skip to main content
10.1145/2482513.2482528acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Embedding change rate estimation based on ensemble learning

Published: 17 June 2013 Publication History

Abstract

In order to achieve higher estimation accuracy of the embedding change rate of a stego object, an ensemble learning-based estimation method is presented. First of all, a framework of embedding change rate estimation based on estimator ensemble is proposed. Then an algorithm of building the estimator ensemble, the core of the framework, is concretely described. Finally, a pruning method for estimator ensemble is proposed in consideration of both the diversity among the base estimators and accuracy of each of them. The experimental results for three modern steganographic algorithms (nsF5, PQ and PQt) indicate that the proposed method acquired better performance than the existed typical method. Furthermore, the pruned estimator ensemble with less base estimators maintained, even slightly improved the estimation accuracy, compared to the one without purning.

References

[1]
R. E. Banfield, L. O. Hall, K. W. Bowyer, and W. P. Kegelmeyer. Ensemble diversity measures and their application to thinning. Information Fusion, 6(1):49--62, 2005.
[2]
P. Bas, T. Filler, and T. Pevný. Break our steganographic system -- the ins and outs of organizing boss. In T. Filler, T. Pevný, S. Craver, and A. Ker, editors, Information Hiding, 13th International Workshop, volume 6958 of Lecture Notes in Computer Science, pages 59--70, Prague, Czech Republic, May 18--20, 2011. Springer.
[3]
R. Caruana, A. Niculescu-Mizil, G. Crew, and A. Ksikes. Ensemble selection from libraries of models. In Proceedings of the twenty-first international conference on Machine learning, pages 18--26. ACM, 2004.
[4]
C.-C. Chang and C.-J. Lin. LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology, 2:27:1--27:27, 2011. Software available at http://www.csie.ntu.edu.tw/ cjlin/libsvm.
[5]
T. Dietterich. An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and randomization. Machine learning, 40(2):139--157, 2000.
[6]
S. Dumitrescu, X. Wu, and Z. Wang. Detection of lsb steganography via sample pair analysis. In F. Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 355--372, Noordwijkerhout, The Netherlands, October 7--9, 2003. Springer.
[7]
B. Efron and R. Tibshirani. An introduction to the bootstrap, volume 57. Chapman & Hall/CRC, 1994.
[8]
T. Filler and J. Fridrich. Design of adaptive steganographic schemes for digital images. Proceedings of Media Watermarking, Security and Forensics III, SPIE, 7880:78800F--1, 2011.
[9]
J. Fridrich, M. Goljan, and R. Du. Detecting lsb steganography in color, and gray-scale images. Multimedia, IEEE, 8(4):22--28, 2001.
[10]
J. Fridrich, M. Goljan, and D. Soukal. Perturbed quantization steganography. Multimedia Systems, 11(2):98--107, 2005.
[11]
J. Fridrich, T. Pevný, and J. Kodovský. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In Proceedings of the 9th workshop on Multimedia & security, pages 3--14. ACM, 2007.
[12]
G. Fumera and F. Roli. A theoretical and experimental analysis of linear combiners for multiple classifier systems. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 27(6):942--956, 2005.
[13]
T. Ho. The random subspace method for constructing decision forests. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 20(8):832--844, 1998.
[14]
J. Kodovský and J. Fridrich. Calibration revisited. In Proceedings of the 11th ACM Multimedia & Security Workshop, pages 63--74. Princeton, NJ, 2009.
[15]
J. Kodovský and J. Fridrich. Steganalysis of jpeg images using rich models. In IS&T/SPIE Electronic Imaging, pages 83030A--83030A. International Society for Optics and Photonics, 2012.
[16]
J. Kodovský, J. Fridrich, and V. Holub. Ensemble classifiers for steganalysis of digital media. Information Forensics and Security, IEEE Transactions on, 7(2):432--444, 2012.
[17]
L. Kuncheva, C. Whitaker, C. Shipp, and R. Duin. Limits on the majority vote accuracy in classifier fusion. Pattern Analysis & Applications, 6(1):22--31, 2003.
[18]
N. Li, Y. Yu, and Z. Zhou. Diversity regularized ensemble pruning. In Machine Learning and Knowledge Discovery in Databases, volume 7523 of Lecture Notes in Computer Science, pages 330--345, Bristol, UK, September 2012. Springer.
[19]
W. Luo, F. Huang, and J. Huang. Edge adaptive image steganography based on lsb matching revisited. Information Forensics and Security, IEEE Transactions on, 5(2):201--214, 2010.
[20]
T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In R. Böhme, P. W. Fong, and R. Safavi-Naini, editors, Information Hiding, 12th International Conference, volume 6387 of Lecture Notes in Computer Science, pages 161--177, Calgary, AB, Canada, June 28--30, 2010. Springer.
[21]
T. Pevný and J. Fridrich. Merging markov and dct features for multi-class jpeg steganalysis. Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, 6505:3, 2007.
[22]
T. Pevný, J. Fridrich, and A. Ker. From blind to quantitative steganalysis. Information Forensics and Security, IEEE Transactions on, 7(2):445--454, 2012.
[23]
A. Smola and B. Schölkopf. A tutorial on support vector regression. Statistics and computing, 14(3):199--222, 2004.
[24]
A. Westfeld. Generic adoption of spatial steganalysis to transformed domain. In K. Solanki, K. Sullivan, and U. Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 161--177, Santa Barbara, CA, USA, May 19--21, 2008. Springer.
[25]
Z. Zhou. Ensemble Methods: Foundations and Algorithms. Chapman & Hall, 2012.
[26]
Z. Zhou, J. Wu, and W. Tang. Ensembling neural networks: many could be better than all. Artificial intelligence, 137(1):239--263, 2002.

Cited By

View all
  • (2020)Selection of Robust and Relevant Features for 3-D SteganalysisIEEE Transactions on Cybernetics10.1109/TCYB.2018.288308250:5(1989-2001)Online publication date: May-2020
  • (2018)3D Steganalysis Using the Extended Local Feature Set2018 25th IEEE International Conference on Image Processing (ICIP)10.1109/ICIP.2018.8451643(1683-1687)Online publication date: Oct-2018
  • (2018)3D Steganalysis Using Laplacian Smoothing at Various LevelsCloud Computing and Security10.1007/978-3-030-00021-9_21(223-232)Online publication date: 26-Sep-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IH&MMSec '13: Proceedings of the first ACM workshop on Information hiding and multimedia security
June 2013
242 pages
ISBN:9781450320818
DOI:10.1145/2482513
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 June 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. embedding change
  2. ensemble learning
  3. ensemble pruning
  4. quantitative steganalysis
  5. steganography

Qualifiers

  • Research-article

Conference

IH&MMSec '13
Sponsor:

Acceptance Rates

IH&MMSec '13 Paper Acceptance Rate 27 of 74 submissions, 36%;
Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Selection of Robust and Relevant Features for 3-D SteganalysisIEEE Transactions on Cybernetics10.1109/TCYB.2018.288308250:5(1989-2001)Online publication date: May-2020
  • (2018)3D Steganalysis Using the Extended Local Feature Set2018 25th IEEE International Conference on Image Processing (ICIP)10.1109/ICIP.2018.8451643(1683-1687)Online publication date: Oct-2018
  • (2018)3D Steganalysis Using Laplacian Smoothing at Various LevelsCloud Computing and Security10.1007/978-3-030-00021-9_21(223-232)Online publication date: 26-Sep-2018
  • (2017)Rethinking the high capacity 3D steganography: Increasing its resistance to steganalysis2017 IEEE International Conference on Image Processing (ICIP)10.1109/ICIP.2017.8296333(510-414)Online publication date: Sep-2017
  • (2016)Selection of robust features for the Cover Source Mismatch problem in 3D steganalysis2016 23rd International Conference on Pattern Recognition (ICPR)10.1109/ICPR.2016.7900302(4256-4261)Online publication date: Dec-2016
  • (2016)3D mesh steganalysis using local shape features2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)10.1109/ICASSP.2016.7472056(2144-2148)Online publication date: Mar-2016
  • (2012)3D Mesh SteganographyTriangle Mesh Watermarking and Steganography10.1007/978-981-19-7720-6_4(109-143)Online publication date: 24-Feb-2012
  • (undefined)Harsanyi Solutions in Line-Graph GamesSSRN Electronic Journal10.2139/ssrn.455100
  • (undefined)Nominal Rigidities and the Dynamic Effects of a Shock to Monetary PolicySSRN Electronic Journal10.2139/ssrn.284956
  • (undefined)Takeovers, Freezeouts, and Risk ArbitrageSSRN Electronic Journal10.2139/ssrn.277109
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media