ABSTRACT
In this paper, we propose a method for normalization of rich feature sets to improve detection accuracy of simple classifiers in steganalysis. It consists of two steps: 1) replacing random subsets of empirical joint probability mass functions (co-occurrences) by their conditional probabilities and 2) applying a non-linear normalization to each element of the feature vector by forcing its marginal distribution over covers to be uniform. We call the first step random conditioning and the second step feature uniformization. When applied to maxSRMd2 features in combination with simple classifiers, we observe a gain in detection accuracy across all tested stego algorithms and payloads. For better insight, we investigate the gain for two image formats. The proposed normalization has a very low computational complexity and does not require any feedback from the stego class.
- P. Bas, T. Filler, and T. Pevný. 2011. Break Our Steganographic System -- the Ins and Outs of Organizing BOSS. In Information Hiding, 13th International Conference (Lecture Notes in Computer Science), T. Filler, T. Pevny, A. Ker, and S. Craver (Eds.), Vol. 6958. Prague, Czech Republic, 59--70. Google ScholarDigital Library
- M. Boroumand and J. Fridrich. 2016. Boosting Steganalysis with Explicit Feature Maps. In 4th ACM IH&MMSec. Workshop, F. Perez-Gonzales, F. Cayre, and P. Bas (Eds.). Vigo, Spain. Google ScholarDigital Library
- R. Cogranne and J. Fridrich. 2015. Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory. IEEE Transactions on Information Forensics and Security 10, 2 (December 2015), 2627-- 2642.Google ScholarCross Ref
- R. Cogranne, V. Sedighi, T. Pevny, and J. Fridrich. 2015. Is Ensemble Classifier Needed for Steganalysis in High-Dimensional Feature Spaces?. In IEEE International Workshop on Information Forensics and Security. Rome, Italy.Google Scholar
- T. Denemark, M. Boroumand, and J. Fridrich. 2016. Steganalysis Features for Content-Adaptive JPEG Steganography. IEEE Transactions on Information Forensics and Security 11, 8 (Aug 2016), 1736--1746.Google ScholarDigital Library
- T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich. 2014. Selection- Channel-Aware Rich Model for Steganalysis of Digital Images. In IEEE International Workshop on Information Forensics and Security. Atlanta, GA.Google Scholar
- J. Fridrich and J. Kodovský. 2011. Rich Models for Steganalysis of Digital Images. IEEE Transactions on Information Forensics and Security 7, 3 (June 2011), 868--882. Google ScholarDigital Library
- M. Goljan, R. Cogranne, and J. Fridrich. 2014. Rich Model for Steganalysis of Color Images. In Sixth IEEE International Workshop on Information Forensics and Security. Atlanta, GA.Google Scholar
- L. Guo, J. Ni, and Y.-Q. Shi. 2012. An Efficient JPEG Steganographic Scheme Using Uniform Embedding. In Fourth IEEE InternationalWorkshop on Information Forensics and Security. Tenerife, Spain.Google Scholar
- L. Guo, J. Ni, and Y. Q. Shi. 2014. Uniform Embedding for Efficient JPEG Steganography. IEEE Transactions on Information Forensics and Security 9, 5 (2014). Google ScholarDigital Library
- V. Holub and J. Fridrich. 2012. Designing Steganographic Distortion Using Directional Filters. In Fourth IEEE InternationalWorkshop on Information Forensics and Security. Tenerife, Spain.Google Scholar
- V. Holub and J. Fridrich. 2013. Random Projections of Residuals for Digital Image Steganalysis. IEEE Transactions on Information Forensics and Security 8, 12 (December 2013), 1996--2006. Google ScholarDigital Library
- V. Holub and J. Fridrich. 2015. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT. IEEE Transactions on Information Forensics and Security 10, 2 (Feb 2015), 219--228.Google ScholarDigital Library
- V. Holub and J. Fridrich. 2015. Phase-Aware Projection Model for Steganalysis of JPEG Images. In Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015, A. Alattar and N. D. Memon (Eds.), Vol. 9409. San Francisco, CA.Google Scholar
- V. Holub, J. Fridrich, and T. Denemark. 2014. Universal Distortion Design for Steganography in an Arbitrary Domain. EURASIP Journal on Information Security, Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop 2014:1 (2014).Google Scholar
- K. Jarrett, K. Kavukcuoglu, M. Ranzato, and Y. LeCun. 2009. What is the best Multi-Stage Architecture for Object Recognition?. In 2009 IEEE 12th International Conference on Computer Vision. Kyoto, Japan, 2146--2153.Google Scholar
- J. Kodovský, J. Fridrich, and V. Holub. 2012. Ensemble Classifiers for Steganalysis of Digital Media. IEEE Transactions on Information Forensics and Security 7, 2 (2012), 432--444. Google ScholarDigital Library
- A. Krizhevsky, I. Sutskever, and G. E. Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In Proceedings of Neural Information Processing Systems (NIPS). Lake Tahoe, Nevada. Google ScholarDigital Library
- J. E. Lennard-Jones. 1924. On the Determination of Molecular Fields. Proc. R. Soc. Lond. A 106, 738 (1924), 463--477.Google ScholarCross Ref
- B. Li, M. Wang, and J. Huang. 2014. A new cost function for spatial image steganography. In Proceedings IEEE, International Conference on Image Processing, ICIP. Paris, France.Google Scholar
- S. Lyu and E. Simoncelli. 2008. Nonlinear image representation using divisive normalization. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR).Google Scholar
- F. Perronnin, J. Sanchez, and Yan Liu. 2010. Large-scale image categorization with explicit data embedding. In Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on. 2297--2304.Google ScholarCross Ref
- T. Pevny, P. Bas, and J. Fridrich. 2010. Steganalysis by Subtractive Pixel Adjacency Matrix. IEEE Transactions on Information Forensics and Security 5, 2 (June 2010), 215--224. Google ScholarDigital Library
- T. Pevny, T. Filler, and P. Bas. 2010. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. In Information Hiding, 12th International Conference (Lecture Notes in Computer Science), R. Böhme and R. Safavi-Naini (Eds.), Vol. 6387. Springer-Verlag, New York, Calgary, Canada, 161--177. Google ScholarDigital Library
- T. Pevny and J. Fridrich. 2007. Merging Markov and DCT Features for Multi-Class JPEG Steganalysis. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, E. J. Delp and P. W. Wong (Eds.), Vol. 6505. San Jose, CA, 3 1--14.Google Scholar
- N. Pinto, D. D. Cox, and J. J. DiCarlo. 2008. Why is real-world visual object recognition hard? PLOS Computational Biology (January 25 2008).Google Scholar
- V. Sedighi, R. Cogranne, and J. Fridrich. 2016. Content-Adaptive Steganography by Minimizing Statistical Detectability. IEEE Transactions on Information Forensics and Security 11, 2 (2016), 221--234.Google ScholarDigital Library
- Y. Q. Shi, C. Chen, and W. Chen. 2006. A Markov Process Based Approach to Effective Attacking JPEG Steganography. In Information Hiding, 8th International Workshop (Lecture Notes in Computer Science), J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee (Eds.), Vol. 4437. Springer-Verlag, New York, Alexandria, VA, 249--264. Google ScholarDigital Library
- X. Song, F. Liu, C. Yang, X. Luo, and Y. Zhang. 2015. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters. In 3rd ACM IH&MMSec. Workshop, P. Comesa na, J. Fridrich, and A. Alattar (Eds.). Portland, Oregon. Google ScholarDigital Library
- W. Tang, H. Li,W. Luo, and J. Huang. 2014. Adaptive Steganalysis AgainstWOW Embedding Algorithm. In 2nd ACM IH&MMSec. Workshop, A. Uhl, S. Katzenbeisser, R. Kwitt, and A. Piva (Eds.). Salzburg, Austria, 91--96. Google ScholarDigital Library
- W. Tang, H. Li, W. Luo, and J. Huang. 2016. Adaptive Steganalysis Based on Embedding Probabilities of Pixels. IEEE Transactions on Information Forensics and Security 11, 4 (April 2016), 734--745. Google ScholarDigital Library
- A. Vedaldi and A. Zisserman. 2012. Efficient Additive Kernels via Explicit Feature Maps. Pattern Analysis and Machine Intelligence, IEEE Transactions on 34, 3 (March 2012), 480--492. Google ScholarDigital Library
- D. Zou, Y. Q. Shi, W. Su, and G. Xuan. 2006. Steganalysis based on Markov model of thresholded prediction-error image. In Proceedings IEEE, International Conference on Multimedia and Expo. Toronto, Canada, 1365--1368.Google Scholar
Index Terms
- Nonlinear Feature Normalization in Steganalysis
Recommendations
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis
Statistical steganalysis schemes detect the existence of secret information embedded by steganography. The x^2-detection and Regular-Singular (RS)-attack methods are two well-known statistical steganalysis schemes used against LSB (least significant bit)...
Implementation of Least Significant Bit Steganography and statistical steganalysis
CCSEIT '12: Proceedings of the Second International Conference on Computational Science, Engineering and Information TechnologyLeast Significant Bit (LSB) Steganography is a method for hidden information in such a way that can only be detected by its intended recipient. Steganography in Digital media becomes a challenging discipline, since the Human Auditory System (HAS) is ...
Steganalysis of YASS
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and securityIn this paper, we describe a method for attacking Yet Another Steganographic Scheme (YASS), which is designed to be a very secure JPEG steganographic algorithm. The success of YASS is attributed to its innovation in embedding, i.e., hiding data in ...
Comments