Skip to main content
Log in

Pure spatial rich model features for digital image steganalysis

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The SRM (Spatial Rich Model) is a very effective steganalysis method. It uses statistics of neighboring noise residual samples as features to capture the dependency changes caused by embedding. Because the noise residuals are the high-frequency components of image and closely tied to image content, the residuals of different types of image regions have different statistical properties and effectiveness for steganalysis. In this paper, the effectiveness of the residuals is investigated. Then the effectiveness of the statistics collected from different types of neighboring residual samples is investigated from the FLD (Fisher Linear Discriminant) viewpoint, and ineffective, effective and high-effective neighboring residual samples are defined. The ineffective neighboring residual samples are not likely to change during embedding, and if they are counted in statistics, they may mix the features with noise and make the features impure. Pure SRM features are extracted based on neighboring noise residual sample selection strategy. Furthermore, multi-order statistical features are proposed to increase the statistical diversity. Steganalysis performances of the statistical features collected from different types of neighboring residual samples are investigated on three content adaptive steganographic algorithms. Experimental results demonstrate that the proposed method can achieve a more accurate detection than SRM.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Avcibas I, Memon N, Sankur B (2000) Steganalysis of watermarking techniques using image quality metrics. In: Proceedings of the SPIE, Security and Watermarking of Multimedia Contents II, vol 4314, pp 523–531

  2. Bas P, Filler T, Pevný T (2011) Break our steganographic system C the ins and outs of organizing BOSS. In: Information Hiding, 13th International Conference Filler T, Pevný T, Ker A, Craver S (eds). vol 6958 of Lecture Notes in Computer Science, pp 59–70, Prague, Czech Republic

  3. Böhme R (2010) Advanced Statistical Steganalysis. Springer, Heidelberg

    Book  MATH  Google Scholar 

  4. Chen C, Shi YQ (2008) JPEG image steganalysis utilizing both intrablock and interblock correlations. In: Proceedings IEEE Int. Symp. Circuits and Systems, ISCAS, pp 3029–3032

  5. Denemark T, Fridrich J, Holub V (2014) Further study on the security of SCUNIWARD. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics, vol 9028. San Francisco, CA, pp 2–6

    Google Scholar 

  6. Duda RO, Hart PE, Stork DG (2001) Pattern Classification, 2nd edition. John Wiley & Sons, Inc., New York

    MATH  Google Scholar 

  7. Farid H, Siwei L, Petitcolas FAP (eds) (2002) Detecting hidden messages using higher-order statistics and support vector machines. in Information Hiding, 5th Int. Workshop, Noordwijkerhout, The Netherlands. vol 2578, Lecture Notes in Computer Science, pp 340-354

  8. Fridrich J, Kodovský J (2011) Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7(3):868–882. http://dde.binghamton.edu/kodovsky/pdf/TIFS2012-SRM.pdf

    Article  Google Scholar 

  9. Filler T, Fridrich J (2010) Gibbs construction in steganography. IEEE Transactions on Information Forensics and Security 5(4):705–720. http://www.ws.binghamton.edu/fridrich/Research/gibbs-construction10.pdf

    Article  Google Scholar 

  10. Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security 6(3):920–935

    Article  Google Scholar 

  11. Gül G, Kurugollu F, Filler T, Pevný T, Ker A, Crave S (eds) (2011) A new methodology in steganalysis: Breaking highly undetactable steganograpy (HUGO), in Proc. Information Hiding, 13th Int. Workshop. Prague, Czech Republic. vol 6958, Lecture Notes in Computer Science, pp 71-84

  12. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In Fourth IEEE InternationalWorkshop on Information Forensics and Security. Tenerife, Spain

    Google Scholar 

  13. Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Puech W, Chaumont M, Dittmann J, Campisi P (eds) 1st ACM IH & MMSec. Workshop. Montpellier, France

    Google Scholar 

  14. Holub V, Fridrich J (2013) Random projections of residuals for digital image steganalysis. IEEE Transactions on Information Forensics and Security 8(12):1996–2006

    Article  Google Scholar 

  15. Kodovský J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2):432–444. http://dde.binghamton.edu/download/ensemble/TIFS-2011-ensemble.pdf

    Article  Google Scholar 

  16. Pevný T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security 5(2):215–224. 1

    Article  Google Scholar 

  17. Westfeld A, Pfitzmann A (1999) Attacks on steganographic systems. In: Proceedings of Information Hiding, Third Int. Workshop. Dresden, Germany, pp 61–75

  18. Zou D, Shi YQ, Su W, Xuan G (2006) Steganalysis based on Markov model of thresholded prediction-error image. In: Proceedings IEEE, International Conference on Multimedia and Expo. Toronto, Canada, pp 1365–1368

Download references

Acknowledgments

This work was supported by the Natural Science Foundation of China (No.61302178 and 61402009), and the Excellent Youth Foundation of Anhui University of Technology (AHUT) (No. QZ201014). The authors would like to thank the Network Center of Anhui University of Technology (AHUT) for providing cloud services to support this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pengfei Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, P., Wei, Z. & Xiao, L. Pure spatial rich model features for digital image steganalysis. Multimed Tools Appl 75, 2897–2912 (2016). https://doi.org/10.1007/s11042-015-2521-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2521-9

Keywords

Navigation