Signal and Information Processing

Steganalysis Based on Image Contents

Expand

  • Institute of Information Engineering, PLA Information Engineering University, Zhengzhou 450002, China

Received date: 2011-12-12

  Revised date: 2012-04-11

  Online published: 2012-04-11

Abstract

 Digital images are important covers in information hiding. It has been shown that steganalytic methods perform differently on images with different contents. Based on regionally stationary Markov characteristics of natural images, a new steganalysis method based on image segmentation is proposed. Quad-tree
segmentation based on local Variance is used to locate areas sensitive to message embedding. Features based on run length histogram are then extracted and optimized. Finally, detection of steganography is done using support vector machine. Experimental results show that the proposed steganalysis method outperforms previous methods in detection accuracy.

Cite this article

LI Tao, PING Xi-jian . Steganalysis Based on Image Contents[J]. Journal of Applied Sciences, 2013 , 31(4) : 394 -401 . DOI: 10.3969/j.issn.0255-8297.2013.04.010

References

[1] KER A. Steganalysis of LSB matching in grayscale images [J]. IEEE Signal Processing Letters, 2005, 12(6): 441-444.

[2] CANCELLI G, DOËRR G, BARNI M, Ingemar J. COX I J. A comparative study of ±1 steganalyzers [C]//IEEE Workshop on Multimedia Signal Processing, 2008:791-796.

[3] 郭艳卿,何德全,尤新刚,孔祥维,王波. 基于整体性的隐密分析特征提取和融合方法研究 [J].电子学报,2006, 34 (12A): 2443-2446.

GUO Yanqing, HE Dequan,YOU Xingang, KONG Xiangwei, WANG Bo. Research on holism-based feature extraction and fusion for steganalysis [J]. Acta Electronica Sinica, 2006, 34 (12A): 2443-2446.

[4] 钮心忻,杨义先. 信息隐写与隐写分析研究框架探讨 [J]. 电子学报,2006, 34(12A): 2421-2424.

NIU Xinxin,YANG Yixian. Study on the frame of information steganography and steganalysis [J]. Acta Electronica Sinica, 2006, 34(12A): 2421-2424.

[5] LIU Q, SUNG A H, RIBEIRO B, WEI M , CHEN Z , XU J. Image complexity and feature mining for steganalysis of least significant bit matching steganography [J]. Information Sciences, 2008, 178(1): 21-36.

[6] CHO S, CHA B H, WANG JINGWEI, JAY K. Block-based image steganalysis: algorithm and performance evaluation [C]//IEEE International Symposium on Circuits and Systems, 2010: 1679-1682.

[7] WONG Ping Wah, CHEN Hong, TANG Zhong Jue. On steganalysis of plus-minus one embedding of continuous tone images [C]//Proceedings of SPIE-IS&T Electronic Imaging, 2005, 5681: 643-652.

[8] HARMSEN J, PEARLMAN W A. Steganalysis of additive noise modelable information hiding [C]//SPIE International Conference on Security, Steganography, and Wartermarking of Multimedia Contents, 2003: 131-142.

[9] ZHANG J, COX I J, DOЁRR G. Steganalysis for LSB matching in images with high-frequency noise [C]//IEEE Workshop on Multimedia Signal Processing, 2007: 385-388.

[10] FRIDRICH J, KODOVSKÝ J, HOLUB V, GOLJAN M. Steganalysis of content-adaptive steganography in spatial domain [C]//Information Hiding 13th International Conference, 2011, 6958: 102-117.

[11] JACOBS E W, FISHER Y, BOSS R D.Image compression:a study of the iterated transformation method [J]. Signal Process, 1992, 29: 页码。

[12] WANG Ying, PIERRE M. Optimized feature extraction for learning-based image steganalysis [J]. IEEE Transaction on Information Forensics and Security, 2007, 2(1): 31-45.

[13] 高建炯,宣国荣,施云庆,柴佩琪,杨志强. 基于直方图频域统计矩的图像隐写分析 [J]. 计算机应用,2005, 25(10): 2371-2373.

GAO Jianjiong, XUAN Guorong, SHI Yunqing, CAI Peiqi, YANG Zhiqiang. Image steganalysis based on statistical moments in the frequency domain of the histogram [J]. Computer Applications, 2005, 25(10): 2371-2373. ( in Chinese)

[14] DONG Jing, TAN Tieniu. Blind image steganalysis based on run-length histogram analysis [C]//IEEE International Conference on Image Processing, 2008: 2064-2067.

[15] YU Xiao Yi, BABAGUHCI N. Run length based steganalysis for LSB matching steganography [C]//International Conference on Multimedia and Expo, 2008: 353-356.

[16] DOЁRR G. Image database for steganalysis studies [DB/OL]. Available: http://www.cs.ucl.ac.uk/staff /I.Cox/Content/Downloads.html.

[17] CHANG C C, LIN C J. LIBSVM: a library for support vector machines [OL]. Available: http://www.csie.ntu.edu.tw/~cjlin/libsvm.

[18] BAS P, FURON T. BOWS-2 Jul. 2007 [DB/OL]. Available: http://bows2.gipsa-lab.inpg.fr

[19] LUO Weiqi, HUANG Fangjun, HUANG Jiwu. Edge adaptive image steganography based on LSB matching revisited [J]. IEEE Transactions Information Forensics and Security, 2010, 5( 2): 201-214.

[20] PEVNY T, BAS P, FRIDRICH J. Steganalysis by subtractive pixel adjacency matrix [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(3 ): 215-224.

[21] FRIDRICH J.Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes [C]//Proceedings of 6th Information Hiding Workshop. 2004. Springer LNCS, 3200: 67-81.
Outlines

/