Abstract
In the past few years, we have witnessed a number of powerful steganalysis technique proposed in the literature. These techniques could be categorized as either specific or universal. Each category of techniques has a set of advantages and disadvantages. A steganalysis technique specific to a steganographic embedding technique would perform well when tested only on that method and might fail on all others. On the other hand, universal steganalysis methods perform less accurately overall but provide acceptable performance in many cases. In practice, since the steganalyst will not be able to know what steganographic technique is used, it has to deploy a number of techniques on suspected images. In such a setting the most important question that needs to be answered is: What should the steganalyst do when the decisions produced by different steganalysis techniques are in contradiction? In this work, we propose and investigate the use of information fusion methods to aggregate the outputs of multiple steganalysis techniques. We consider several fusion rules that are applicable to steganalysis, and illustrate, through a number of case studies, how composite steganalyzers with improved performance can be designed. It is shown that fusion techniques increase detection accuracy and offer scalability, by enabling seamless integration of new steganalysis techniques.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kharrazi, M., Sencar, H.T., Memon, N.: Image steganography: Concepts and practice. Lecture Note Series, Institute for Mathematical Sciences, National University of Singapore (to appear, 2004)
Westfeld, A.: F5 steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, p. 289. Springer, Heidelberg (2001)
Fridrich, J., Goljan, M., Hogea, D., Soukal, D.: Quantitive steganalysis of digital images: Estimating the secret message length. ACM Multimedia Systems Journal, Special issue on Multimedia Security (2003)
Sallee, P.: Model-based steganography. In: International Workshop on Digital Watermarking, Seoul, Korea (2003)
Bhme, R., Westfeld, A.: Breaking cauchy model-based jpeg steganography with first order statistics. In: 9th European Symposium on Research in Computer Security, Sophia Antipolis, France (September 2004)
Avcibas, I., Kharrazi, M., Memon, N., sankur, B.: Image steganalysis with binary similarity measures. EURASIP Journal on Applied Signal Processing (to appear, 2005)
Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: 5th International Workshop on Information Hiding (2002)
Lyu, S., Farid, H.: Steganalysis using color wavelet statistics and one-class support vector machines. In: SPIE Symposium on Electronic Imaging, San Jose, CA (2004)
Fridrich, J.: Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In: Proc. 6th Information Hiding Workshop, Toronto, Canada, May 23-25 (2004)
Kharrazi, M., Sencar, T.H., Memon, N.: Benchmarking steganographic and steganalysis techniques. In: EI SPIE, San Jose, CA, January 16-20 (2005)
Jain, A.K., Nandakumar, K., Ros, A.: Score normalization in multimodal biometric systems. Pattern Recognition (to appear, 2005)
Kittler, J., Hatef, M., Duin, R.P.W., Matas, J.: On combining classifiers. IEEE Transactions on Pattern Analysis and Machine Intelligence 20(3), 226–239 (1998)
Avcibas, I., Memon, N., sankur, B.: Image steganalysis with binary similarity measures. In: IEEE International Conference on Image Processing, Rochester, New York (September 2002)
Greenspun, P.: Images obtained from philip.greenspun.com
Kharrazi, M., Sencar, T.H., Memon, N.: Benchmarking steganographic and steganalysis techniques. Journal of Electronic Imaging (submitted, 2006)
Dumitrescu, S., Wu, X., Memon, N.: On steganalysis of random lsb embedding in continuous-tone images. In: IEEE International Conference on Image Processing, Rochester, New York (September 2002)
Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines(2001), Software available at, http://www.csie.ntu.edu.tw/~cjlin/libsvm
Fridrich, J., Pevny, T.: Multiclass blind steganalysis for jpeg images. In: SPIE Electronic Imaging, Photonics West, San Jose,CA (2006)
Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kharrazi, M., Sencar, H.T., Memon, N. (2006). Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security I. Lecture Notes in Computer Science, vol 4300. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11926214_5
Download citation
DOI: https://doi.org/10.1007/11926214_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49071-5
Online ISBN: 978-3-540-49072-2
eBook Packages: Computer ScienceComputer Science (R0)