Skip to main content
Log in

Efficient steganographer detection over social networks with sampling reconstruction

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

This work proposes an improvement solution in identifying malicious user (or steganographer) who try to deliver hidden information in a batch of natural images. In this solution, a sampling construction strategy is proposed firstly. We design a probability calculation model by analying the principle of adaptive steganography, and then select DCT blocks with higher embedding probability to reconstruct a sample image, which is considered as the proof of extracting steganalysis features. Furthermore, inspired by the classical PEV-193 feature space, we reform a reduced PEV feature set including histogram features and intra-block co-occurrence features, which can capture more steganographic changes and match the sampling construction strategy well. Comprehensive experimental results show that comparing with the state-of-the-arts, the proposed scheme has a significant improvement in identifying potential steganographers in large-scale social media networks, and therefore is believed to be able to resist adaptive steganography with small payload.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. To ease notation, we assume that the number of images from each actor is the same. This assumption can be relaxed, and our method is still applicable.

References

  1. JSTeg algorithm. Available from: http://zooid.org/%7epaul/crypto/jsteg/ [Accessed on 2011]

  2. Westfeld A (2001) High capacity despite better steganalysis (f5-a steganographic algorithm). In: Proceedings of 4th international workshop on information hiding. Pittsburgh, PA, April 25–27, pp 289–302

  3. Fridrich J, Pevný T, Kodovský J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In: Proceedings of the 9th ACM multimedia & security workshop, Dallas, TX, September 20–21, pp 3–14

  4. Qin C, Chang C, Huang Y, Liao L (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23(7):1109–1118

    Article  Google Scholar 

  5. Filler T, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. In: Proceedings of SPIE, electronic imaging, media watermarking, security, and forensics XIII, San Francisco, CA, January 23–26

  6. Guo L, Ni J, Shi Y (2014) Uniform embedding for efficient JPEG steganography. IEEE Trans Inf Forensics Secur 9(5):814–825

    Article  Google Scholar 

  7. Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inf Secur 1:1–16

    Google Scholar 

  8. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164

    Article  Google Scholar 

  9. Shi Y, Chen C, Chen W (2006) A Markov process based approach to effective attacking JPEG steganography. In: Information hiding, 8th international workshop, vol 4437, pp 249–264

  10. Pevný T, Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, vol 6505, pp 3–14

  11. Kodovský J, Fridrich J, Holub V (2012) Ensemble classifier for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432–444

    Article  Google Scholar 

  12. Pevný T, Ker A (2013) The challenges of rich features in universal steganalysis. In: Proceedings of SPIE, media watermarking, security, and forensics, vol 8665, pp M01–M15

  13. Liu Q, Chen Z (2014) Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detection in JPEG images. ACM Trans Intell Syst Technol (TIST) 5(4):63

    Google Scholar 

  14. Holub V, Fridrich J (2015) Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forensics Secur 10(2):219–228

    Article  Google Scholar 

  15. Holub V, Fridrich J (2015) Phase-aware projection model for steganalysis of JPEG images. In: Proceedings of SPIE, electronic imaging, media watermarking, security, and forensics XVII, San Francisco, CA, February 8–12, vol 9409

  16. [Online]. http://www.flickr.com. [Accessed on March, 2016]

  17. [Online]. http://www.instagram.com. [Accessed on March, 2016]

  18. Ker A, Pevný T (2011) A new paradigm for steganalysis via clustering. In: Proceedings of SPIE, media watermarking, security, and forensics III. 78800U, vol 7880

  19. Ker A, Pevný T (2012) Identifying a steganographer in realistic and heterogeneous data sets. In: Proceedings of SPIE, media watermarking, security, and forensics XIV, vol 8303, pp 0N 1–13

  20. Ker A, Pevný T (2014) The steganographer is the outlier: realistic large-scale steganalysis. IEEE Trans Inf Forensics Secur 9(9):1424–1435

    Article  Google Scholar 

  21. Li F, Wu K, Lei J, Wen M, Bi Z, Gu C (2016) Steganalysis over large-scale social networks with high-order joint features and clustering ensembles. IEEE Trans Inf Forensics Secur 11(2):344–357

    Article  Google Scholar 

  22. Hou X, Zhang T, Xu C (2016) New framework for unsupervised universal steganalysis via SRISP-aided outlier detection. Signal Process Image Commun 47:72–85

    Article  Google Scholar 

  23. Li F, Wu K, Lei J, Wen M, Ren Y (2017) Unsupervised steganalysis over social networks based on multi-reference sub-image sets. Multimedia Tools and Applications 1–19, to appear. https://doi.org/10.1007/s11042-017-4759-x

  24. Böhme R (2008) Improved statistical steganalysis using models of heterogeneous cover signals. PhD thesis, Faculty of Computer Science, Technische Universität Dresden, Germany

  25. Holub V (2014) Content adaptive steganography - design and detection. PhD thesis, Binghamton University, May 2014

  26. Gretton A, Borgwardt K, Rasch M, Scholkopf B, Smola A (2007) A kernel method for the two-sample-problem. Advances in neural information processing systems 19. MIT Press, Cambridge, MA, pp 513–520

    Google Scholar 

  27. Kodovský J, Fridrich J (2009) Calibration revisited. In: Proceedings of the 11th ACM multimedia & security workshop, pp 63–74

  28. Ker A, Pevný T (2012) Batch steganography in the real world. In: Proceedings of 14th ACM workshop multimedia security (MM&Sec), pp 1–10

  29. DDE Download. Available from: http://dde.binghamton.edu/download/ [Accessed on March, 2016]

  30. Li H, Liu D, Dai Y, Luan T (2015) Engineering searchable encryption of mobile cloud networks: when QoE meets QoP. IEEE Wirel Commun 22(4):74–80

    Article  Google Scholar 

  31. Li H, Yang Y, Luan T, Liang X, Zhou L, Shen X (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Dependable Secure Comput 13 (3):312–325

    Article  Google Scholar 

  32. Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2014) An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst 25(8):2053–2064

    Article  Google Scholar 

  33. Yu J, Li F, Cheng H, Zhang X (2016) Spatial steganalysis using contrast of residuals. IEEE Signal Process Lett 23(7):989–992

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by Natural Science Foundation of China under Grants (61602295, 61572311, 615 72309, 61472236), Innovation Program of Shanghai Municipal Education Commission (14ZZ150,14YZ129), Natural Science Foundation of Shanghai (16ZR1413100) and the Excellent University Young Teachers Training Program of Shanghai Municipal Education Commission (ZZsdl15105).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fengyong Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, F., Wen, M., Lei, J. et al. Efficient steganographer detection over social networks with sampling reconstruction. Peer-to-Peer Netw. Appl. 11, 924–939 (2018). https://doi.org/10.1007/s12083-017-0603-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-017-0603-3

Keywords

Navigation