Skip to main content
Log in

Passive steganalysis based on higher order image statistics of curvelet transform

  • Published:
International Journal of Automation and Computing Aims and scope Submit manuscript

Abstract

Steganographic techniques accomplish covert communication by embedding secret messages into innocuous digital images in ways that are imperceptible to the human eye. This paper presents a novel passive steganalysis strategy in which the task is approached as a pattern classification problem. A critical part of the steganalyser design depends on the selection of informative features. This paper is aimed at proposing a novel attack with improved performance indices with the following implications: 1) employing higher order statistics from a curvelet sub-band image representation that offers better discrimination ability for detecting stego anomalies in images, as compared to other conventional wavelet transforms; 2) increasing the sensitivity and specificity of the system by the feature reduction phase; 3) realizing the system using an efficient classification engine, a neuro-C4.5 classifier, which provides better classification rate. An extensive experimental evaluation on a database containing 5600 clean and stego images shows that the proposed scheme is a state-of-the-art steganalyser that outperforms other previous steganalytic methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn. Information hiding — A survey. In Proceedings of IEEE, vol. 87, no. 7, pp. 1062–1078, 1999.

    Article  Google Scholar 

  2. S. Katzenbeisser, F. A. P. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking, Norwood, MA, USA: Artech House, 2000.

    Google Scholar 

  3. W. Bender, D. Gruhl, N. Morimot, A. Lu. Techniques for data hiding. IBM Systems Journal, vol. 35, no. 4, pp. 313–336, 1996.

    Article  Google Scholar 

  4. N. Nikolaidis, I. Pitas. Robust image watermarking in the spatial domain. Signal Processing, vol. 66, no. 3, pp. 385–403, 1998.

    Article  MATH  Google Scholar 

  5. W. N. Lie, L. C. Chang. Data hiding in images with adaptive numbers of least significant bits based on human visual system. In Proceedings of IEEE International Conference on Image Processing, IEEE, Kobe, Japan, pp. 286–290, 1999.

  6. Y. K. Lee, L. H. Chen. High capacity image steganographic model. IEE Proceedings: Vision, Image and Signal Processing, vol. 147, no. 3, pp. 288–294, 2000.

    Article  MathSciNet  Google Scholar 

  7. W. N. Lie, G. S. Lin, C. L. Wu. Robust image watermarking on the DCT domain. In Proceedings of IEEE International Symposium on Circuits and Systems, Geneva, Switzerland, vol. 1, pp. 228–231, 2000.

    Google Scholar 

  8. J. Huang, Y. Q. Shi. Adaptive image watermarking scheme based on visual masking. Electronics Letters, vol. 34, no. 8, pp. 748–750, 1998.

    Article  Google Scholar 

  9. T. Ogihara, D. Nakamura, N. Yokoya. Data embedding into pictorial with less distortion using discrete cosine transform. In Proceedings of International Conference on Pattern Recognition, Vienna, Austria, pp. 675–679, 1996.

  10. I. J. Cox, J. Kilian, F. T. Leighton, T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, 1997.

    Article  Google Scholar 

  11. Q. Cheng, T. S. Huang. An additive approach to transformdomain information hiding and optimum detection structure. IEEE Transactions on Multimedia, vol. 3, no. 3, pp. 273–284, 2001.

    Article  Google Scholar 

  12. F Pérez-González, F. Balado, J. R. H. Martin. Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 960–980, 2003.

    Article  MathSciNet  Google Scholar 

  13. C. I. Podilchuk, W. Zeng. Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 525–539, 1998.

    Article  Google Scholar 

  14. Y. S. Kim, O. H. Kwon, R. H. Park. Wavelet based watermarking method for digital images using the human visual system. Electronics Letters, vol. 35, no. 6, pp. 466–468, 1999.

    Article  Google Scholar 

  15. X. Y. Wang, J. Wu. A feature-based robust digital image watermarking against desynchronization attacks. International Journal of Automation and Computing, vol. 4, no. 4, pp. 428–432, 2007.

    Article  Google Scholar 

  16. B. Xu, Z. B. Zhang, J. Z. Wang, X. Q. Liu. Improved BSS based schemes for Active steganalysis. In Proceedings of ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing, IEEE, Qingdao, PRC, vol. 3, pp. 815–818, 2007.

    Chapter  Google Scholar 

  17. J. Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In Proceedings of International Workshop on Information Hiding, Lecture Notes in Computer Science, Springer, vol. 3200, pp. 67–81, 2005.

    Google Scholar 

  18. S. Geetha, S. S. Sivatha Sindhu, N. Kamaraj. Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system. Computers & Security, vol. 28, no. 7, pp. 683–697, 2008.

    Article  Google Scholar 

  19. S. Geetha, S. S. Sivatha Sindhu, N. Kamaraj. Close color pair signature ensemble adaptive threshold based steganalysis for LSB embedding in digital images. Transactions on Data Privacy, vol. 1, no. 3, pp. 140–161, 2008.

    Google Scholar 

  20. S. Geetha, S. S. S. Sindhu, N. Kamaraj. Steganalysis of LSB embedded images based on adaptive threshold close color pair signature. In Proceedings of the 6th IEEE Indian Conference on Computer Vision, Graphics and Image Processing, IEEE, pp. 281–288, 2008.

  21. S. Geetha, S. S. S. Sindhu, N. Kamaraj. StegoBreaker: Defeating the steganographic systems through genetic-Xmeans approach using image quality metrics. In Proceedings of the 16th IEEE International Conference on Advanced Computing and Communication, IEEE, pp. 382–391, 2008.

  22. S. Geetha, S. S. S. Sindhu, N. Kamaraj. StegoCracker: A genetic algorithm tuned neural network paradigm for breaking the audio steganographic utilities. In Proceedings of IEEE Indicon, pp. 180–186, 2007.

  23. J. Fridrich, M. Goljan. Practical steganalysis of digital images — State of the art. In Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents, San Jose, CA, USA, vol. 4675, pp. 1–13, 2002.

    Google Scholar 

  24. C. Manikopoulos, Y. Q. Shi, S. Song, Z. Zhang, Z. Ni, D. Zou. Detection of block DCT-based steganography in grayscale images. In Proceedings of the 5th IEEE Workshop on Multimedia Signal Processing, IEEE, pp. 355–358, 2002.

  25. R. Chandramouli. A mathematical approach to steganalysis. In Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents, San Jose, CA, USA, vol. 4675, pp. 14–25, 2002.

    Google Scholar 

  26. J. J. Harmsen, W. A. Pearlman. Steganalysis of additive noise modelable information hiding. In Proceedings of the SPIE, vol. 5020, pp. 131–142, 2003.

    Article  Google Scholar 

  27. I. Avcibas, N. Memon, B. Sankur. Steganalysis using image quality metrics. IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 221–229, 2003.

    Article  MathSciNet  Google Scholar 

  28. W. N. Lie, G. S. Lin. A feature-based classification technique for blind image steganalysis. IEEE Transactions on Multimedia, vol. 7, no. 6, pp. 1007–1020, 2005.

    Article  Google Scholar 

  29. H. Farid. Detecting hidden messages using higher-order statistical models. In Proceedings of International Conference on Image Processing, Rochester, NY, USA, pp. 905–908, 2002.

  30. J. J. Harmsen. Steganalysis of Additive Noise Modelable Information Hiding, Master dissertation, Rensselaer Polytechnic Institute, Troy, New York, USA, 2003.

    Google Scholar 

  31. T. Holotyak, J. Fridrich, S. Voloshynovskiy. Blind statistical steganalysis of additive steganography using wavelet higher order statistics. Lecture Notes in Computer Science, Springer, pp. 273–274, 2005.

  32. Y. Q. Shi, G. Xuan, C. Yang, J. Gao, Z. Zhang, P. Chai, D. Zou, C. Chen, W. Chen. Effective steganalysis based on statistical moments of wavelet characteristic function. In Proceedings of IEEE International Conference on Information Technology: Coding and Computing, IEEE, vol. 1, pp. 768–773, 2005.

    Article  Google Scholar 

  33. E. J. Candes, D. L. Donoho. New tight frames of curvelets and optimal representations of objects with C2 singularities. Communications on Pure and Applied Mathematics, vol. 57, no. 2, pp. 219–266, 2004.

    Article  MATH  MathSciNet  Google Scholar 

  34. R. R. Coifman, D. L. Donoho. Translation-invariant denoising. Lecture Notes in Statistics, Springer, vol. 103, pp. 125–150, 1995.

    Google Scholar 

  35. J. L. Starck, E. J. Candes, D. L. Donoho. The curvelet transform for image denoising. IEEE Transactions on Image Processing, vol. 11, no. 6, pp. 670–684, 2001.

    Article  MathSciNet  Google Scholar 

  36. E. J. Candes, D. L. Donoho, C. R. A. Cohen, L. L. Schumaker. Curvelets — A surprisingly effective nonadaptive representation for objects with edges. Curves Surfaces, Nashville, TN, USA, pp. 105–120, 2000.

  37. N. Kingsbury, T. Reves. Redundant representation with complex wavelets: How to achieve sparsity. In Proceedings of International Conference on Image Processing, IEEE, Barcelona, Spain, vol. 1, pp. 45–48, 2003.

    Google Scholar 

  38. Z. H. Zhou, J. Wu, W. Tang. Ensembling neural networks: Many could be better than all. Artificial Intelligence, vol. 137, no. 1–2, pp. 239–263, 2002.

    Article  MATH  MathSciNet  Google Scholar 

  39. J. R. Quinlan. C4.5: Programs for Machine Learning, San Mateo, CA, USA: Morgan Kaufmann, 1993.

    Google Scholar 

  40. S. S. S. Sindhu, S. Geetha, M. Marikannan, A. Kannan. A neuro-genetic based short-term forecasting framework for network intrusion prediction system. International Journal of Automation and Computing, vol. 6, no. 4, pp. 406–414, 2009.

    Article  Google Scholar 

  41. Z. H. Zhou, Z. Q. Chen. Hybrid decision tree. Knowledgebased Systems, vol. 15, no. 8, pp. 515–528, 2002.

    Article  Google Scholar 

  42. Z. H. Zhou, Y. Jiang. NeC4.5: Neural ensemble based C4.5. IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 6, pp. 770–773, 2004.

    Article  MathSciNet  Google Scholar 

  43. B. Efron, R. Tibshirani, R. J. Tibshirani. An Introduction to the Bootstrap, New York, USA: Chapman & Hall, 1993.

    MATH  Google Scholar 

  44. L. Breiman. Bagging predictors. Machine Learning, vol. 24, no. 2, pp. 123–140, 1996.

    MATH  MathSciNet  Google Scholar 

  45. PictureMarc, EmbedWatermark, v 1.00.45, Digimarc Corp.

  46. M. Kutterand, F. Jordan. JK-PGS (Pretty Good Signature), Signal Processing Laboratory at Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland, [Online], Available: http://ltswww.epfl.ch/~kutter/watermarking/JK_PGS.html, 1998.

  47. I. J. Cox, J. Kilian, F. T. Leighton, T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, 1997.

    Article  Google Scholar 

  48. A. Brown. S-tools Version 4.0, [Online], Available: http://members.tripod.com/steganography/stego/s-tools4.html.

  49. Steganos Security Suite, [Online], Available: http://www.steganos.com/english/steganos/download.htm.

  50. J Korejwa. Shell 2.0, [Online], Available: http://www.tiac.net/users/korejwa/steg.htm.

  51. Images. [Online], Available: http://www.cl.cam.ac.uk/~fapp2/watermarking/benchmark/image_database.html.

  52. J. H. Holland. Adaptation in Natural and Artificial Systems, University of Michigan Press, 1975.

  53. NeC45.zip, [Online], Available: http://lamda.nju.edu.cn/datacode/NeC4.5/nec45.zip.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Geetha.

Additional information

S. Geetha received the B. Eng. and M. Eng. degrees in computer science and engineering in 2000 and 2004, respectively, from the Madurai Kamaraj University and Anna University of Chennai, India. In July 2004, she joined the Department of Information Technology at Thiagarajar College of Engineering, Madurai, India. She is a recipient of University Rank and Academic Topper Award in B.Eng. and M. Eng. in 2000 and 2004, respectively. She was an editor for Proceedings the 1st Indian Conference on Computational Intelligence and Information Security.

Her research interests include multimedia security, intrusion detection systems, machine learning paradigms, and information forensics.

Siva S. Sivatha Sindhu received the B.Eng. and M.Eng. degrees in computer science and engineering from Maharaja Sayajirao University of Baroda and Anna University, India in 2002 and 2004, respectively. She is currently with the Department of Information Technology, Thiagarajar College of Engineering, Madurai, Tamilnadu, India.

Her research interests include information security, intrusion detection systems, and soft computing approaches.

N. Kamaraj received the B.Eng. degree in electrical and electronics engineering and the M.Eng. degree in power system engineering from Madurai Kamaraj University, India in 1988 and 1994, respectively. He received the Ph.D. degree in the power system security assessment in 2003 from Madurai Kamaraj University. He is an associate professor in Electrical Engineering Department, Thiagarajar College of Engineering, Madurai, Tamilnadu, India. Currently, he is heading the Department of Electrical and Electronics Engineering in Thiagarajar College of Engineering. He is the recipient of Merit Award from IEEE Computer Society for Computer Society International Design Competition (CSIDC) 2003 as best advisor for the team contested in CSIDC. Also, he has received Gold Medal and Corps Subject Award from Institution of Engineers (India) for the year 2003.

His research interests include security assessment using neural network, fuzzy logic, and genetic algorithm.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Geetha, S., Sivatha Sindhu, S.S. & Kamaraj, N. Passive steganalysis based on higher order image statistics of curvelet transform. Int. J. Autom. Comput. 7, 531–542 (2010). https://doi.org/10.1007/s11633-010-0537-1

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11633-010-0537-1

Keywords

Navigation