收稿日期: 2015-08-17
修回日期: 2015-11-17
网络出版日期: 2016-11-30
基金资助
国家自然科学基金(No.61525203,No.61472235,No.61373151,No.U1536109);上海市曙光计划基金(No.14SG36);上海市优秀学术带头人计划基金(No.16XD1401200)资助
JPEG Steganalysis Based on LSB Detection and Enhanced Features
Received date: 2015-08-17
Revised date: 2015-11-17
Online published: 2016-11-30
郑国华, 冯国瑞, 余江, 程航, 张新鹏 . 基于LSB检测的JPEG隐写分析特征增强方法[J]. 应用科学学报, 2016 , 34(6) : 670 -676 . DOI: 10.3969/j.issn.0255-8297.2016.06.003
A method of feature enhancement based on detection of least significant bits of DCT coefficients is proposed to solve the problem of information loss due to truncation operation in the co-occurrence matrix. The DCT coefficient plane is calculated modulotwo to generate the least significant bit plane. Co-occurrence matrices are used to capture correlated features among neighboring coefficients of the least significant bit plane. To enhance the features for detection, Zigzag scan is used to produce a new DCT coefficient plane, and then a co-occurrence matrix is generated based on the new plane. A feature vector with 508 dimensions is extracted using the LIU method. Experimental results show that performance of the extended features is better than those of previous schemes.
Key words: LSB plane; JPEG steganalysis; Zigzag scan
[1] Westfeld A. F5a steganographic algorithm: high capacity despite better steganalysis [C]// Proceedings of the 4th International Workshop on Information Hiding, Pittsburgh 2001: 289-302.
[2] Provos N. Defending against statistical steganalysis [C]//Proceedings of the 10th USENIXSecurity Symposium. Washington DC 2001: 323-336.
[3] Sallee P. Model-based steganography [C]. Proceedings of International Workshop on Digital Watermarking. Springer-Verlag, LNCS 2939, 2004: 154-167.
[4] Fridrich J, PevnÝ T, KodovskÝ J. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities [C]//Proceedings of the 9th ACM Multimedia & Security Workshop. Texas, 2007: 3-14.
[5] Solanki K, Sarkar A, Manjunath B S. YASS: yet another steganographic scheme that resists blind steganalysis [C]//Proceedings of the 9th International Workshop on Information Hiding. Berlin, 2007: 16-31.
[6] Chen C, Shi Y Q. JPEG image steganalysis utilizing both intrablock and interblock correlations [C]//IEEE International Workshop on Circuits and Systems, 2008: 3029-3032.
[7] KodovskÝ J, Fridrich J. Calibration revisited [C]//Proceedings of the 11th ACM Multimedia & Security Workshop. New Jersey, 2009: 63-74.
[8] KodovskÝ J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444.
[9] Liu Q, Sung A H, Qiao M. Improved detection and evaluation for JPEG steganalysis [C]// Proceedings of the 17th ACM international conference on Multimedia. BeiJing, 2009: 873-876.
[10] Liu Q, Sung A H, Qiao M. Neighboring joint density-based JPEG steganalysis [J]. ACM Transactions on Intelligent Systems and Technology, 2011, 2(2): 16.
[11] Liu Q. Steganalysis of DCT-embedding based adaptive steganography and YASS [C]// Proceedings of the 13th ACM Multimedia & Security Workshop. New York, 2011: 77-86.
[12] Gul G, Kurugollu F. JPEG image steganalysis using multivariate PDF estimates with MRF cliques [J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3): 578-587.
[13] Holub V, Fridrich J. Low complexity features for jpeg steganalysis using undecimated DCT [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(2): 219-228.
/
| 〈 |
|
〉 |