Abstract
Multi-class steganalysis utilizes multi-class classification methods to predict the category of steganographic schemes used for generating stego files. In this paper we propose a novel multi-class approach towards more efficiently classifying JPEG stego-images with CC-JRM features. Because CC-JRM has successfully cooperates with ensemble classifier in detecting the presence of stego images, we modified ensemble classifier for multi-class steganalysis. The ideas of performing ensemble in different steps results in two schemes in our proposed method. These two schemes are based on different multi-class ensemble strategies, and utilize linear SVM as base classifier. The experimental results shows our methods received better results with less computing cost compared to other multi-class steganalysis method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
In our experiments, training 5-classes classifiers consumes about 10G memory.
References
Pevný, T., Fridrich, J.: Multiclass detector of current steganographic methods for JPEG format. IEEE Trans. Inf. Forensics Secur. 3(4), 635–650 (2008)
Pevný, T., Fridrich, J.: Towards multi-class blind steganalyzer for JPEG images. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 39–53. Springer, Heidelberg (2005)
Dong, J., Wang, W., Tan, T.: Multi-class blind steganalysis based on image run-length analysis. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) IWDW 2009. LNCS, vol. 5703, pp. 199–210. Springer, Heidelberg (2009)
Pevný, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Electronic Imaging 2007. International Society for Optics and Photonics (2007)
Lubenko, I., Ker, A.D.: Steganalysis using logistic regression. In: IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics (2011)
Kodovský, J., Fridrich, J.: Steganalysis of JPEG images using rich models. In: IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics (2012)
Kodovský, J., Fridrich, J.: Steganalysis in high dimensions: fusing classifiers built on random subspaces. In: Proceedings of the SPIE, Media Watermarking, Security, and Forensics III, vol. 7880, p. 78800L, 10 February 2011
Kodovský, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2012)
Fridrich, J., Kodovský, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)
Fan, R.E., Chang, K.W., Hsieh, C.J., Wang, X.R., Lin, C.J.: LIBLINEAR: a library for large linear classification. J. Mach. Learn. Res. 9, 1871–1874 (2008)
Holub, V., Fridrich, J., Denemark, T.: Random projections of residuals as an alternative to co-occurrences in steganalysis. In: Proceedings of the SPIE, Media Watermarking, Security, and Forensics 2013, vol. 8665, p. 86650L, 22 March 2013
Holub, V., Fridrich, J.: Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Secur. 8(12), 1996–2006 (2013)
Kodovský, J., Pevný, T., Fridrich, J.: Modern steganalysis can detect YASS. In: Proceedings of the SPIE, Media Forensics and Security II, vol. 7541, p. 754102, 27 January 2010
Kodovský, J., Fridrich, J.: Calibration revisited. In: Dittmann, J., Craver, S., Fridrich, J. (eds.) Proceedings of the 11th ACM Multimedia & Security Workshop, Princeton, NJ, pp. 63–74, 7–8 September 2009
LIBSVM – A Library for Support Vector Machines. http://www.csie.ntu.edu.tw/~cjlin/libsvm/
LIBLINEAR – A Library for Large Linear Classification. http://www.csie.ntu.edu.tw/~cjlin/liblinear/
Hsu, C.W., Lin, C.J.: A comparison of methods for multiclass support vector machines. IEEE Trans. Neural Netw. 13(2), 415–425 (2002)
Fridrich, J., Pevný, T., Kodovský, J.: Statistically undetectable JPEG steganography: dead ends challenges, and opportunities. In: Proceedings of the 9th Workshop on Multimedia & Security, pp. 3–14. ACM (2007)
Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)
Kim, Y.H., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P.(eds.) IH 2006. LNCS, vol. 4437, pp. 314–327. Springer, Heidelberg (2007)
Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec 2013), pp. 59–68. ACM, New York (2013)
Sallee, P.: Model-based methods for steganography and steganalysis. Int. J. Image Graph. 5(01), 167–189 (2005)
Ullerich, C., Westfeld, A.: Weaknesses of MB2. In: Shi, Y.Q., Kim, H.-J., Katzenbeisser, S. (eds.) IWDW 2007. LNCS, vol. 5041, pp. 127–142. Springer, Heidelberg (2008)
Pevný, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215–224 (2010)
Denemark, T., Fridrich, J., Holub, V.: Further study on the security of SUNIWARD. In: Proceedings of the SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics, vol. 9028, pp. 2–6 (2014)
Acknowledgements
This work was supported by the NSFC under 61170281, 61303259 and 61303254, the Strategic Priority Research Program of CAS under XDA06030600, and the Project of IIE, CAS, under Y4Z0031102 and Y3Z0071502.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhu, J., Guan, Q., Zhao, X. (2015). Multi-class JPEG Image Steganalysis by Ensemble Linear SVM Classifier. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-19321-2_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19320-5
Online ISBN: 978-3-319-19321-2
eBook Packages: Computer ScienceComputer Science (R0)