Abstract
The detection rates of existing universal blind detection reduced greatly in practical applications due to the generalization problem. According to the principle of orthogonal design, this paper builds three sample sets of embedding rates mismatch, embedding algorithms mismatch and image sources mismatch between the training sample and the testing sample. The three sets are used to test the detection error rates of Rich Model in the case of embedding rates mismatch, embedding algorithm mismatch and image source mismatch. This paper proposes several methods to improve the generalization ability of the universal blind detection, including training the sample by small embedding rates, learning various kinds of embedding algorithms, pre-classifying the testing sample and improving the IQM algorithm. The results show that the practicability of the universal blind detection will be improved.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Wan, B.J., Zhang, T., Hou, X.D., Zhu, Z.H.: Image steganalysis method based on boosting algorithm fusion. Comput. Eng. 39, December 2013. (in Chinese)
Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Secur. Forensics 5(2), 215–224 (2010)
Fridrich, J., Kodovsky, J.: rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)
Li, C.X.: Reasearch of steganography and steganalysis of adaptive EA algorithm in spatial domain. Dalian University of Technology, Dalian (2013). (in Chinese)
Kodovský, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2012)
Kodovský, J., Pevný, T., Fridrich, J.: Modern steganalysis can detect YASS. In: Proceedings of SPIE, Electronic Imaging, Security Forensics of Multimedia XII, San Jose, CA, vol. 7541, pp. 02-01–02-11, 17–21 January 2010
Breiman, L.: Random forest. Mach. Learn. 45(1), 5–32 (2001)
Filler, T., Pevný, T., Bas, P.: BOSS (Break Our Steganography System) (2014). http://agents.fel.cvut.cz/stegodata/BossBase-1.01-cover.tar.bz2
Sharp, T.: An implementation of key-based digital signal steganography. In: Proceedings of the 4th International Workshop on Information Hiding, London, UK, pp. 13–26 (2001)
Luo, W., Huang, F., Huang, J.: Edge adaptive image steganographybased on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)
Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010). doi:10.1007/978-3-642-16435-4_13
Filler, T., Fridrich, J., Judas, J.: Minimizing embedding impact in steganography using Trellis-coded quantization. In: Proceedings of SPIE, EI, Media Forensics and Security XII, San Jose, CA, pp. 1–14, 18–20 January 2010
Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using Syndrome-Trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)
Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory. 47(4), 1423–1443 (2001)
Wu, A., Feng, G.: Payload mismatch detection of image steganalysis using ensemble linear discriminant clustering. IEEE Trans. Signal Process. 1–4 (2015)
Dong, Y., Zhang, T., Hou, X., Xu, C.: A new steganalysis paradigm based on image retrieval of similar image-inherent statistical properties and outlier detection. In: Wireless Communications and Signal Processing (WCSP), pp. 1–5 (2015)
Acknowledgment
This work was supported by the National Key Technology Support Program (2015BAH08F02). Open Foundation of Jiangsu Engineering Center of Network Monitoring (Nanjing University of Information Science & Technology) (Grant No. KJR1509). The PAPD fund and CICAEET fund.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Lei, M., Duan, H., Zhou, C., Wang, H., Li, Y. (2016). Improvement of Image Universal Blind Detection Based on Training Set Construction. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10040. Springer, Cham. https://doi.org/10.1007/978-3-319-48674-1_39
Download citation
DOI: https://doi.org/10.1007/978-3-319-48674-1_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48673-4
Online ISBN: 978-3-319-48674-1
eBook Packages: Computer ScienceComputer Science (R0)