Skip to main content

Multi-class JPEG Image Steganalysis by Ensemble Linear SVM Classifier

  • Conference paper
  • First Online:
Digital-Forensics and Watermarking (IWDW 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9023))

Included in the following conference series:

Abstract

Multi-class steganalysis utilizes multi-class classification methods to predict the category of steganographic schemes used for generating stego files. In this paper we propose a novel multi-class approach towards more efficiently classifying JPEG stego-images with CC-JRM features. Because CC-JRM has successfully cooperates with ensemble classifier in detecting the presence of stego images, we modified ensemble classifier for multi-class steganalysis. The ideas of performing ensemble in different steps results in two schemes in our proposed method. These two schemes are based on different multi-class ensemble strategies, and utilize linear SVM as base classifier. The experimental results shows our methods received better results with less computing cost compared to other multi-class steganalysis method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In our experiments, training 5-classes classifiers consumes about 10G memory.

References

  1. Pevný, T., Fridrich, J.: Multiclass detector of current steganographic methods for JPEG format. IEEE Trans. Inf. Forensics Secur. 3(4), 635–650 (2008)

    Article  Google Scholar 

  2. Pevný, T., Fridrich, J.: Towards multi-class blind steganalyzer for JPEG images. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 39–53. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Dong, J., Wang, W., Tan, T.: Multi-class blind steganalysis based on image run-length analysis. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) IWDW 2009. LNCS, vol. 5703, pp. 199–210. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  4. Pevný, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Electronic Imaging 2007. International Society for Optics and Photonics (2007)

    Google Scholar 

  5. Lubenko, I., Ker, A.D.: Steganalysis using logistic regression. In: IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics (2011)

    Google Scholar 

  6. Kodovský, J., Fridrich, J.: Steganalysis of JPEG images using rich models. In: IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics (2012)

    Google Scholar 

  7. Kodovský, J., Fridrich, J.: Steganalysis in high dimensions: fusing classifiers built on random subspaces. In: Proceedings of the SPIE, Media Watermarking, Security, and Forensics III, vol. 7880, p. 78800L, 10 February 2011

    Google Scholar 

  8. Kodovský, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2012)

    Article  Google Scholar 

  9. Fridrich, J., Kodovský, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)

    Article  Google Scholar 

  10. Fan, R.E., Chang, K.W., Hsieh, C.J., Wang, X.R., Lin, C.J.: LIBLINEAR: a library for large linear classification. J. Mach. Learn. Res. 9, 1871–1874 (2008)

    MATH  Google Scholar 

  11. Holub, V., Fridrich, J., Denemark, T.: Random projections of residuals as an alternative to co-occurrences in steganalysis. In: Proceedings of the SPIE, Media Watermarking, Security, and Forensics 2013, vol. 8665, p. 86650L, 22 March 2013

    Google Scholar 

  12. Holub, V., Fridrich, J.: Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Secur. 8(12), 1996–2006 (2013)

    Article  Google Scholar 

  13. Kodovský, J., Pevný, T., Fridrich, J.: Modern steganalysis can detect YASS. In: Proceedings of the SPIE, Media Forensics and Security II, vol. 7541, p. 754102, 27 January 2010

    Google Scholar 

  14. Kodovský, J., Fridrich, J.: Calibration revisited. In: Dittmann, J., Craver, S., Fridrich, J. (eds.) Proceedings of the 11th ACM Multimedia & Security Workshop, Princeton, NJ, pp. 63–74, 7–8 September 2009

    Google Scholar 

  15. LIBSVM – A Library for Support Vector Machines. http://www.csie.ntu.edu.tw/~cjlin/libsvm/

  16. LIBLINEAR – A Library for Large Linear Classification. http://www.csie.ntu.edu.tw/~cjlin/liblinear/

  17. Hsu, C.W., Lin, C.J.: A comparison of methods for multiclass support vector machines. IEEE Trans. Neural Netw. 13(2), 415–425 (2002)

    Article  Google Scholar 

  18. Fridrich, J., Pevný, T., Kodovský, J.: Statistically undetectable JPEG steganography: dead ends challenges, and opportunities. In: Proceedings of the 9th Workshop on Multimedia & Security, pp. 3–14. ACM (2007)

    Google Scholar 

  19. Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  20. Kim, Y.H., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P.(eds.) IH 2006. LNCS, vol. 4437, pp. 314–327. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  21. Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec 2013), pp. 59–68. ACM, New York (2013)

    Google Scholar 

  22. Sallee, P.: Model-based methods for steganography and steganalysis. Int. J. Image Graph. 5(01), 167–189 (2005)

    Article  Google Scholar 

  23. Ullerich, C., Westfeld, A.: Weaknesses of MB2. In: Shi, Y.Q., Kim, H.-J., Katzenbeisser, S. (eds.) IWDW 2007. LNCS, vol. 5041, pp. 127–142. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  24. Pevný, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215–224 (2010)

    Article  Google Scholar 

  25. Denemark, T., Fridrich, J., Holub, V.: Further study on the security of SUNIWARD. In: Proceedings of the SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics, vol. 9028, pp. 2–6 (2014)

    Google Scholar 

Download references

Acknowledgements

This work was supported by the NSFC under 61170281, 61303259 and 61303254, the Strategic Priority Research Program of CAS under XDA06030600, and the Project of IIE, CAS, under Y4Z0031102 and Y3Z0071502.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qingxiao Guan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhu, J., Guan, Q., Zhao, X. (2015). Multi-class JPEG Image Steganalysis by Ensemble Linear SVM Classifier. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19321-2_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19320-5

  • Online ISBN: 978-3-319-19321-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics