信号与信息处理

降低特征类内离散度的JPEG图像隐写分析

展开
  • 1. 信息工程大学 信息系统工程学院, 郑州 450001;
    2. 北京邮电大学 计算机学院, 北京 100876;
    3. 解放军31401部队, 济南 250002
汪然,博士,讲师,研究方向:图像处理、多媒体信息安全,E-mail:nemo2007@163.com;牛少彰,教授,研究方向:信息安全,E-mail:szniu@bupt.edu.cn;平西建,教授,博导,研究方向:图像处理、信息安全,E-mail:pingxijian@163.com

收稿日期: 2017-09-24

  修回日期: 2018-04-10

  网络出版日期: 2019-01-31

基金资助

国家自然科学基金(No.61602511,No.61572518,No.U1636202)资助

Steganalysis of JPEG Images Based on Reducing Between-Class Scatter

Expand
  • 1. Institute of Information System and Engineering, Information Engineering University, Zhengzhou 450001, China;
    2. School of Computer Science & Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China;
    3. Troops 31401 PLA, Jinan 250002, China

Received date: 2017-09-24

  Revised date: 2018-04-10

  Online published: 2019-01-31

摘要

图像内容特征差异使得载体、载密图像的隐写检测特征混淆在一起而难以区分,这导致图像隐写分析成了一个"类内分散、类间聚合"的分类问题.针对此问题,从降低因图像内容、处理手段等造成的隐写检测特征类内离散度的角度出发,提出了一种更加可靠的隐写检测模型.依据内容复杂度将待检测图像分类,分别提取具有相同内容复杂度的每一类图像的隐写检测特征和训练分类器,得到最终检测结果.数据分析和实验结果表明:基于图像分类的隐写分析方法能够有效提高检测性能.

本文引用格式

汪然, 牛少彰, 平西建, 张涛, 桑晓丹 . 降低特征类内离散度的JPEG图像隐写分析[J]. 应用科学学报, 2019 , 37(1) : 41 -50 . DOI: 10.3969/j.issn.0255-8297.2019.01.005

Abstract

Compared with the process of embedding, image contents make a more significant impact on the differences of image statistical characteristics. This makes the image steganalysis to be a classification problem with bigger within-class scatter distances and smaller between-class scatter distances. In this paper, a new steganalysis framework which can reduce the differences of image statistical characteristics caused by various content and processing methods is proposed. The given images are classified according to the texture complexity. Steganalysis features are separately extracted from each subset with the same or close complexity evaluation function to build a classifier. The theoretical analysis and experimental results can demonstrate the validity of the proposed framework.

参考文献

[1] Pevný T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis[C]//Proceedings of SPIE, 2007, 6505:650503.
[2] Kodovský J, Feideich J. Calibration revisited[C]//Proceedings of ACM Workshop Multimedia and Security. Princeton, New Jersey, 2009:63-74.
[3] Pevný T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix[J]. IEEE Transaction on Information Forensics and Security, 2010, 5(2):215-224.
[4] Liu Q. Steganalysis of DCT-embedding based adaptive steganography and YASS[C]//Proceedings of 13th ACM Multimedia & Security Workshop. New York, ACM, 2011:77-86.
[5] Goljan M, Fridrich J, Holotyak T. New blind steganalysis and its implications[C]//Proceedings of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia. San Jose, CA, 2006:1-13.
[6] Wang Y, Moulin P. Optimized feature extraction for learning based image steganalysis[J]. IEEE Transaction on Information Forensics and Security, 2007, 2(1):31-45.
[7] Kodovský J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transaction on Information Forensics and Security, 2012, 7(2):432-444.
[8] Kodovský J, Fridrich J. Steganalysis of JPEG images using rich models[C]//Proceedings of SPIE, 2012, 8303:83030A.
[9] Holub V, Fridrich J, Denemark T. Random projections of residuals as an alternative to cooccurrences in steganalysis[C]//Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics. San Francisco, CA, 2013:3-7.
[10] Cho S, Cha B, Gawecki M, Kuo C. Block-based image steganalysis:algorithm and performance evaluation[J]. Journal of Visual Communication and Image Representation, 2013, 24(7):846-856.
[11] Wang R, Xu M, Ping X, Zhang T. Steganalysis of JPEG images by block texture based segmentation[J]. Multimedia Tools Application, 2015, 74(15):5725-5746.
[12] 汪然,许漫坤,平西建,张涛. 基于分割的空域图像隐写分析[J]. 自动化学报,2014, 40(12):2936-2943. Wang R, Xu M K, Ping X J, Zhang T. Steganalysis of spatial images based on segmentation[J]. Acta Automatica Sinica, 2014, 40(12):2936-2943. (in Chinese)
[13] Fisher R A. The use of multiple measurements in taxonomic problems[J]. Annals of Eugenics, 1936, 7(2):179-188.
[14] Filler T, Pevný T, Bas P. BOSS[EB/OL].[2007-07-01]. http://boss.gipsa-lab.grenobleinp.fr/BOSSRank/.
[15] Bas P, Furon T. Bows-2[EB/OL].[2007-07-01]. http://bows2.gipsa-lab.inpg.fr/BOWS2OrigEp3.tgz.
[16] Goljan M, Fridrich J, Holotyak T. The USDA NRCS Photo Gallery[EB/OL].[2008-09-14]. http://photogallery.nrcs.usda.gov.
[17] Schaefer G, Stich M. UCID-an uncompressed colour image database[R]. UK:Nottingham Trent University, 2003.
[18] Fridrich J, Pevný T, Kodovský J. Statistically undetectable JPEG steganography:dead ends, challenges, and opportunities[C]//Proceedings of ACM Multimedia and Security Workshop. Texas, 2007:3-14.
[19] Westfeld A. High capacity despite better steganalysis (F5-a steganographic algorithm)[C]//Proceedings of 4th International Workshop on Information Hiding. Pittsburgh, PA, 2001:289-302.
[20] Sallee P. Model-based steganography[C]//Proceedings of International Workshop on Digital Watermarking. Seoul, Korea, 2003:154-167.
[21] Kim Y, Duric Z, Richards D. Modified matrix encoding technique for minimal distortion steganography[C]//Proceedings of International Workshop on Information Hiding. Heidelberg, 2007:314-327.

文章导航

/