Skip to main content

Two Notes from Experimental Study on Image Steganalysis

  • Conference paper
  • 3437 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7995))

Abstract

In recent years, several advanced methods for image steganalysis were proposed. During research process, some concerns are more and more addressed by steganalyzer. In this paper, we focus on several of these concerns. The first one is how to utilize SVM classifier in practical steganalysis, we use clustering analysis to divide training samples and train several SVM for detecting stego image. In this part we also discussed building an image database that can be used for evaluating steganography/steganalysis fairly. The second is how to designed proper classifier for steganalysis, especially how to take information of cover/stego image pair into account. We will discuss several notions regard to these two concerns.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pevny, T., Bas, P., Fridrich, J.: Steganalysis By Subtractive Pixel Adjacency Matrix. IEEE Transactions on Information Forensics And Security 5(2), 215–224 (2010)

    Article  Google Scholar 

  2. Fridrich, J., Kodovský, J., Holub, V., Goljan, M.: Steganalysis of Content-Adaptive Steganography in Spatial Domain. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 102–117. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  3. Guan, Q., Dong, J., Tan, T.: An Effective Image Steganalysis Method Based on Neighborhood Information of Pixels. In: Proc. IEEE International Conference on Image Processing, ICIP 2011 (2011)

    Google Scholar 

  4. Fridrich, J., Kodovský, J., Holub, V., Goljan, M.: Breaking HUGO-The Process Discovery. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 85–101. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  5. Schwamberger, V., Franz, M.O.: Simple Algorithmic Modifications for Improving Blind Steganalysis Performance. In: Proceedings of the 12th ACM Workshop on Multimedia and Security, MM&Sec 2010, pp. 225–230. ACM (2010)

    Google Scholar 

  6. Bas, P., Filler, T., Pevn´y, T.: Break Our Steganographic System— The Ins And Outs of Organizing Boss. In: 13th International Workshop on Information Hiding (2011)

    Google Scholar 

  7. Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Mohammadi, F.G., And Abadeh, M.S.: A Survey of Data Mining Techniques for Steganalysis. In: Sajedi, H. (ed.) Recent Advances in Steganography, November 7 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Guan, Q., Dong, J., Tan, T. (2013). Two Notes from Experimental Study on Image Steganalysis. In: Huang, DS., Bevilacqua, V., Figueroa, J.C., Premaratne, P. (eds) Intelligent Computing Theories. ICIC 2013. Lecture Notes in Computer Science, vol 7995. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39479-9_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39479-9_49

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39478-2

  • Online ISBN: 978-3-642-39479-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics