Skip to main content

Blind Image Steganalysis Based on Local Information and Human Visual System

  • Conference paper
Signal Processing, Image Processing and Pattern Recognition (SIP 2009)

Abstract

In this paper, a new steganalysis method is introduced based on human visual system. Steganalysis uses the effect of steganography on the statistical characteristics to detect if such effect exists or not. Steganography methods do not have the same effect on all of the pixels of an image. We use local information to select the best area. We cannot use each individual pixel for feature extraction, so we use blocks. At first, segmentation and clustering algorithm are employed to detect the best segments for steganalysis. In the next step, the features based on wavelet are extracted. At the end, Support Vector Machine is applied as the classifier. The performance of this algorithm is verified by experimental results. The results show that the detection accuracy of our method reaches 98.67% for true positive and 90.67% for true negative when 100% capacity of the image is used with spread spectrum steganography algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shi, Y.Q., Xuan, G., Zou, D., Gao, J.: Steganalysis Based on Moments of Characteristic Functions Using Wavelet Decomposition, Prediction-Error Image, and Neural Network. In: International Conference on Multimedia and Expo (ICME), Amsterdam, The Netherlands (July 2005)

    Google Scholar 

  2. Ambalavanam, A.: Contributions in Mathematical Approaches to Steganalysis. In: International Symposium on Multimedia (ISM), San Diego, CA, USA, December 2006, pp. 371–375 (2006)

    Google Scholar 

  3. Chandramouli, R.: A Mathematical Approach to Steganalysis. In: Proc. SPIE Security and Watermarking of Multimedia Contents IV, San Jose, CA (January 2002)

    Google Scholar 

  4. Watters, P.A., Martin, F., Stripf, S.H.: Visual Steganalysis of LSB-encoded Natural Images. In: International Conference on Information Technology and Applications (ICITA), Sydney, Australia, July 2005, vol. 1, pp. 746–751 (2005)

    Google Scholar 

  5. Shuanghuan, Z., Hongbin, Z.: Image Texture Energy-Entropy-Based Blind Steganalysis. In: Workshop on Signal Processing Systems, Shanghai, China, October 2007, pp. 600–604 (2007)

    Google Scholar 

  6. Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.S.: Steganalysis for Markov Cover Data with Applications to Images. IEEE Transactions on Information Forensics and Security 1, 275–287 (2006)

    Article  Google Scholar 

  7. Chunhua, C., Shi, Y.Q., Chen, W., Xuan, G.: Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function. In: IEEE International Conference on Image Processing, Atlanta, GA, USA, October 2006, pp. 105–108 (2006)

    Google Scholar 

  8. Chen, C., Shi, Y.Q., Xuan, G.: Steganalyzing Texture Images. In: International Conference on Image Processing (ICIP), Antonio, Texas, September 2007, vol. 2, pp. 153–156 (2007)

    Google Scholar 

  9. Fu, D., Shi, Y.Q., Zou, D.K., Xuan, G.R.: JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain. In: Workshop on Multimedia Signal Processing, Siena, Italy, October 2006, pp. 310–313 (2006)

    Google Scholar 

  10. Xu, B., Zhang, Z., Wang, J., Liu, X.: Improved BSS Based Schema for Active Steganalysis. In: International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Phuket, Thailand, August 2007, vol. 3, pp. 815–818 (2007)

    Google Scholar 

  11. Luo, X.-Y., Wang, D.-S., Wang, P., Liu, F.-L.: Review: A review on blind detection for image steganography. Signal Processing 88(9), 2138–2157 (2008)

    Article  MATH  Google Scholar 

  12. Herrera-Moro, D.R., Rodríguez-Colín, R., Feregrino-Uribe, C.: Adaptive Steganography Based on Textures. In: International Conference on Electronics, Communications and Computers, Puebla, Mexico, December 2007, p. 34 (2007)

    Google Scholar 

  13. Wong, P.W., Dittmann, J., Memon, N.D.: Textural Features Based Universal Steganalysis. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents, vol. 6819 (January 2008)

    Google Scholar 

  14. Ahmidi, N., Lotfi Neyestanak, A.A.: A Human Visual Model for Steganography. In: Conference on Electrical and Computer Engineering, Niagara Falls, Ontario, Canada, May 2008, pp. 001077–001080 (2008)

    Google Scholar 

  15. Watson, A.B.: DCT Quantization Matrices Visually Optimized for Individual Images. In: Human Vision, Visual Processing, and Digital Display IV, Proc. SPIE 1913-14, San Jose, CA (1993)

    Google Scholar 

  16. Goljan, M., Fridrich, J., Holotyak, T.: New Blind Steganalysis and Its Implications. In: Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 1–13 (2006)

    Google Scholar 

  17. Hsu, C.W., Chang, C.C., Lin, C.J.: A Practical Guide to Support Vector Classification. Technical Report (May 2008)

    Google Scholar 

  18. http://vision.cs.aston.ac.uk/datasets/UCID/data/ucid.v2.tar.gz

  19. http://www.adastral.ucl.ac.uk/~gwendoer/?steganalysis/

  20. Cancelli, G., Doerr, G., Barni, M., Cox, I.J.: A Comparative Study of ± Steganalyzers. In: Workshop on Multimedia Signal Processing, Cairns, Queensland, Australia, October 2008, pp. 791–796 (2008)

    Google Scholar 

  21. http://garr.dl.sourceforge.net/sourceforge/steghide/steghide-0.5.1-win32.zip

  22. Farid, H., Lyu, S.: Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In: Workshop on Information Hiding, Noordwijkerhout, The Netherlands, October 2002, pp. 340–354 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bakhshandeh, S., Jamjah, J.R., Azami, B.Z. (2009). Blind Image Steganalysis Based on Local Information and Human Visual System. In: Ślęzak, D., Pal, S.K., Kang, BH., Gu, J., Kuroda, H., Kim, Th. (eds) Signal Processing, Image Processing and Pattern Recognition. SIP 2009. Communications in Computer and Information Science, vol 61. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10546-3_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10546-3_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10545-6

  • Online ISBN: 978-3-642-10546-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics