Abstract
In this paper, we present a steganalytic method to attack the enhanced BPCS steganography (for short EBPCS) proposed by Niimi et al. The key element of the method is analysis of the bitplane-block complexity difference sequences between stego images and cover images based on Hilbert-Huang transform. The Hilbert transform based characteristic vectors are constructed via empirical mode decomposition of the sequences and the support vector machine classifier is used for classification. Experimental results have demonstrated effectiveness of the proposed steganalytic method in spatial domain images and JPEG2000 format images. According to our best knowledge, this method is the first successful attack of EBPCS and can be effectively used in spatial domain and frequency domain (especially DWT/JPEG2000) images.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Niimi, M., Ei, T., Noda, H., et al.: An attack to BPCS-steganography using complexity histogram and countermeasure. In: Proceedings - International Conference on Image Processing, ICIP, vol. 5, pp. 733–736 (2004)
Kawaguchi, E., Eason, R.O.: Principle and applications of BPCS-steganography. In: Proceedings of SPIE - The International Society for Optical Engineering, vol. 3528, pp. 464–473 (1999)
Niimi, M., Eason, R.O., Noda, H., Kawaguchi, E.: A method to apply BPCS-steganography to palette-based images using luminance quasi-preserving color quantization. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E85-A, 2141–2148 (2002)
Ouellette, R., Noda, H., Niimi, M., et al.: Topological ordered color table for BPCS-steganography using indexed color images. In: roceedings of SPIE - The International Society for Optical Engineering, vol. 3971, pp. 502–509 (2000)
Spaulding, J., Noda, H., Shirazi, M.N., et al.: BPCS steganography using EZW lossy compressed images. Pattern Recognition Letters 23(13), 1579–1587 (2002)
Torres-Maya, S., Nakano-Miyatake, M., Perez-Meana, H.: An image steganography systems based on bpcs and iwt. In: Proceedings of the 16th IEEE International Conference on Electronics, Communications and Computers, CONIELECOMP 2006, p. 51 (2006)
Noda, H., Spaulding, J., et al.: Bit-plane decomposition steganography combined with JPEG2000 compression. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 295–309. Springer, Heidelberg (2003)
Noda, H., Furuta, T., Niimi, M., Kawaguchi, E.: Application of BPCS steganography to wavelet compressed video. In: 2004 International Conference on Image Processing, ICIP 2004, pp. 2147–2150 (2004)
Zhang, X., Wang, S.: Statistical analysis against spatial BPCS steganography. 17, 1625–1629 (2005)
Yu, X., Tan, T., Wang, Y.: Reliable detection of BPCS-steganography in natural images. In: Third International Conference on Image and Graphics, pp. 333–336 (2004)
Tan, S., Jiwu Huang, Z.Y.: Steganalysis of JPEG2000 lazy-mode steganography using the hilbert-huang transform based sequential analysis. In: Proceedings - International Conference on Image Processing (ICIP 2006), Atlanta, October 8-11 (2006)
Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/cjlin/libsvm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tan, S., Huang, J., Shi, Y.Q. (2008). Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis. In: Shi, Y.Q., Kim, HJ., Katzenbeisser, S. (eds) Digital Watermarking. IWDW 2007. Lecture Notes in Computer Science, vol 5041. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92238-4_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-92238-4_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-92237-7
Online ISBN: 978-3-540-92238-4
eBook Packages: Computer ScienceComputer Science (R0)