Steganalysis of perturbed quantization steganography based on the enhanced histogram features
详细信息    查看全文
  • 作者:Xiaofeng Song ; Fenlin Liu ; Xiangyang Luo ; Jicang Lu…
  • 关键词:perturbed quantization steganography ; steganalysis ; histogram feature ; detection accuracy
  • 刊名:Multimedia Tools and Applications
  • 出版年:2015
  • 出版时间:December 2015
  • 年:2015
  • 卷:74
  • 期:24
  • 页码:11045-11071
  • 全文大小:2,458 KB
  • 参考文献:1.Avcibas I, Kharrazi M, Memon N, Sankur B (2005) Image Steganalysis with Binary Similarity Measures. EURASIP Journal on Applied Signal Processing 17:2749鈥?757CrossRef
    2.Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90(3):727鈥?52MATH CrossRef
    3.Chen C, Shi Y Q (2008) JPEG image steganalysis utilizing both intrablock and interblock correlations. Proceedings of IEEE International Symposium Circuits and Systems, Seattle, WA. 18鈥?1 May, pp. 3029鈥?032
    4.Fridrich J (2004) Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Proceedings of 6th International Workshop Information Hiding, Toronto, ON, Canada. 23鈥?5 May, pp. 67鈥?1
    5.Fridrich J, Goljan M, and Soukal D (2004). Perturbed quantization steganography using wet paper codes. Proceedings of the 6th ACM Multimedia and Security Workshop. Magdeburg, Germany, 20-21 September, pp 4-15
    6.Fridrich J, GoljanM SD (2005) Perturbed quantization steganography. ACM Multimedia Security Journal 11(2):98鈥?07CrossRef
    7.Fridrich J, Pevn媒 T, Kodovsk媒 J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. Proceedings of 9th ACM Multimedia and Security Workshop, Dallas, TX, 20-21 September, pp. 3鈥?4
    8.G眉l G, Dirik AE, Avc谋bas I (2007) Steganalytic Features for JPEG Compression-Based Perturbed Quantization. IEEE Signal Processing Letters 14(3):205鈥?08CrossRef
    9.Jsteg, http://鈥媧ooid.鈥媜rg/鈥媝aul/鈥媍rypto/鈥媕steg/鈥?/span>
    10.Kharrazi M, Sencar HT, Memon N (2006) Performance study of common image steganography and steganalysis techniques. Journal of Electronic Imaging 15(4):041104.1鈥?6
    11.Kim Y, Duric Z, Richards D (2006) Modified matrix encoding technique for minimal distortion steganography. Proceedings of 8th International. Workshop Information Hiding, Alexandria VA. 10鈥?2 July, pp. 314鈥?27
    12.Kodovsk媒 J, Fridrich J (2009) Calibration revisited. Proceedings of 11th ACM Workshop Multimedia and Security, Princeton, NJ, 7鈥? September, pp. 63鈥?4
    13.Kodovsk媒 J, Fridrich J (2012) Steganalysis of JPEG images using rich models. Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, vol. 8303, San Francisco, CA. 23-25 January, pp. 0A 1鈥?3
    14.Kodovsk媒 J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2):432鈥?44CrossRef
    15.Liu Q Z (2011). Steganalysis of DCT-embedding based adaptive steganography and YASS. Proceedings of the 13th ACM Multimedia and Security Workshop. Buffalo, NY, 29-30 September, pp. 77鈥?6
    16.Luo X Y, Wang D S, Wang P, Liu F L(2008). A review on blind detection for image steganography. Signal Processing, 88(9):2138鈥?157
    17.Lyu S, Farid H (2006) Steganalysis using higher order image statistics. IEEE Transactions on Information Forensics and Security 1(1):111鈥?19CrossRef
    18.Pevn媒 T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security 5(2):215鈥?24CrossRef
    19.Pevn媒 T, Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis. Proceedings of Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA. January 28, pp. 1鈥?3
    20.Provos N (2001) Defending against statistical steganalysis. Proceedings of 10th Usenix Security Symposium, Washington DC. 13鈥?7 August, pp. 323鈥?35
    21.Sallee P (2003) Model-based steganography. Proceedings of 2nd Int. Workshop Digital Watermarking, Seoul, Korea. 20鈥?2 October, pp. 154鈥?67
    22.Sallee P (2005) Model-based methods for steganography and steganalysis. International Journal of Image Graphics 5(1):167鈥?90CrossRef
    23.Shi Y Q, Chen C, Chen W (2006) A Markov process based approach to effective attacking JPEG steganography. Proceedings of 8th International Workshop Information Hiding Workshop, Old Town Alexandria, VA. 10鈥?2 July, pp. 249鈥?64
    24.Westfeld A (2001) High capacity despite better steganalysis (F5鈥揂 steganographic algorithm). Proceedings of 4th International Workshop on Information Hiding, Pittsburgh, PA. 25鈥?7 April, pp. 289鈥?02
  • 作者单位:Xiaofeng Song (1) (2)
    Fenlin Liu (1) (2)
    Xiangyang Luo (1) (2)
    Jicang Lu (1) (2)
    Yi Zhang (1) (2)

    1. Zhengzhou Information Science and Technology Institute, Zhengzhou, Henan, 450001, People鈥檚 Republic of China
    2. State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, 450001, People鈥檚 Republic of China
  • 刊物类别:Computer Science
  • 刊物主题:Multimedia Information Systems
    Computer Communication Networks
    Data Structures, Cryptology and Information Theory
    Special Purpose and Application-Based Systems
  • 出版者:Springer Netherlands
  • ISSN:1573-7721
文摘
In this paper, the enhanced histogram features are proposed for detecting perturbed quantization (PQ) steganography applied to double-compression JPEG image. Firstly, the principle of PQ steganography is analyzed and the special positions for feature extraction are determined. Secondly, the changes of the global, local and dual histogram features are analyzed for PQ embedding, and then these histogram features are extracted from the DCT coefficients at the special positions. Thirdly, to improve the effectiveness and diversity of steganalysis feature, the three kinds of histogram features are also extracted from DCT coefficients difference. Lastly, all the histogram features are calibrated and combined as the enhanced histogram features, and the ensemble classifier is employed to obtain detection results. The experimental results show the proposed feature can improve the detection accuracy for PQ and PQt; for PQe, it can obtain approximate detection accuracy with Cartesian-calibrated JPEG rich model (CC-JRM), but the feature dimensionality is far below CC-JRM. Keywords perturbed quantization steganography steganalysis histogram feature detection accuracy

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700