Abstract
Differential statistics were proposed in this paper to disclose the existence of hidden data in grayscale raw images. Meanwhile, differential statistics were utilized to improve the algorithm introduced by Fridrich to attack steganographic schemes in grayscale JPEG images. In raw images, to describe the correlation between data and their spatial positions, co-occurrence matrix based on intensities of adjacent pixels was adopted and the use of co-occurrence matrix was extended to high-order differentiations. The COMs (center of mass) of HCFs (histogram character function) were calculated from these statistics to form a 30-dimensional feature vector for steganalysis. For JPEG files, differential statistics were collected from boundaries of DCT blocks in their decompressed images. The COM of HCF was computed for each of these differential statistics and statistics from DCT domain so that a 28-dimensional feature vector can be extracted from a JPEG image. Two blindly steganalytic algorithms were constructed based on Support Vector Machine and the two kinds of feature vectors respectively. The presented methods demonstrate higher detecting rates with lower false positives than known schemes.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Harmsen, J.J., Pearlman, W.A.: Steganalysis of additive noise modelable information hiding. In: Proc. SPIE Electronic Imaging, Santa Clara, CA, January 21-24, vol. 5022, pp. 131–142 (2003)
Harmsen, J.J., Bowers, K.D., Pearlman, W.A.: Fast Additive Noise Steganalysis. In: Proc. SPIE Symposium on Electronic Imaging, San Jose, CA, January 19-22, pp. 489–495 (2004)
Cox, I.J., Kilian, J., Leighton, T., et al.: Secure spread spectrum watermarking for multimedia. IEEE Transaction on Image Processing 6(12), 1673–1687 (1997)
Piva, A., Barni, M., Bartolini, E., et al.: DCT-based watermark recovering without resorting to the uncorrupted original image. In: Proceedings of 4th IEEE International Conference on Image Processing ICIP 1997, Atlanta, USA, pp. 520–523 (1997)
Ker, A.: Steganalysis of LSB matching in grayscale images. IEEE. Signal Processing Letters 12(6), 441–444 (2005)
Shi, Y.Q., Xuan, G., Zou, D., Gao, J., Yang, C., Zhang, Z., Chai, P., Chen, W., Chen, C.: Steganalysis Based on Moments of Characteristic Functions Using Wavelet Decomposition, Prediction-Error Image, and Neural Network. In: Proc. ICME 2005, Amsterdam, Netherlands, July 6-8, pp. 269–272 (2005)
Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340–354. Springer, Heidelberg (2003)
Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)
Pevny, T., Fridrich, J.: Towards Multi-class Blind Steganalyzer for JPEG Images. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 39–53. Springer, Heidelberg (2005)
Upham, D.: Jsteg. ftp.funet.fi
Westfeld, A.: F5, http://wwwrn.inf.tu-dresden.de/
Provos, N.: http://Outguess.www.outguess.org/
Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics 5(1), 167–189 (2005)
Hetzl, S.: http://steghide.sourceforge.net/
Bohme, R., Westfeld, A.: Breaking cauchy model-based. jpeg steganography with first order statistics. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 125–140. Springer, Heidelberg (2004)
Lyu, S., Farid, H.: Steganalysis Using Color Wavelet Statistics and One-Class Support Vector Machines. In: Proc. SPIE Symposium on Electronic Imaging, San Jose, CA, January 19-22, pp. 35–45 (2004)
Chandramouli, R., Kharrazi, M., Memon, N.D.: Image Steganography and Steganalysis: Concepts and Practice. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 35–49. Springer, Heidelberg (2004)
Wallace, G.: The JPEG Still Picture Compression Standard. Communications of the ACM 34(4), 30–44 (1991)
Chih-Chung, C., Chih-Jen, L.: LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm
Shi, Y.Q., Xuan, G., Yang, C., Gao, J., Zhang, Z., Chai, P., Zou, D., Chen, C., Chen, W.: Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function. ITCC (1), 768–773 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, Z., Ping, L., Chen, J., Wang, J., Pan, X. (2006). Steganalysis Based on Differential Statistics. In: Pointcheval, D., Mu, Y., Chen, K. (eds) Cryptology and Network Security. CANS 2006. Lecture Notes in Computer Science, vol 4301. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11935070_16
Download citation
DOI: https://doi.org/10.1007/11935070_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49462-1
Online ISBN: 978-3-540-49463-8
eBook Packages: Computer ScienceComputer Science (R0)