Abstract
This paper presents a performance comparison between Harmsen’s method and a family of Steganalysis Method based on Difference Image (SMDI), in order to promote steganalysis theory. The theoretical analysis begins from the commonness of SMDI, and is focused on the assessment of the statistical change degree between cover and stego, showing that SMDI outperforms the Harmsen’s method. The paper also analyzes that the improvement owes to two aspects: the larger variance of stego-noise difference and the correlation of adjacent pixels utilized by SMDI. A new detector, which can use the correlation of adjacent pixels in all directions, is proposed by generalizing the definition of difference. Experiments show the better performance of the new detector.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Fridrich, J., Goljan, M., Du, R.: Detecting LSB Steganography in Color and Gray-scale Images. IEEE Multimedia 8(4), 22–28 (2001)
Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB Steganography via Sample Pair Analysis. IEEE Trans. on Signal Processing 51(7), 1995–2007 (2003)
Zhang, T., Ping, X.: A New Approach to Reliable Detection of LSB Steganography in Natural Images. Signal Process. 83(10), 2085–2093 (2003)
Luo, X., Wang, Q., Yang, C., Liu, F.: Detection of LTSB Steganography Based on Quartic Equation. In: Proceedings of ICACT 2006, pp. 20–22 (2006)
Avcıba, I., Memon, N., Sankur, B.: Steganalysis of Watermarking Techniques Using Image Quality Metrics. In: Proceedings of Security and Watermarking of Multimedia Contents II. SPIE, vol. 4314, pp. 523–531 (2000)
Farid, H.: Detecting Hidden Messages Using Higher-order Statistical Models. In: Proceedings of IEEE ICIP 2002, pp. 905–908 (2002)
Holotyak, T., Fridrich, J., Voloshynovskiy, S.: Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 273–274. Springer, Heidelberg (2005)
Goljan, M., Fridrich, J., Holotyak, T.: New Blind Steganalysis and its Implications. In: Proceedings of Security, Steganography, and Watermarking of Multimedia Contents. SPIE, pp. 1–13 (2006)
Harmsen, J., Pearlman, W.: Steganalysis of Additive Noise Modelable Information Hiding. In: Proceedings of. Security, Steganography, and Watermarking of Multimedia Contents VI. SPIE, pp. 131–142 (2003)
Xuan, G., Shi, Y., Gao, J., et al.: Steganalysis based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Function. In: Proceedings of Information Hiding Workshop, Barcelona, Spain, pp. 262–277 (2005)
Wang, Y., Moulin, P.: Optimized Feature Extraction for Learning-based Image Steganalysis. IEEE Trans. Information Forensics and Security 2(1), 31–45 (2007)
Sullivan, K., Madhow, U., Chandrasekaran, S., et al.: Steganalysis for Markov Cover Data with Applications to Images. IEEE Trans. Information Forensics and Security 1(2), 275–287 (2006)
Xuan, G., Cui, X., Shi, Y., et al.: JPEG Steganalysis based on Classwise Non-principal Components Analysis and Mutil-directional Markov Model. In: Proceedings of IEEE ICME 2007, pp. 903–906 (2007)
Shi, Y., Chen, C., Chen, W.: A Markov Process Based Approach to Effective Attacking JPEG Steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)
Ker, A.: Steganalysis of LSB Matching In Grayscale Images. IEEE Signal processing letters 12(6), 441–444 (2005)
Chen, C., Shi, Y., Chen, W., et al.: Statistical Moments based Universal Steganalysis Using JPEG 2-D Array and 2-D Characteristic Function. In: Proceedings of IEEE ICIP 2006, pp. 105–108 (2006)
Liu, Q., Sung, A.H., Chen, Z., Xu, J.: Feature Mining and Pattern Classification for Steganalysis of LSB Matching Steganography in Grayscale Images. Pattern Recognition 41, 56–66 (2008)
Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread Spectrum Image Steganography. IEEE Trans. on Image Processing 8(8), 1075–1083 (1999)
Ker, A.: Improved Detection of LSB Steganography in Grayscale Images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 97–115. Springer, Heidelberg (2004)
Huang, J., Mumford, D.: Statistics of Natural Images and Models. In: Proceedings of IEEE Conference Computer Vision and Pattern Recognition, pp. 541–547 (1999)
McLachlan, G., David, P.: Finite Mixture Models. Wiley, New York (2001)
USDA NPCS Photo Gallery, http://photogallery.nrcs.nsda.gov
Ben-Bassat, M.: Use of Distance Measures, Information Measures and Error Bounds on Feature Evaluation. In: Krishaiah, P.R., Kanal, L.N. (eds.) Handbook of statistics: Classification, Pattern Recognition and Reduction of Dimensionality, pp. 773–791. North-Holland, Amsterdam (1987)
He, J., Huang, J.: A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 1–14. Springer, Heidelberg (2005)
Chen, D., Wang, Y.: Universal Steganalysis Algorithm for Additive Noise Modelable Stegranography in Spacial Domain. Journal of Southeast University (Natural Science Edition) 37(suppl.), 48–52 (2007)
Liu, Z., Pan, X., Shi, L., et al.: Effective Steganalysis Based on Statistical Moments of Differential Characteristic Function. In: Proceedings of IEEE ICCIS 2006, pp. 1195–1198 (2006)
Fridrich, J., Goljan, M.: Digital Image Steganography Using Stochastic Modulation. In: Proceedings of Security and Watermarking of Multimedia Contents V, vol. 5020, pp. 191–202. SPIE, San Jose (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sun, Y., Liu, F., Liu, B., Wang, P. (2009). Steganalysis Based on Difference Image. In: Kim, HJ., Katzenbeisser, S., Ho, A.T.S. (eds) Digital Watermarking. IWDW 2008. Lecture Notes in Computer Science, vol 5450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04438-0_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-04438-0_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04437-3
Online ISBN: 978-3-642-04438-0
eBook Packages: Computer ScienceComputer Science (R0)