ABSTRACT
Most current algorithms for blind steganalysis of images are based on a two-stages approach: First, features are extracted in order to reduce dimensionality and to highlight potential manipulations; second, a classifier trained on pairs of clean and stego images finds a decision rule for these features to detect stego images. Thereby, vector components might vary significantly in their values, hence normalization of the feature vectors is crucial. Furthermore, most classifiers contain free parameters, and an automatic model selection step has to be carried out for adapting these parameters. However, the commonly used cross-validation destroys some information needed by the classifier because of the arbitrary splitting of image pairs (stego and clean version) in the training set. In this paper, we propose simple modifications of normalization and for standard cross-validation. In our experiments, we show that these methods lead to a significant improvement of the standard blind steganalyzer of Lyu and Farid.
- I. Avcibas, N. D. Memon, and B. Sankur. Steganalysis using image quality metrics. IEEE Transactions on Image Processing, 12(2):221--229, February 2003. Google ScholarDigital Library
- R. W. Buccigrossi and E. P. Simoncelli. Image compression via joint statistical characterization in the wavelet domain. IEEE Transactions on Image Processing, 8(12):1688--1701, December 1999. Google ScholarDigital Library
- C.-C. Chang and C.-J. Lin. LIBSVM: A library for support vector machines, 2001. Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm/.Google Scholar
- S. Geisser. The predictive sample reuse method with applications. Journal of the American Statistical Association, 70(350):320--328, June 1975.Google ScholarCross Ref
- S. Geisser and W. F. Eddy. A predictive approach to model selection. Journal of the American Statistical Association, 74(365):153--160, March 1979.Google ScholarCross Ref
- M. Goljan, J. J. Fridrich, and T. Holotyak. New blind steganalysis and its implications. Security, Steganography, and Watermarking of Multimedia Contents VIII, 6072(1):1--13, February 2006.Google Scholar
- T. Holotyak, J. J. Fridrich, and D. Soukal. Stochastic approach to secret message length estimation in ±k embedding steganography. In E. J. Delp and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, pages 673--684, San Jose, CA, USA, 2005. International Society for Optical Engineering, SPIE.Google Scholar
- T. Holotyak, J. J. Fridrich, and S. Voloshynovskiy. Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In J. Dittmann, S. Katzenbeisser, and A. Uhl, editors, Communications and Multimedia Security, volume 3677 of Lecture Notes in Computer Science, pages 273--274, Berlin, Germany, September 2005. Springer-Verlag. Google ScholarDigital Library
- A. D. Ker. Improved detection of LSB steganography in grayscale images. In J. Fridrich, editor, Information Hiding, volume 3200 of Lecture Notes in Computer Science, pages 97--115, Berlin, Germany, December 2004. Springer-Verlag. Google ScholarDigital Library
- S. Lyu and H. Farid. Steganalysis using higher-order image statistics. IEEE Transactions on Information Forensics and Security, 1(1):111--119, March 2006. Google ScholarDigital Library
- C. E. Rasmussen. Gaussian processes in machine learning. In O. Bousquet, U. von Luxburg, and G. Raetsch, editors, Advanced Lectures on Machine Learning, volume 3176 of Lecture Notes in Computer Science, pages 63--71, Berlin, Germany, October 2004. Springer-Verlag.Google Scholar
- C. E. Rasmussen and C. K. I. Williams. Gaussian Processes for Machine Learning. MIT Press, Cambridge, MA, USA, January 2006. Google ScholarDigital Library
- B. Schöelkopf and A. J. Smola. Learning with Kernels. Support Vector Machines, Regularization, Optimization, and Beyond. MIT Press, Cambridge, MA, USA, 2002. Google ScholarDigital Library
- E. P. Simoncelli and E. H. Adelson. Subband transforms. In J. W. Woods, editor, Subband Image Coding. Kluwer Academic Publishers, Norwell, MA, USA, 1990.Google Scholar
- M. Vetterli and J. Kovacevic. Wavelets and subband coding. Prentice-Hall, Upper Saddle River, NJ, USA, 1995. Google ScholarDigital Library
Index Terms
- Simple algorithmic modifications for improving blind steganalysis performance
Recommendations
Steganalysis of DCT-embedding based adaptive steganography and YASS
MM&Sec '11: Proceedings of the thirteenth ACM multimedia workshop on Multimedia and securityRecently well-designed adaptive steganographic systems, including ±1 embedding in the DCT domain with optimized costs to achieve the minimal-distortion [8], have posed serious challenges to steganalyzers. Additionally, although the steganalysis of Yet ...
Steganalysis of YASS
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and securityIn this paper, we describe a method for attacking Yet Another Steganographic Scheme (YASS), which is designed to be a very secure JPEG steganographic algorithm. The success of YASS is attributed to its innovation in embedding, i.e., hiding data in ...
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis
Statistical steganalysis schemes detect the existence of secret information embedded by steganography. The x^2-detection and Regular-Singular (RS)-attack methods are two well-known statistical steganalysis schemes used against LSB (least significant bit)...
Comments