiding and Multimedia Security I

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 4300))

Abstract

In the past few years, we have witnessed a number of powerful steganalysis technique proposed in the literature. These techniques could be categorized as either specific or universal. Each category of techniques has a set of advantages and disadvantages. A steganalysis technique specific to a steganographic embedding technique would perform well when tested only on that method and might fail on all others. On the other hand, universal steganalysis methods perform less accurately overall but provide acceptable performance in many cases. In practice, since the steganalyst will not be able to know what steganographic technique is used, it has to deploy a number of techniques on suspected images. In such a setting the most important question that needs to be answered is: What should the steganalyst do when the decisions produced by different steganalysis techniques are in contradiction? In this work, we propose and investigate the use of information fusion methods to aggregate the outputs of multiple steganalysis techniques. We consider several fusion rules that are applicable to steganalysis, and illustrate, through a number of case studies, how composite steganalyzers with improved performance can be designed. It is shown that fusion techniques increase detection accuracy and offer scalability, by enabling seamless integration of new steganalysis techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kharrazi, M., Sencar, H.T., Memon, N.: Image steganography: Concepts and practice. Lecture Note Series, Institute for Mathematical Sciences, National University of Singapore (to appear, 2004)

    Google Scholar 

  2. Westfeld, A.: F5 steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, p. 289. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Fridrich, J., Goljan, M., Hogea, D., Soukal, D.: Quantitive steganalysis of digital images: Estimating the secret message length. ACM Multimedia Systems Journal, Special issue on Multimedia Security (2003)

    Google Scholar 

  4. Sallee, P.: Model-based steganography. In: International Workshop on Digital Watermarking, Seoul, Korea (2003)

    Google Scholar 

  5. Bhme, R., Westfeld, A.: Breaking cauchy model-based jpeg steganography with first order statistics. In: 9th European Symposium on Research in Computer Security, Sophia Antipolis, France (September 2004)

    Google Scholar 

  6. Avcibas, I., Kharrazi, M., Memon, N., sankur, B.: Image steganalysis with binary similarity measures. EURASIP Journal on Applied Signal Processing (to appear, 2005)

    Google Scholar 

  7. Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: 5th International Workshop on Information Hiding (2002)

    Google Scholar 

  8. Lyu, S., Farid, H.: Steganalysis using color wavelet statistics and one-class support vector machines. In: SPIE Symposium on Electronic Imaging, San Jose, CA (2004)

    Google Scholar 

  9. Fridrich, J.: Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In: Proc. 6th Information Hiding Workshop, Toronto, Canada, May 23-25 (2004)

    Google Scholar 

  10. Kharrazi, M., Sencar, T.H., Memon, N.: Benchmarking steganographic and steganalysis techniques. In: EI SPIE, San Jose, CA, January 16-20 (2005)

    Google Scholar 

  11. Jain, A.K., Nandakumar, K., Ros, A.: Score normalization in multimodal biometric systems. Pattern Recognition (to appear, 2005)

    Google Scholar 

  12. Kittler, J., Hatef, M., Duin, R.P.W., Matas, J.: On combining classifiers. IEEE Transactions on Pattern Analysis and Machine Intelligence 20(3), 226–239 (1998)

    Article  Google Scholar 

  13. Avcibas, I., Memon, N., sankur, B.: Image steganalysis with binary similarity measures. In: IEEE International Conference on Image Processing, Rochester, New York (September 2002)

    Google Scholar 

  14. Greenspun, P.: Images obtained from philip.greenspun.com

  15. Kharrazi, M., Sencar, T.H., Memon, N.: Benchmarking steganographic and steganalysis techniques. Journal of Electronic Imaging (submitted, 2006)

    Google Scholar 

  16. Dumitrescu, S., Wu, X., Memon, N.: On steganalysis of random lsb embedding in continuous-tone images. In: IEEE International Conference on Image Processing, Rochester, New York (September 2002)

    Google Scholar 

  17. Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines(2001), Software available at, http://www.csie.ntu.edu.tw/~cjlin/libsvm

  18. Fridrich, J., Pevny, T.: Multiclass blind steganalysis for jpeg images. In: SPIE Electronic Imaging, Photonics West, San Jose,CA (2006)

    Google Scholar 

  19. Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kharrazi, M., Sencar, H.T., Memon, N. (2006). Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security I. Lecture Notes in Computer Science, vol 4300. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11926214_5

Download citation

  • DOI: https://doi.org/10.1007/11926214_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49071-5

  • Online ISBN: 978-3-540-49072-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics