skip to main content
10.1145/1854229.1854268acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Simple algorithmic modifications for improving blind steganalysis performance

Published:09 September 2010Publication History

ABSTRACT

Most current algorithms for blind steganalysis of images are based on a two-stages approach: First, features are extracted in order to reduce dimensionality and to highlight potential manipulations; second, a classifier trained on pairs of clean and stego images finds a decision rule for these features to detect stego images. Thereby, vector components might vary significantly in their values, hence normalization of the feature vectors is crucial. Furthermore, most classifiers contain free parameters, and an automatic model selection step has to be carried out for adapting these parameters. However, the commonly used cross-validation destroys some information needed by the classifier because of the arbitrary splitting of image pairs (stego and clean version) in the training set. In this paper, we propose simple modifications of normalization and for standard cross-validation. In our experiments, we show that these methods lead to a significant improvement of the standard blind steganalyzer of Lyu and Farid.

References

  1. I. Avcibas, N. D. Memon, and B. Sankur. Steganalysis using image quality metrics. IEEE Transactions on Image Processing, 12(2):221--229, February 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. W. Buccigrossi and E. P. Simoncelli. Image compression via joint statistical characterization in the wavelet domain. IEEE Transactions on Image Processing, 8(12):1688--1701, December 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C.-C. Chang and C.-J. Lin. LIBSVM: A library for support vector machines, 2001. Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm/.Google ScholarGoogle Scholar
  4. S. Geisser. The predictive sample reuse method with applications. Journal of the American Statistical Association, 70(350):320--328, June 1975.Google ScholarGoogle ScholarCross RefCross Ref
  5. S. Geisser and W. F. Eddy. A predictive approach to model selection. Journal of the American Statistical Association, 74(365):153--160, March 1979.Google ScholarGoogle ScholarCross RefCross Ref
  6. M. Goljan, J. J. Fridrich, and T. Holotyak. New blind steganalysis and its implications. Security, Steganography, and Watermarking of Multimedia Contents VIII, 6072(1):1--13, February 2006.Google ScholarGoogle Scholar
  7. T. Holotyak, J. J. Fridrich, and D. Soukal. Stochastic approach to secret message length estimation in ±k embedding steganography. In E. J. Delp and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, pages 673--684, San Jose, CA, USA, 2005. International Society for Optical Engineering, SPIE.Google ScholarGoogle Scholar
  8. T. Holotyak, J. J. Fridrich, and S. Voloshynovskiy. Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In J. Dittmann, S. Katzenbeisser, and A. Uhl, editors, Communications and Multimedia Security, volume 3677 of Lecture Notes in Computer Science, pages 273--274, Berlin, Germany, September 2005. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. D. Ker. Improved detection of LSB steganography in grayscale images. In J. Fridrich, editor, Information Hiding, volume 3200 of Lecture Notes in Computer Science, pages 97--115, Berlin, Germany, December 2004. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Lyu and H. Farid. Steganalysis using higher-order image statistics. IEEE Transactions on Information Forensics and Security, 1(1):111--119, March 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. E. Rasmussen. Gaussian processes in machine learning. In O. Bousquet, U. von Luxburg, and G. Raetsch, editors, Advanced Lectures on Machine Learning, volume 3176 of Lecture Notes in Computer Science, pages 63--71, Berlin, Germany, October 2004. Springer-Verlag.Google ScholarGoogle Scholar
  12. C. E. Rasmussen and C. K. I. Williams. Gaussian Processes for Machine Learning. MIT Press, Cambridge, MA, USA, January 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. Schöelkopf and A. J. Smola. Learning with Kernels. Support Vector Machines, Regularization, Optimization, and Beyond. MIT Press, Cambridge, MA, USA, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. E. P. Simoncelli and E. H. Adelson. Subband transforms. In J. W. Woods, editor, Subband Image Coding. Kluwer Academic Publishers, Norwell, MA, USA, 1990.Google ScholarGoogle Scholar
  15. M. Vetterli and J. Kovacevic. Wavelets and subband coding. Prentice-Hall, Upper Saddle River, NJ, USA, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Simple algorithmic modifications for improving blind steganalysis performance

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MM&Sec '10: Proceedings of the 12th ACM workshop on Multimedia and security
      September 2010
      264 pages
      ISBN:9781450302869
      DOI:10.1145/1854229

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 September 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate128of318submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader