Skip to main content

Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5041))

Abstract

In this paper, we present a steganalytic method to attack the enhanced BPCS steganography (for short EBPCS) proposed by Niimi et al. The key element of the method is analysis of the bitplane-block complexity difference sequences between stego images and cover images based on Hilbert-Huang transform. The Hilbert transform based characteristic vectors are constructed via empirical mode decomposition of the sequences and the support vector machine classifier is used for classification. Experimental results have demonstrated effectiveness of the proposed steganalytic method in spatial domain images and JPEG2000 format images. According to our best knowledge, this method is the first successful attack of EBPCS and can be effectively used in spatial domain and frequency domain (especially DWT/JPEG2000) images.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Niimi, M., Ei, T., Noda, H., et al.: An attack to BPCS-steganography using complexity histogram and countermeasure. In: Proceedings - International Conference on Image Processing, ICIP, vol. 5, pp. 733–736 (2004)

    Google Scholar 

  2. Kawaguchi, E., Eason, R.O.: Principle and applications of BPCS-steganography. In: Proceedings of SPIE - The International Society for Optical Engineering, vol. 3528, pp. 464–473 (1999)

    Google Scholar 

  3. Niimi, M., Eason, R.O., Noda, H., Kawaguchi, E.: A method to apply BPCS-steganography to palette-based images using luminance quasi-preserving color quantization. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E85-A, 2141–2148 (2002)

    Google Scholar 

  4. Ouellette, R., Noda, H., Niimi, M., et al.: Topological ordered color table for BPCS-steganography using indexed color images. In: roceedings of SPIE - The International Society for Optical Engineering, vol. 3971, pp. 502–509 (2000)

    Google Scholar 

  5. Spaulding, J., Noda, H., Shirazi, M.N., et al.: BPCS steganography using EZW lossy compressed images. Pattern Recognition Letters 23(13), 1579–1587 (2002)

    Article  MATH  Google Scholar 

  6. Torres-Maya, S., Nakano-Miyatake, M., Perez-Meana, H.: An image steganography systems based on bpcs and iwt. In: Proceedings of the 16th IEEE International Conference on Electronics, Communications and Computers, CONIELECOMP 2006, p. 51 (2006)

    Google Scholar 

  7. Noda, H., Spaulding, J., et al.: Bit-plane decomposition steganography combined with JPEG2000 compression. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 295–309. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Noda, H., Furuta, T., Niimi, M., Kawaguchi, E.: Application of BPCS steganography to wavelet compressed video. In: 2004 International Conference on Image Processing, ICIP 2004, pp. 2147–2150 (2004)

    Google Scholar 

  9. Zhang, X., Wang, S.: Statistical analysis against spatial BPCS steganography.  17, 1625–1629 (2005)

    Google Scholar 

  10. Yu, X., Tan, T., Wang, Y.: Reliable detection of BPCS-steganography in natural images. In: Third International Conference on Image and Graphics, pp. 333–336 (2004)

    Google Scholar 

  11. Tan, S., Jiwu Huang, Z.Y.: Steganalysis of JPEG2000 lazy-mode steganography using the hilbert-huang transform based sequential analysis. In: Proceedings - International Conference on Image Processing (ICIP 2006), Atlanta, October 8-11 (2006)

    Google Scholar 

  12. Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/cjlin/libsvm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tan, S., Huang, J., Shi, Y.Q. (2008). Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis. In: Shi, Y.Q., Kim, HJ., Katzenbeisser, S. (eds) Digital Watermarking. IWDW 2007. Lecture Notes in Computer Science, vol 5041. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92238-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-92238-4_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-92237-7

  • Online ISBN: 978-3-540-92238-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics