Signal and Information Processing

JPEG Steganalysis Based on LSB Detection and Enhanced Features

Expand
  • School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China

Received date: 2015-08-17

  Revised date: 2015-11-17

  Online published: 2016-11-30

Abstract

A method of feature enhancement based on detection of least significant bits of DCT coefficients is proposed to solve the problem of information loss due to truncation operation in the co-occurrence matrix. The DCT coefficient plane is calculated modulotwo to generate the least significant bit plane. Co-occurrence matrices are used to capture correlated features among neighboring coefficients of the least significant bit plane. To enhance the features for detection, Zigzag scan is used to produce a new DCT coefficient plane, and then a co-occurrence matrix is generated based on the new plane. A feature vector with 508 dimensions is extracted using the LIU method. Experimental results show that performance of the extended features is better than those of previous schemes.

Cite this article

ZHENG Guo-hua, FENG Guo-rui, YU Jiang, CHENG Hang, ZHANG Xin-peng . JPEG Steganalysis Based on LSB Detection and Enhanced Features[J]. Journal of Applied Sciences, 2016 , 34(6) : 670 -676 . DOI: 10.3969/j.issn.0255-8297.2016.06.003

References

[1] Westfeld A. F5a steganographic algorithm: high capacity despite better steganalysis [C]// Proceedings of the 4th International Workshop on Information Hiding, Pittsburgh 2001: 289-302.
[2] Provos N. Defending against statistical steganalysis [C]//Proceedings of the 10th USENIXSecurity Symposium. Washington DC 2001: 323-336.
[3] Sallee P. Model-based steganography [C]. Proceedings of International Workshop on Digital Watermarking. Springer-Verlag, LNCS 2939, 2004: 154-167.
[4] Fridrich J, PevnÝ T, KodovskÝ J. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities [C]//Proceedings of the 9th ACM Multimedia & Security Workshop. Texas, 2007: 3-14.
[5] Solanki K, Sarkar A, Manjunath B S. YASS: yet another steganographic scheme that resists blind steganalysis [C]//Proceedings of the 9th International Workshop on Information Hiding. Berlin, 2007: 16-31.
[6] Chen C, Shi Y Q. JPEG image steganalysis utilizing both intrablock and interblock correlations [C]//IEEE International Workshop on Circuits and Systems, 2008: 3029-3032.
[7] KodovskÝ J, Fridrich J. Calibration revisited [C]//Proceedings of the 11th ACM Multimedia & Security Workshop. New Jersey, 2009: 63-74.
[8] KodovskÝ J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444.
[9] Liu Q, Sung A H, Qiao M. Improved detection and evaluation for JPEG steganalysis [C]// Proceedings of the 17th ACM international conference on Multimedia. BeiJing, 2009: 873-876.
[10] Liu Q, Sung A H, Qiao M. Neighboring joint density-based JPEG steganalysis [J]. ACM Transactions on Intelligent Systems and Technology, 2011, 2(2): 16.
[11] Liu Q. Steganalysis of DCT-embedding based adaptive steganography and YASS [C]// Proceedings of the 13th ACM Multimedia & Security Workshop. New York, 2011: 77-86.
[12] Gul G, Kurugollu F. JPEG image steganalysis using multivariate PDF estimates with MRF cliques [J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3): 578-587.
[13] Holub V, Fridrich J. Low complexity features for jpeg steganalysis using undecimated DCT [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(2): 219-228.

Outlines

/