Steganalysis Using Joint Moment of Wavelet Subbands

웨이블렛 부밴드의 조인트 모멘트를 이용한 스테그분석

  • Park, Tae-Hee (Dept. Mechatronics Eng., TongMyong University) ;
  • Hyun, Seung-Hwa (School of Electrical Eng., Pusan National University) ;
  • Kim, Jae-Ho (School of Electrical Eng., Pusan National University) ;
  • Eom, Il-Kyu (School of Electrical Eng., Pusan National University)
  • 박태희 (동명대학교 메카트로닉스공학과) ;
  • 현승화 (부산대학교 전자전기공학부) ;
  • 김재호 (부산대학교 전자전기공학부) ;
  • 엄일규 (부산대학교 전자전기공학부)
  • Received : 2011.02.21
  • Accepted : 2011.04.07
  • Published : 2011.05.25

Abstract

This paper propose image steganalysis scheme based on independence between parent and child subband on the multi-layer wavelet domain. The proposed method decompose cover and stego images into 12 subbands by applying 3-level Haar UWT(Undecimated Wavelet Transform), analyze statistical independency between parent and child subband. Because this independency is appeared more difference in stego image than in cover image, we can use it as feature to differenciate between cover and stego image. Therefore we extract 72D features by calculation first 3 order statistical moments from joint characteristic function between parent and child subband. Multi-layer perceptron(MLP) is applied as classifier to discriminate between cover and stego image. We test the performance of proposed scheme over various embedding rates by the LSB, SS, BSS embedding method. The proposed scheme outperforms the previous schemes in detection rate to existence of hidden message as well as exactness of discrimination.

본 논문은 웨이블릿 도메인 상에서 부모와 자식 부밴드간의 비독립성에 기반한 영상 스테그분석 방법을 제안한다. 제안한 방법은 커버 영상과 비밀 메시지가 삽입된 스테고 영상에 대해 3-레벨 Haar UWT 웨이블릿 변환을 수행하여 12개의 부밴드로 분해한 후 부모와 자식 부밴드간의 통계적 의존성을 분석한다. 이러한 통계적 의존성은 비밀 메시지가 삽입된 스테고 영상의 경우 커버 영상과 상당한 차이를 보이므로 커버 및 스테고 영상을 구분하기 위한 특징으로 사용될 수 있다. 따라서 본 논문에서는 분해된 12개의 각 부모와 자식 부밴드간의 조인트 특성 함수에 대해 첫 9차의 통계적 모멘트를 추출함으로써 총 72차의 통계적 조인트 모멘트를 특징 벡터로 사용한다. 추출된 특징 벡터는 MLP(다층 퍼셉트론 신경망) 분류기에 입력되어 커버 영상과 스테고 영상을 학습하고 판별한다. 제안 방법의 성능 평가를 위해 LSB 및 SS, BSS 삽입 방법에 의한 다양한 삽입률의 스테고 영상을 사용하였으며, 실험 결과 제안한 기법은 기존의 기법에 비해 삽입 정보 유무의 검출율을 향상시킬 뿐만 아니라 판별의 정확도가 높음을 확인할 수 있었다.

Keywords

References

  1. http://en.wikipedia.org/wiki/Steganography
  2. D. Kahn, "The history of steganography," in Proc Information Hiding, First International Workshop, Cambridge, U.K., 1996.
  3. R. Anderson and F. Petitcolas, "On the limits of steganography," IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 474-481, 1998. https://doi.org/10.1109/49.668971
  4. N. Johnson and S. Jajodia, "Exploring steganography: Seeing the unseen," IEEE Computer, vol. 31, no. 2, pp. 26-34, 1998. https://doi.org/10.1109/MC.1998.4655281
  5. T. Zhang, X. Ping, "A new approach to reliable detection of LSB steganography in natural images," Signal Processing, vol. 83, no. 10, pp 2085-2093, 2003. https://doi.org/10.1016/S0165-1684(03)00169-5
  6. I.J. Cox, J. Kilian, T. Leighton and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. On Image Processing, vol. 6, pp. 1673-1687, 1997.
  7. A. Piva, M. Barni and E. Bartolini, "DCT-based watermark recovering without resorting to the uncorrupted original image," Proc. ICIP 97, vol. 1, pp. 520
  8. http://en.wikipedia.org/wiki/Steganalysis
  9. M.A. Mehrabi, H. Aghaeinia, M. Abolghasemi, "Image Steganalysis Based on Statistical Moments of Wavelet Subband Histogram of Images with Least Signigicant Bit Planes," Congress on Images and Signal Processing, IEEE, 2008.
  10. I. Avcibas, N. Memon, and B. sankur, "Image steganalysis with binary similarity measures," in IEEE International Conference on Image Processing, September, 2002.
  11. S. Lyu, H. Farid, "Detecting hidden messages using higher order statistics and support vector machines," presented at the 5th Int. Workshop on Information Hiding, Noordwijkerhout, The Netherlands, 2002.
  12. G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Zhang, P. Chai, C. Chen, and W. Chen, "Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions," in Proceedings of Information Hiding Workshop, Barcelona, Spain, pp. 262-277, Jun, 2005.
  13. Y.Shi, G. Xuan, C. Yang, J. Gao, Z. Zhang, P. Chai, D. Zou, C. Chen, W. Chen, "Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Functions," Int1. Conf. on Infor.Tech., Las Vegas, USA, April 4-6, 2005.
  14. Y. Sun, F. Liu, B. Liu and P. Wang, "Steganalysis Based on Difference Image," IWDW 2008, LNCS, vol. 5450, pp. 184-198, Springer, Heidelberg, 2009.
  15. J.-L. Starck, J. Fadili, F. Murtagh, "The Undecimated Wavelet Decomposition and its Reconstruction," IP(16), No. 2, February 2007, pp. 297-309. IEEE DOI Link 0702
  16. R.W. Buccigrossi, E.P. Simoncelli, "Image Compression via Joint Statistical Characterization in the Wavelet Domain," IEEE Trans Image Proc, vol. 8(12), pp. 1688-1701, Dec 1999. https://doi.org/10.1109/83.806616
  17. CorelDraw Software, www.CorelDraw.com
  18. I. H. Witten and E. Frank, Data Mining, Elsevier, 2005.
  19. A. P. Bradley. The use of the area under the ROC curve in the evaluation of machine learning algorithms, Pattern Recognition, 30:1145-1159, 1997. https://doi.org/10.1016/S0031-3203(96)00142-2
  20. 원태연, 통계조사분석, 한나래아카데미, 2010.