Skip to main content

Entropy Feature Based on 2D Gabor Wavelets for JPEG Steganalysis

  • Conference paper
  • First Online:
Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10067))

Abstract

To improve the detection accuracy for adaptive JPEG steganography which constrains embedding changes to image texture regions difficult to model, a new steganalysis feature based on the Shannon entropy of 2-dimensional (2D) Gabor wavelets is proposed. For the proposed feature extraction method, the 2D Gabor wavelets which have certain optimal joint localization properties in spatial domain and in the spatial frequency are employed to capture the image texture characteristics, and then the Shannon entropy values of image filtering coefficients are used as steganalysis feature. First, the decompressed JPEG image is filtered by 2D Gabor wavelets with different scale and orientation parameters. Second, the entropy features are extracted from all the filtered images and then they are merged according to symmetry. Last, the ensemble classifier trained by entropy features is used as the final steganalyzer. The experimental results show that the proposed feature can achieve a competitive performance by comparing with the state-of-the-art steganalysis features for the latest adaptive JPEG steganography algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    BossBase-1.01[EB/OL]. http://exile.felk.cvut.cz/boss/BOSSFinal/.2013.

References

  1. Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2009)

    Book  MATH  Google Scholar 

  2. Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379–423 (1948)

    Article  MathSciNet  MATH  Google Scholar 

  3. Filler, T., Fridrich, J: Design of adaptive steganographic schemes for digital images. In: Proceedings of SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII, vol. 7880, pp. OF 1–14. SPIE (2011)

    Google Scholar 

  4. Wang, C., Ni, J.Q: An efficient JPEG steganographic scheme based on the block–entropy of DCT coefficients. In: Proceedings of IEEE ICASSP, pp. 1785–1788 (2012)

    Google Scholar 

  5. Guo, L.J., Ni, J.Q., Shi, Y.Q: An efficient JPEG steganographic scheme using uniform embedding. In: Proceedings of 4th IEEE International Workshop on Information Forensics and Security, pp. 169–174 (2012)

    Google Scholar 

  6. Holub, V., Fridrich, J: Digital image steganography using universal distortion. In: Proceedings of 1st ACM Information Hiding and Multimedia Security Workshop, pp. 59–68. ACM (2013)

    Google Scholar 

  7. Fridrich, J., Goljan, M., Soukal, D.: Wet paper codes with improved embedding efficiency. IEEE Trans. Inf. Forensics Secur. 1(1), 102–110 (2006)

    Article  Google Scholar 

  8. Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(1), 920–935 (2011)

    Article  Google Scholar 

  9. Pevný, T., Fridrich, J: Merging markov and DCT features for multi-class JPEG steganalysis. In: Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 65053, pp. 1–14 (2007)

    Google Scholar 

  10. Chen, C., Shi, Y.Q.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Proceedings of IEEE International Symposium on Circuits and Systems, pp. 3029–3032 (2008)

    Google Scholar 

  11. Kodovský, J., Fridrich, J., Holub, V.: On dangers of overtraining steganography to incomplete cover model. In: Proceedings of the 13th ACM Multimedia & Security Workshop, pp. 69–76. ACM (2011)

    Google Scholar 

  12. Song, X.F., Liu, F.L., Luo, X.Y., et al.: Steganalysis of perturbed quantization steganography based on the enhanced histogram features. Multimedia Tools Appl. 74(24), 11045–11071 (2015)

    Article  Google Scholar 

  13. Kodovský, J., Fridrich, J: Steganalysis of JPEG images using rich models. In: Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, vol. 8303, pp. 0A 1–13. SPIE (2012)

    Google Scholar 

  14. Holub, V., Fridrich, J.: Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Secur. 8(12), 1996–2006 (2013)

    Article  Google Scholar 

  15. Holub, V., Fridrich, J.: Low complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10(2), 219–228 (2015)

    Article  Google Scholar 

  16. Holub, V., Fridrich, J.: Phase-aware projection model for steganalysis of JPEG images. In: Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, vol. 9409, pp. 94090T–94090T-11 (2015)

    Google Scholar 

  17. Kodovský, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2012)

    Article  Google Scholar 

  18. Daugman, J.G.: Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters. J. Opt. Soc. Am. A: 2(7), 1160–1169 (1985)

    Article  Google Scholar 

  19. Pharwaha, A.P.S., Singh, B.: Shannon and non-Shannon measures of entropy for statistical texture feature extraction in digitized mammograms. In: Proceedings of the World Congress on Engineering and Computer Science, vol. 2, pp. 20–22 (2009)

    Google Scholar 

  20. Filler, T., Fridrich, J.: Gibbs construction in steganography. IEEE Trans. Inf. Forensics Secur. 5(4), 705–720 (2010)

    Article  Google Scholar 

  21. Denemark, T., Sedighi, V., Holub, V., et al.: Selection-channel-aware rich model for steganalysis of digital images. In: Proceedings of IEEE International Workshop on Information Forensics and Security, pp. 1–5 (2014)

    Google Scholar 

  22. Grigorescu, S.E., Petkov, N., Kruizinga, P.: Comparison of texture features based on Gabor filters. IEEE Trans. Image Process. 11(10), 1160–1167 (2012)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (No. 61272489, 61379151 and 61302159) and the Natural Science Basic Research Plan in Shaanxi Province of China (No. 2014JM2-6103).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaofeng Song .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Song, X., Li, Z., Chen, L., Liu, J. (2016). Entropy Feature Based on 2D Gabor Wavelets for JPEG Steganalysis. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy and Anonymity in Computation, Communication and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10067. Springer, Cham. https://doi.org/10.1007/978-3-319-49145-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49145-5_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49144-8

  • Online ISBN: 978-3-319-49145-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics