Skip to main content
Log in

Image universal steganalysis based on best wavelet packet decomposition

  • Research Papers
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

Based on the best wavelet packet decomposition of images, a new universal steganalysis method with high detection correct ratio is proposed. First, the best wavelet packet decomposition of image based on the Shannon entropy information cost function is made. Second, high order absolute characteristic function moments of histogram extracted from the coefficient subbands obtained by best wavelet packet decomposition are regarded as features. Finally, these features are processed and a back-propagation (BP) neural network is designed to classify original and stego images. Three different steganalysis algorithms for three different cases of background and application condition are presented. To validate the performance of the proposed method, a series of experiments are made for six kinds of typical steganography methods, i.e. LSB, LTSB, PMK, Jsteg, F5 and JPHide. Results show that, the average detection accuracy of the proposed method exceeds at least 6.4% and up to 15.4% and has a better universal performance than its closest competitors. Furthermore, the proposed method can provide reference for designing the pattern recognition and classification algorithm based on best wavelet packet decomposition.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Fridrich J, Goljan M. Practical steganalysis of digital images—state of the art. In: Proceedings of SPIE, Security and Watermarking of Multimedia Content IV. Vol. 4675. New York: SPIE, 2002. 1–13

    Google Scholar 

  2. McBride B T, Peterson G L, Gustafson S C. A new blind method for detecting novel steganography. Digit Invest, 2005, 2: 50–70

    Article  Google Scholar 

  3. Goljan M, Fridrich J, Holotyak T. New blind steganalysis and its implications In: Proceedings of SPIE, Security and Watermarking of Multimedia Content VIII. Vol. 6072. New York: SPIE, 2006. 1–13

    Google Scholar 

  4. Avcibas I, Memon N D, Sankur B. Steganalysis of watermarking techniques using image quality metrics. In: Proceedings of SPIE, Security and Watermarking of Multimedia Content III, Vol. 4314. New York: SPIE, 2001. 523–531

    Google Scholar 

  5. Avcibas I, Memon N, Sankur B. Steganalysis using image quality metrics. IEEE Trans Image Process, 2003, 12: 221–229

    Article  MathSciNet  Google Scholar 

  6. Jiang N, Wang J, Yang Y X. A new method for blind image steganalysis (in Chinese). J Beijing Univ Posts Telecommun, 2006, 29: 1–4

    MATH  Google Scholar 

  7. Burges C J C. A tutorial on support vector machines for pattern recognition. Data Min Knowl Disc, 1998, 2: 121–167

    Article  Google Scholar 

  8. Farid H. Detecting hidden messages using higher-order statistical models. In: Proceedings of IEEE International Conference on Image processing, Vol. 2. New York, USA, 2002. 905–908

    Google Scholar 

  9. Duda R O, Hart P E, Stork D G. Pattern Classification. 2nd ed. New York: Wiley, 2001

    MATH  Google Scholar 

  10. Farid H, Lyu SW. Detecting hidden messages using higher-order statistics and support vector machines. In: Proceedings of 5th International Information Hiding Workshop, LNCS, Vol. 2578. Berlin: Springer-Verlag, 2002. 340–354

    Google Scholar 

  11. Lyu S W, Farid H. Steganalysis using higher-order image statistics. IEEE Trans Inf Forensic Secur, 2006, 1: 111–119

    Article  Google Scholar 

  12. Harmsen J J, Pearlman W A. Steganalysis of additive noise modelable information hiding. In: Proceedings of SPIE, Security and Watermarking of Multimedia Content V, Vol. 5020. New York: SPIE, 2003. 131–142

    Google Scholar 

  13. Xuan G R, Shi Y Q, Gao J J, et al. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: Proceedings of 7th International Information Hiding Workshop, LNCS, Vol. 3727. Berlin: Springer-Verlag, 2005. 262–277

    Chapter  Google Scholar 

  14. Wang Y, Moulin P. Optimized feature extraction for learning-based image steganalysis. IEEE Trans Inf Forensic Secur, 2007, 2: 31–45

    Article  Google Scholar 

  15. Duda R O, Hart P E. Pattern Classification and Scene Analysis. New York: Wiley, 1973

    MATH  Google Scholar 

  16. Marvel L M, Boncelet C G, Retter C T. Spread spectrum image steganography. IEEE Trans Image Process, 1999, 8: 1075–1083

    Article  Google Scholar 

  17. Luo X Y, Liu F L, Wang D S. WPD-based blind image steganalysis (in Chinese). J Commun, 2008, 29: 173–182

    Google Scholar 

  18. Lie W N, Lin G S. A feature-based classification technique for blind image steganalysis. IEEE Trans Multimedia, 2005, 7: 1007–1020

    Article  Google Scholar 

  19. Mao J F, Lin J J, Dai M. An attacked image based hidden messages blind detect technique (in Chinese). J Comput, 2009, 32: 318–327

    Google Scholar 

  20. Sun W Y, Liu T T, Zhang X P, et al. Statistical features for universal steganalysis on color images (in Chinese). J Image Graph, 2008, 13: 1914–1917

    Google Scholar 

  21. Luo X Y, Wang D S, Wang P, et al. Blind image steganalysis based on multi-domain feature scaling and BP network (in Chinese). J Southeast Univ (Natl Sci Ed), 2007, 37(Supp. I): 87–91

    Google Scholar 

  22. Luo X Y, Wang D S, Hu W, et al. Blind detection for image steganographya system framework and implementation. Int J Innovat Comput Inf Control, 2009, 5: 433–442

    Google Scholar 

  23. Chen C H, Shi Y Q. JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Proceedings of International Symposium on Circuits and System, Washington, USA. 2008. 3029–3032

  24. Huang F J, Huang J W. Calibration based universal JPEG steganalysis. Sci China Ser F-Inf Sci, 2009, 52: 260–268

    Article  MATH  Google Scholar 

  25. Pevny T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX. Vol. 6505. New York: SPIE, 2007. 650503-1–650503-13

    Google Scholar 

  26. Luo X Y, Wang D S, Wang P, et al. A review on blind detection for image steganography. Signal Process, 2008, 88: 2138–2157

    Article  MATH  Google Scholar 

  27. Fridrich J, Soukal D, Goljan M. Maximum likelihood estimation of length of secret message embedded using +-K steganography in spatial domain. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, Vol. 5681. New York: SPIE, 2005. 595–606

    Google Scholar 

  28. Luo X Y, Yang C F, Wang D S, et al. LTSB steganalysis based on quartic equation. LNCS Trans Data Hiding Multimedia Security, 2007, 2: 68–90

    Article  Google Scholar 

  29. Sun Y K. Wavelet Analysis and Its Application. Beijing: China Machine Press, 2005

    Google Scholar 

  30. Huang W, Lu X B, Ling X J. Wavelet packet based feature extraction and recognition of license plate characters (in Chinese). Chinese Sci Bull, 2004, 49: 2612–2614

    Google Scholar 

  31. Zhao F C, Hu Y H, Hao S Q. Classification using wavelet packet decomposition and support vector machine for digital modulations. J Syst Eng Electr, 2008, 19: 914–918

    Article  MATH  Google Scholar 

  32. Garcia C, Zikos G, Tziritas G. Wavelet packet analysis for face recognition. Image Vision Comput, 2000, 18: 289–297

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to XiangYang Luo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Luo, X., Liu, F., Yang, C. et al. Image universal steganalysis based on best wavelet packet decomposition. Sci. China Inf. Sci. 53, 634–647 (2010). https://doi.org/10.1007/s11432-010-0044-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-010-0044-6

Keywords

Navigation