skip to main content
10.1145/3102304.3109814acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

Steganalysis Using LSB-Focused Statistical Features

Published:19 July 2017Publication History

ABSTRACT

In this paper, we present an image steganalysis model with a new texture feature set that is designed to take into consideration the pattern of embedding locations in a cover image. The chosen feature set in based on statistical texture features of images including gray level co-occurrence matrix (GLCM), Entropy, and additional statistical image features that can discriminate between clean and stego images. The guiding principle in choosing the feature set elements is that steganography techniques embed secret data in the right half-byte of an image's bytes, the least significant bits, to avoid perceptible visual distortion that can result from embedding in the left half-bytes. Therefore, the proposed features are applied to 2-LSB, 3-LSB and 4-LSB bit planes of a cover image as well as the full-bytes. For the experimental work, the grayscale single-channel image format was chosen for cover images, and we used the public BossBase1.01 dataset which consists of 10,000 PGM images. The selected classifier was the Support Vector Machine algorithm as implemented in MATLAB. Embedding of data in the cover images was based on 2LSB and 4LSB spatial domain schemes. The feature vectors of clean images, 2LSB stego images and 4LSB stego images, 10,000 each, were analyzed. The detection accuracy results of the validation phase was 99.41% for the combined clean and 4LSB images, and 99.02% for the clean and 2LSB stego images. The paper ends with conclusion and suggestions for applying the proposed model to multi-channel images, and for dealing with alternative steganography schemes.

References

  1. Schaathun, H. G. 2012. Machine Learning in Image Steganalysis, Wiley-IEEE Press, 1st edition. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Kaur, M. and Kaur, G. 2014. Review of Various Steganalysis Techniques, International Journal of Computer Science and Information Technologies, Vol.5 (2).Google ScholarGoogle Scholar
  3. Pevný, T., Fredrich, J. and Ker, A. D. 2008. Novelty Detection in Blind Steganalysis, Proc. ACM Multimedia and Security Workshop, Oxford, UK, September 22-23, pp. 167--176. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Pevný, T., Fredrich, J. and Ker, A. D. 2011. From Blind to Quantitative Steganalysis, IEEE Trans. on Info. Forensics and Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Liu, Q. and Chen, Q. 2014. Improved Approaches with Calibrated Neighboring joint density to Steganalysis and Seam-carved Forgery Detection in JPEG images", ACM Transactions on Intelligent Systems and Technology, 5(4), article 63. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Aljarf, A., Amin, S., Fillipas, j. and Shuttelworth, J. 2016. The Development of an Image Detection System Based on the Extraction of Colour Gradient Cooccurrence Matrix (CGCM) Features, Dese2016 Conference, UK.Google ScholarGoogle Scholar
  7. Haralick R.M., Dinstein I, S. K. 1973. Textural Features for Image Classification. IEEE Transactions on Systems, Man, and Cybernetics, 3: 610--621.Google ScholarGoogle ScholarCross RefCross Ref
  8. Aljarf, A., Amin, S., Fillipas, j. and Shuttelworth, J. 2013. Develop a Detection System for Grey and Colour Stego Images, International Journal of Modeling and Optimization, Vol. 3, No. 5.Google ScholarGoogle Scholar
  9. Dalal, N. and Triggs, B. 2005. Histograms of Oriented Gradients for Human Detection, 9th European Conference on Computer Vision. San Diego, CA.Google ScholarGoogle Scholar
  10. Mikolajczyk K, and Schmid, C. 2005. A Performance Evaluation of Local Descriptors. IEEE Transactions on Pattern Analysis and Machine Intelligence 29: 1615--1630. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Tuzel O., Porikli, F., and Meer, P. 2006. Region Covariance: A Fast Descriptor for Detection and Classification. 9th European Conference on Computer Vision. 589--600. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Ojala, T., Pietikainen, M, and Maeenpaa, T. 2002. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns. IEEE Transactions on Pattern Analysis and Machine Intelligence 24: 971--987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Gong, R., and Wang, H. 2012. Steganalysis for GIF Images Based on Colors-Gradient Co-occurrence Matrix. Optics Communications 285: 4961--1965.Google ScholarGoogle ScholarCross RefCross Ref
  14. Ker, A. D. 2004. Improved Detection of LSB Steganography in Grayscale Images, International Workshop on Information Hiding, IH 2004, pp 97--115 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Pevný, T. BOSSBASE1.01 Grayscale Database, DOI= http://agents.fel.cvut.cz/stegodata/PGMs/downloaded on 2/1/2017.Google ScholarGoogle Scholar
  16. Franzen, R. Kodak Lossless True Color Image Suite, DOI= http://www.r0k.us/graphics/kodak/downloaded on 2/1/2017Google ScholarGoogle Scholar
  17. Gonzalez, R. C. and Woods, R. E. 2017. Digital Image Processing, 4th ed., Prentice HallGoogle ScholarGoogle Scholar
  18. Al-Jarrah, M. 2017. "Grayscale Steganalysis Features Dataset, Mendeley Data, v1.Google ScholarGoogle Scholar

Index Terms

  1. Steganalysis Using LSB-Focused Statistical Features

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed Systems
        July 2017
        325 pages
        ISBN:9781450348447
        DOI:10.1145/3102304

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 19 July 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader