skip to main content
10.1145/2756601.2756608acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters

Authors Info & Claims
Published:17 June 2015Publication History

ABSTRACT

Adaptive JPEG steganographic schemes are difficult to preserve the image texture features in all scales and orientations when the embedding changes are constrained to the complicated texture regions, then a steganalysis feature extraction method is proposed based on 2 dimensional (2D) Gabor filters. The 2D Gabor filters have certain optimal joint localization properties in the spatial domain and in the spatial frequency domain. They can describe the image texture features from different scales and orientations, therefore the changes of image statistical characteristics caused by steganography embedding can be captured more effectively. For the proposed feature extraction method, the decompressed JPEG image is filtered by 2D Gabor filters with different scales and orientations firstly. Then, the histogram features are extracted from all the filtered images.Lastly, the ensemble classifier is used to assemble the proposed steganalysis feature as well as the final steganalyzer. The experimental results show that the proposed steganalysis feature can achieve a competitive performance by comparing with the other steganalysis features when they are used for the detection performance of adaptive JPEG steganography such as UED, JUNIWARD and SI-UNIWARD.

References

  1. P. Bas, T. Filler, and T. Pevny. "break our steganographic system": The ins and outs of organizing boss. In Information Hiding, pages 59--70. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. G. Daugman. Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters. JOSA A, 2(7):1160--1169, 1985.Google ScholarGoogle Scholar
  3. T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich. Selection-channel-aware rich model for steganalysis of digital images. In IEEE Workshop on Information Forensic and Security, Atlanta, GA, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  4. T. Filler and J. Fridrich. Design of adaptive steganographic schemes for digital images. In IS&T/SPIE Electronic Imaging, pages 78800F--78800F. International Society for Optics and Photonics, 2011.Google ScholarGoogle Scholar
  5. T. Filler, J. Judas, and J. Fridrich. Minimizing additive distortion in steganography using syndrome-trellis codes. Information Forensics and Security, IEEE Transactions on, 6(3):920--935, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal. Writing on wet paper. Signal Processing, IEEE Transactions on, 53(10):3923--3935, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Fridrich, M. Goljan, and D. Soukal. Perturbed quantization steganography. Multimedia Systems, 11(2):98--107, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Fridrich and J. Kodovsky. Rich models for steganalysis of digital images. Information Forensics and Security, IEEE Transactions on, 7(3):868--882, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Fridrich, T. Pevny, and J. Kodovsky. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In Proceedings of the 9th workshop on Multimedia & security, pages 3--14. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. E. Grigorescu, N. Petkov, and P. Kruizinga. Comparison of texture features based on gabor filters. Image Processing, IEEE Transactions on, 11(10):1160--1167, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. L. Guo, J. Ni, and Y.-Q. Shi. An efficient jpeg steganographic scheme using uniform embedding. In WIFS, pages 169--174, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  12. V. Holub and J. Fridrich. Digital image steganography using universal distortion. In Proceedings of the first ACM workshop on Information hiding and multimedia security, pages 59--68. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. V. Holub and J. Fridrich. Random projections of residuals for digital image steganalysis. Information Forensics and Security, IEEE Transactions on, 8(12):1996--2006, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. V. Holub and J. Fridrich. Low complexity features for jpeg steganalysis using undecimated dct. Information Forensics and Security, IEEE Transactions on, 10(2):219--228, 2015.Google ScholarGoogle Scholar
  15. V. Holub and J. Fridrich. Phase-aware projection model for steganalysis of jpeg images. Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XVII, to appear, San Francisco, CA, 2015.Google ScholarGoogle Scholar
  16. Y. Kim, Z. Duric, and D. Richards. Modified matrix encoding technique for minimal distortion steganography. In Information hiding, pages 314--327. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Kodovsky and J. Fridrich. Steganalysis of jpeg images using rich models. In IS&T/SPIE Electronic Imaging, pages 83030A--83030A. International Society for Optics and Photonics, 2012.Google ScholarGoogle Scholar
  18. J. Kodovsky, J. Fridrich, and V. Holub. On dangers of overtraining steganography to incomplete cover model. In Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, pages 69--76. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Kodovsky, J. Fridrich, and V. Holub. Ensemble classifiers for steganalysis of digital media. Information Forensics and Security, IEEE Transactions on, 7(2):432--444, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. T. Pevny and J. Fridrich. Merging markov and dct features for multi-class jpeg steganalysis. In Electronic Imaging 2007, pages 650503--650503. International Society for Optics and Photonics, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  21. N. Provos. Defending against statistical steganalysis. In Usenix Security Symposium, volume 10, pages 323--336, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. P. Sallee. Model-based steganography. In Digital watermarking, pages 154--167. Springer, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  23. X. Song, F. Liu, X. Luo, J. Lu, and Y. Zhang. Steganalysis of perturbed quantization steganography based on the enhanced histogram features. Multimedia Tools and Applications, pages 1--27, 2014.Google ScholarGoogle Scholar
  24. C. Wang and J. Ni. An efficient jpeg steganographic scheme based on the block entropy of dct coefficients. In Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on, pages 1785--1788. IEEE, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  25. A. Westfeld. F5-a steganographic algorithm. In Information hiding, pages 289--302. Springer, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IH&MMSec '15: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security
      June 2015
      182 pages
      ISBN:9781450335874
      DOI:10.1145/2756601

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 June 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      IH&MMSec '15 Paper Acceptance Rate20of45submissions,44%Overall Acceptance Rate128of318submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader