Steganalysis of JPEG Images Based on Reducing Between-Class Scatter
Received date: 2017-09-24
Revised date: 2018-04-10
Online published: 2019-01-31
Compared with the process of embedding, image contents make a more significant impact on the differences of image statistical characteristics. This makes the image steganalysis to be a classification problem with bigger within-class scatter distances and smaller between-class scatter distances. In this paper, a new steganalysis framework which can reduce the differences of image statistical characteristics caused by various content and processing methods is proposed. The given images are classified according to the texture complexity. Steganalysis features are separately extracted from each subset with the same or close complexity evaluation function to build a classifier. The theoretical analysis and experimental results can demonstrate the validity of the proposed framework.
WANG Ran, NIU Shao-zhang, PING Xi-jian, ZHANG Tao, SANG Xiao-dan . Steganalysis of JPEG Images Based on Reducing Between-Class Scatter[J]. Journal of Applied Sciences, 2019 , 37(1) : 41 -50 . DOI: 10.3969/j.issn.0255-8297.2019.01.005
[1] Pevný T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis[C]//Proceedings of SPIE, 2007, 6505:650503.
[2] Kodovský J, Feideich J. Calibration revisited[C]//Proceedings of ACM Workshop Multimedia and Security. Princeton, New Jersey, 2009:63-74.
[3] Pevný T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix[J]. IEEE Transaction on Information Forensics and Security, 2010, 5(2):215-224.
[4] Liu Q. Steganalysis of DCT-embedding based adaptive steganography and YASS[C]//Proceedings of 13th ACM Multimedia & Security Workshop. New York, ACM, 2011:77-86.
[5] Goljan M, Fridrich J, Holotyak T. New blind steganalysis and its implications[C]//Proceedings of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia. San Jose, CA, 2006:1-13.
[6] Wang Y, Moulin P. Optimized feature extraction for learning based image steganalysis[J]. IEEE Transaction on Information Forensics and Security, 2007, 2(1):31-45.
[7] Kodovský J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transaction on Information Forensics and Security, 2012, 7(2):432-444.
[8] Kodovský J, Fridrich J. Steganalysis of JPEG images using rich models[C]//Proceedings of SPIE, 2012, 8303:83030A.
[9] Holub V, Fridrich J, Denemark T. Random projections of residuals as an alternative to cooccurrences in steganalysis[C]//Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics. San Francisco, CA, 2013:3-7.
[10] Cho S, Cha B, Gawecki M, Kuo C. Block-based image steganalysis:algorithm and performance evaluation[J]. Journal of Visual Communication and Image Representation, 2013, 24(7):846-856.
[11] Wang R, Xu M, Ping X, Zhang T. Steganalysis of JPEG images by block texture based segmentation[J]. Multimedia Tools Application, 2015, 74(15):5725-5746.
[12] 汪然,许漫坤,平西建,张涛. 基于分割的空域图像隐写分析[J]. 自动化学报,2014, 40(12):2936-2943. Wang R, Xu M K, Ping X J, Zhang T. Steganalysis of spatial images based on segmentation[J]. Acta Automatica Sinica, 2014, 40(12):2936-2943. (in Chinese)
[13] Fisher R A. The use of multiple measurements in taxonomic problems[J]. Annals of Eugenics, 1936, 7(2):179-188.
[14] Filler T, Pevný T, Bas P. BOSS[EB/OL].[2007-07-01]. http://boss.gipsa-lab.grenobleinp.fr/BOSSRank/.
[15] Bas P, Furon T. Bows-2[EB/OL].[2007-07-01]. http://bows2.gipsa-lab.inpg.fr/BOWS2OrigEp3.tgz.
[16] Goljan M, Fridrich J, Holotyak T. The USDA NRCS Photo Gallery[EB/OL].[2008-09-14]. http://photogallery.nrcs.usda.gov.
[17] Schaefer G, Stich M. UCID-an uncompressed colour image database[R]. UK:Nottingham Trent University, 2003.
[18] Fridrich J, Pevný T, Kodovský J. Statistically undetectable JPEG steganography:dead ends, challenges, and opportunities[C]//Proceedings of ACM Multimedia and Security Workshop. Texas, 2007:3-14.
[19] Westfeld A. High capacity despite better steganalysis (F5-a steganographic algorithm)[C]//Proceedings of 4th International Workshop on Information Hiding. Pittsburgh, PA, 2001:289-302.
[20] Sallee P. Model-based steganography[C]//Proceedings of International Workshop on Digital Watermarking. Seoul, Korea, 2003:154-167.
[21] Kim Y, Duric Z, Richards D. Modified matrix encoding technique for minimal distortion steganography[C]//Proceedings of International Workshop on Information Hiding. Heidelberg, 2007:314-327.
/
| 〈 |
|
〉 |