降低特征类内离散度的JPEG图像隐写分析
收稿日期: 2017-09-24
修回日期: 2018-04-10
网络出版日期: 2019-01-31
基金资助
国家自然科学基金(No.61602511,No.61572518,No.U1636202)资助
Steganalysis of JPEG Images Based on Reducing Between-Class Scatter
Received date: 2017-09-24
Revised date: 2018-04-10
Online published: 2019-01-31
汪然, 牛少彰, 平西建, 张涛, 桑晓丹 . 降低特征类内离散度的JPEG图像隐写分析[J]. 应用科学学报, 2019 , 37(1) : 41 -50 . DOI: 10.3969/j.issn.0255-8297.2019.01.005
Compared with the process of embedding, image contents make a more significant impact on the differences of image statistical characteristics. This makes the image steganalysis to be a classification problem with bigger within-class scatter distances and smaller between-class scatter distances. In this paper, a new steganalysis framework which can reduce the differences of image statistical characteristics caused by various content and processing methods is proposed. The given images are classified according to the texture complexity. Steganalysis features are separately extracted from each subset with the same or close complexity evaluation function to build a classifier. The theoretical analysis and experimental results can demonstrate the validity of the proposed framework.
[1] Pevný T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis[C]//Proceedings of SPIE, 2007, 6505:650503.
[2] Kodovský J, Feideich J. Calibration revisited[C]//Proceedings of ACM Workshop Multimedia and Security. Princeton, New Jersey, 2009:63-74.
[3] Pevný T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix[J]. IEEE Transaction on Information Forensics and Security, 2010, 5(2):215-224.
[4] Liu Q. Steganalysis of DCT-embedding based adaptive steganography and YASS[C]//Proceedings of 13th ACM Multimedia & Security Workshop. New York, ACM, 2011:77-86.
[5] Goljan M, Fridrich J, Holotyak T. New blind steganalysis and its implications[C]//Proceedings of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia. San Jose, CA, 2006:1-13.
[6] Wang Y, Moulin P. Optimized feature extraction for learning based image steganalysis[J]. IEEE Transaction on Information Forensics and Security, 2007, 2(1):31-45.
[7] Kodovský J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transaction on Information Forensics and Security, 2012, 7(2):432-444.
[8] Kodovský J, Fridrich J. Steganalysis of JPEG images using rich models[C]//Proceedings of SPIE, 2012, 8303:83030A.
[9] Holub V, Fridrich J, Denemark T. Random projections of residuals as an alternative to cooccurrences in steganalysis[C]//Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics. San Francisco, CA, 2013:3-7.
[10] Cho S, Cha B, Gawecki M, Kuo C. Block-based image steganalysis:algorithm and performance evaluation[J]. Journal of Visual Communication and Image Representation, 2013, 24(7):846-856.
[11] Wang R, Xu M, Ping X, Zhang T. Steganalysis of JPEG images by block texture based segmentation[J]. Multimedia Tools Application, 2015, 74(15):5725-5746.
[12] 汪然,许漫坤,平西建,张涛. 基于分割的空域图像隐写分析[J]. 自动化学报,2014, 40(12):2936-2943. Wang R, Xu M K, Ping X J, Zhang T. Steganalysis of spatial images based on segmentation[J]. Acta Automatica Sinica, 2014, 40(12):2936-2943. (in Chinese)
[13] Fisher R A. The use of multiple measurements in taxonomic problems[J]. Annals of Eugenics, 1936, 7(2):179-188.
[14] Filler T, Pevný T, Bas P. BOSS[EB/OL].[2007-07-01]. http://boss.gipsa-lab.grenobleinp.fr/BOSSRank/.
[15] Bas P, Furon T. Bows-2[EB/OL].[2007-07-01]. http://bows2.gipsa-lab.inpg.fr/BOWS2OrigEp3.tgz.
[16] Goljan M, Fridrich J, Holotyak T. The USDA NRCS Photo Gallery[EB/OL].[2008-09-14]. http://photogallery.nrcs.usda.gov.
[17] Schaefer G, Stich M. UCID-an uncompressed colour image database[R]. UK:Nottingham Trent University, 2003.
[18] Fridrich J, Pevný T, Kodovský J. Statistically undetectable JPEG steganography:dead ends, challenges, and opportunities[C]//Proceedings of ACM Multimedia and Security Workshop. Texas, 2007:3-14.
[19] Westfeld A. High capacity despite better steganalysis (F5-a steganographic algorithm)[C]//Proceedings of 4th International Workshop on Information Hiding. Pittsburgh, PA, 2001:289-302.
[20] Sallee P. Model-based steganography[C]//Proceedings of International Workshop on Digital Watermarking. Seoul, Korea, 2003:154-167.
[21] Kim Y, Duric Z, Richards D. Modified matrix encoding technique for minimal distortion steganography[C]//Proceedings of International Workshop on Information Hiding. Heidelberg, 2007:314-327.
/
| 〈 |
|
〉 |