Skip to main content

A New Universal Steganalyzer for JPEG Images

  • Conference paper
  • First Online:
  • 1754 Accesses

Abstract

The JPEG (Joint Photographic Experts Group) file format is currently one of the most widely used image formats. The study on JPEG steganography and steganalysis is a hotspot in the field of information hiding. With the matrix coding and some new adaptive embedding strategies having been put forward, the detection of stego images is becoming more and more difficult. In recent years, a series of new feature extraction methods have been proposed in the field of steganalysis. However, the detection accuracy rate can only be increased by 1–2% points or even less. Based on those existing steganalytic algorithms, a new feature merging method is proposed in this paper. Via merging features extracted from different domains, the detection accuracy rate of those existing JPEG steganalytic algorithms can be improved by 3% points or even higher. Considering about that the feature dimension is so high after feature merging and thus it may bring difficulties in the feature extraction, training and classification process, a new feature selection method is also proposed in this paper. Experimental results demonstrate that it can not only achieve reduction of the dimensionality, but also maintain a high detection accuracy rate.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital image steganography: survey and analysis of current methods. Sig. Process. 90(3), 727–752 (2010)

    Article  Google Scholar 

  2. Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16–31. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77370-2_2

    Chapter  Google Scholar 

  3. Sarkar, A., Solanki, K., Manjunath, B.S.: Further study on YASS: steganography based on randomized embedding to resist blind steganalysis. In: Proceedings of the SPIE Security, Steganography, and Watermarking of Multimedia Contents X, San Jose, pp. 16–31. SPIE (2008)

    Google Scholar 

  4. Huang, F., Huang, J., Shi, Y.Q.: New channel selection rule for JPEG steganography. IEEE Trans. Inf. Forensics Secur. 7(4), 1181–1191 (2012)

    Article  Google Scholar 

  5. Huang, F., Luo, W., Huang, J., Shi, Y.Q.: Distortion function designing for JPEG steganography with uncompressed side-image. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, 17–19 June 2013

    Google Scholar 

  6. Guo, L., Ni, J., Shi, Y.Q.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814–825 (2014)

    Article  Google Scholar 

  7. Guo, L., Ni, J., Su, W., Tang, Ch., Shi, Y.Q.: Using statistical image model for JPEG steganography: uniform embedding revisited. IEEE Trans. Inf. Forensics Secur. 10(12), 2669–2680 (2015)

    Article  Google Scholar 

  8. Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014, 1–13 (2014)

    Article  Google Scholar 

  9. Li, B., Shi, Y.Q., Huang, J.: Steganalysis of YASS. In: Proceedings of the 10th ACM Multimedia & Security Workshop, Oxford, pp. 139–148. ACM (2008)

    Google Scholar 

  10. Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36415-3_20

    Chapter  Google Scholar 

  11. Kodovsky, J., Fridrich, J.: Quantitative steganalysis of LSB embedding in JPEG domain. In: Proceedings of the 12th ACM Workshop on Multimedia and Security, pp. 187–198. ACM (2010)

    Google Scholar 

  12. Liu, G., Huang, F., Li, Z.: Universal steganalysis against adaptive steganographic algorithms. J. Appl. Sci. 34(5), 598–604 (2016). (in Chinese)

    Google Scholar 

  13. Goljan, M., Fridrich, J., Holotyak, T.: New blind steganalysis and its implications. In: Proceedings of the SPIE Security Steganography and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 1–13 (2006)

    Google Scholar 

  14. Chen, C., Shi, Y.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: IEEE International Symposium on Circuits and Systems (ISCAS), pp. 3029–3032 (2008)

    Google Scholar 

  15. Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30114-1_6

    Chapter  Google Scholar 

  16. Pevny, T., Fridrich, J.: Merging Markov and DCT features for multiclass JPEG steganalysis. In: Proceedings of the SPIE, Electronic Imaging, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, pp. 301–314 (2007)

    Google Scholar 

  17. Kodovsky, J., Fridrich, J.: Calibration revisited. In: Proceedings of 11th ACM Multimedia & Security Workshop, pp. 7–8 (2009)

    Google Scholar 

  18. Kodovský, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2012)

    Article  Google Scholar 

  19. Kodovsky, J., Fridrich, J.: Steganalysis of JPEG images using rich models. In: Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, San Francisco, CA, vol. 8303, 22–26 January 2012

    Google Scholar 

  20. Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)

    Article  Google Scholar 

  21. Holub, V., Fridrich, J.: Low complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10(2), 219–228 (2015)

    Article  Google Scholar 

  22. Tan, Y., Huang, F., Huang, J.: Feature selection for high dimensional steganalysis. In: Shi, Y.-Q., Kim, H.J., Pérez-González, F., Echizen, I. (eds.) IWDW 2015. LNCS, vol. 9569, pp. 134–144. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31960-5_12

    Chapter  Google Scholar 

  23. Bas, P., Filler, T., Pevný, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24178-9_5

    Chapter  Google Scholar 

Download references

Acknowledgements

This work is partially supported by National Natural Science Foundation of China (61772572), Natural Science Foundation of Guangdong Province of China (2017A030313366), and the Fundamental Research Funds for the Central Universities (17lgjc45).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fangjun Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, G., Huang, F., Chen, Q., Li, Z. (2018). A New Universal Steganalyzer for JPEG Images. In: Gu, X., Liu, G., Li, B. (eds) Machine Learning and Intelligent Communications. MLICOM 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 226. Springer, Cham. https://doi.org/10.1007/978-3-319-73564-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-73564-1_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-73563-4

  • Online ISBN: 978-3-319-73564-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics