Abstract
Techniques for information hiding have become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting hidden messages has become considerably more difficult. This paper describes an approach to detecting hidden messages in images that uses a wavelet-like decomposition to build higher-order statistical models of natural images. Support vector machines are then used to discriminate between untouched and adulterated images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
R. J. Anderson and F.A.P. Petitcolas. On the limits of steganography. IEEE Journal on Selected Areas in Communications, 16(4):474–481, 1998. 340
R.W. Buccigrossi and E.P. Simoncelli. Image compression via joint statistical characterization in the wavelet domain. IEEE Transactions on Image Processing, 8(12):1688–1701, 1999. 341, 342
C. J.C. Burges. A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 2:121–167, 1998. 343
Chih-Chung Chang and Chih-Jen Lin. LIBSVM: a library for support vector machines, 2001. Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm. 349, 350
R. Duda and P. Hart. Pattern Classification and Scene Analysis. John Wiley and Sons, 1973. 343
H. Farid. Detecting hidden messages using higher-order statistical models. In International Conference on Image Processing, page (to appear), Rochester, New York, 2002. 343, 349, 350
R. Fisher. The use of multiple measures in taxonomic problems. Annals of Eugenics, 7:179–188, 1936. 343
R. Fletcher. Practical Methods of Optimization. JohnWiley and Sons, 2nd edition, 1987. 345
J. Fridrich and M. Goljan. Practical steganalysis: State of the art. In SPIE Photonics West, Electronic Imaging, San Jose, CA, 2002. 340
N. Johnson and S. Jajodia. Exploring steganography: seeing the unseen. IEEE Computer, pages 26–34, 1998. 340
N. Johnson and S. Jajodia. Steganalysis of images created using current steganography software. Lecture notes in Computer Science, pages 273–289, 1998. 340
D. Kahn. The history of steganography. In Proceedings of Information Hiding, First International Workshop, Cambridge, UK, 1996. 340
D. Kersten. Predictability and redundancy of natural images. Journal of the Optical Society of America A, 4(12):2395–2400, 1987. 340
G. Krieger, C. Zetzsche, and E. Barth. Higher-order statistics of natural images and their exploitation by operators selective to intrinsic dimensionality. In Proceedings of the IEEE Signal Processing Workshop on Higher-Order Statistics, pages 147–151, Banff, Alta., Canada, 1997. 340
E.A.P. Petitcolas, R. J. Anderson, and M.G. Kuhn. Information hiding-a survey. Proceedings of the IEEE, 87(7):1062–1078, 1999. 340
N. Provos. Defending against statistical steganalysis. In 10th USENIX Security Symposium, Washington, DC, 2001. 348
N. Provos and P. Honeyman. Detecting steganographic content on the internet. Technical Report CITI 01-1a, University of Michigan, 2001. 340
R. Rinaldo and G. Calvagno. Image coding by block prediction of multiresolution subimages. IEEE Transactions on Image Processing, 4(7):909–920, 1995. 341
D.L. Ruderman and W. Bialek. Statistics of natural image: Scaling in the woods. Phys. Rev. Letters, 73(6):814–817, 1994. 340
J. Shapiro. Embedded image coding using zerotrees of wavelet coefficients. IEEE Transactions on Signal Processing, 41(12):3445–3462, 1993. 341
E.P. Simoncelli. Modeling the joint statistics of images in the wavelet domain. In Proceedings of the 44th Annual Meeting, volume 3813, Denver, CO, USA, 1999. 340
E.P. Simoncelli and E.H. Adelson. Subband image coding, chapter Subband transforms, pages 143–192. Kluwer Academic Publishers, 1990. 341
P.P. Vaidyanathan. Quadrature mirror filter banks, M-band extensions and perfect reconstruction techniques. IEEE ASSP Magazine, pages 4–20, 1987. 341
V. Vapnik. The nature of statistical learning theory. Spring Verlag, 1995. 343
V. Vapnik. Statistical learning theory. John Wiley and Sons, 1998. 343
M. Vetterli. A theory of multirate filter banks. IEEE Transactions on ASSP, 35(3):356–372, 1987. 341
A. Westfeld. High capacity depsite better steganalysis: F5-a steganographic algorithm. In Fourth Information Hiding Workshop, pages 301–315, Pittsburgh, PA, USA, 2001. 350
A. Westfeld and A. Pfitzmann. Attacks on steganographic systems. In Proceedings of Information Hiding, Third International Workshop, Dresden, Germany, 1999. 340
S.C. Zhu, Y. Wu, and D. Mumford. Filters, random fields and maximum entropy (frame)-towards the unified theory for texture modeling. In IEEE Conference Computer Vision and Pattern Recognition, pages 686–693, 1996. 340
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lyu, S., Farid, H. (2003). Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In: Petitcolas, F.A.P. (eds) Information Hiding. IH 2002. Lecture Notes in Computer Science, vol 2578. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36415-3_22
Download citation
DOI: https://doi.org/10.1007/3-540-36415-3_22
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00421-9
Online ISBN: 978-3-540-36415-3
eBook Packages: Springer Book Archive