DOI QR코드

DOI QR Code

Local Linear Transform and New Features of Histogram Characteristic Functions for Steganalysis of Least Significant Bit Matching Steganography

  • Zheng, Ergong (Zhengzhou Information Science and Technology Institute) ;
  • Ping, Xijian (Zhengzhou Information Science and Technology Institute) ;
  • Zhang, Tao (Zhengzhou Information Science and Technology Institute)
  • Received : 2010.09.28
  • Accepted : 2011.02.15
  • Published : 2011.04.29

Abstract

In the context of additive noise steganography model, we propose a method to detect least significant bit (LSB) matching steganography in grayscale images. Images are decomposed into detail sub-bands with local linear transform (LLT) masks which are sensitive to embedding. Novel normalized characteristic function features weighted by a bank of band-pass filters are extracted from the detail sub-bands. A suboptimal feature set is searched by using a threshold selection algorithm. Extensive experiments are performed on four diverse uncompressed image databases. In comparison with other well-known feature sets, the proposed feature set performs the best under most circumstances.

Keywords

References

  1. S. Dumitrescu, X. Wu and Z. Wang, "Detection of LSB steganography via sample pair analysis," in Proc. of 5th Int. Workshop on Information Hiding, pp. 355-372, Oct. 2002.
  2. J. Fridrich, M. Goljan and R. Du, "Detecting LSB steganography in color and gray-scale images," IEEE Multimedia, vol. 8, no. 4, pp. 22-28, Oct. 2001. https://doi.org/10.1109/93.959097
  3. T. Zhang and X. Ping, "A new approach to reliable detection of LSB steganography in natural images," Int. Journal Signal Processing, vol. 83, no. 10, pp. 2085-2093, Oct. 2003. https://doi.org/10.1016/S0165-1684(03)00169-5
  4. G. Cancelli, G. Doerr, I. J. Cox and M.Barni, "A comparative study of ${\pm}$1 steganalyzers," in Proc. of IEEE Workshop on Multimedia Signal Processing, pp. 791-796, Oct. 2008.
  5. A. D. Ker and I. Lubenko, "Feature redunction and payload location with WAM steganalysis," in Proc. of SPIE Electronic Imaging, Media Forensics and Security, pp. 72540A-01-72540A-13, Jan. 2009.
  6. J. J. Harmsen and W. A. Pearlman, "Steganalysis of additive noise modelable information hiding," in Proc. SPIE Security, Steganography, and Wartermarking of Multimedia Contents, pp. 131-142, Jan. 2003.
  7. A. D. Ker, "Steganalysis of LSB matching in grayscale images," IEEE Signal Processing Letters, vol. 12, no. 6, pp. 441-444, Jun. 2005. https://doi.org/10.1109/LSP.2005.847889
  8. X. Li, T. Zeng and B. Yang, "Detecting LSB matching by applying calibration technique for difference image," in Proc. of 10th ACM Multimedia & Security Workshop, pp. 133-138, Sep. 2008.
  9. J. Zhang, I. J. Cox and G. Doёrr, "Steganalysis for LSB matching in images with high-frequency noise," in Proc. of IEEE Workshop on Multimedia Signal Processing, pp. 385-388, Oct. 2007.
  10. G. Cancelli, G. Doerr, I. J. Cox and M. Barni, "Detection of ${\pm}$1 LSB steganography based on the amplitude of histogram local extrema," in Proc. of IEEE Conf. on Image Processing, pp. 1288-1291, Oct. 2008.
  11. Y. Gao, X. Li, B. Yang and Y. Lu, "Detecting LSB matching by characterizing the amplitude of histogram," in Proc. of IEEE Conf. on Acoustics Speech, Signal Processing, pp. 1505-1508, Apr. 2009.
  12. T. Zhang, W. Li, Y. Zhang, E. Zheng and X. Ping, "Steganalysis of LSB matching based on statistical modeling of pixel difference distributions," Information Sciences, vol. 180, no. 23, pp. 4685-4694, Dec. 2010. https://doi.org/10.1016/j.ins.2010.07.037
  13. K. Cai, X. Li and T. Zeng, "Reliable histogram features for detecting LSB matching," in Proc. of IEEE Conf. on Image Processing, pp. 1761-1764, Sep. 2010.
  14. F. Huang, B. Li and J. Huang, "Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels," in Proc. of IEEE Conf. on Image Processing, pp. 401-404, Sep. 2007.
  15. Q. Liu, A. H. Sung, B. Ribeiro, M. Wei, Z. Chen and J. Xu, "Image complexity and feature mining for steganalysis of least significant bit matching steganography," Information Sciences, vol. 178, no. 1, pp. 21-36, Jan. 2008. https://doi.org/10.1016/j.ins.2007.08.007
  16. G. Wang, X. Ping, M. Xu, T. Zhang and X. Bao, "Steganalytic method based on short and repeated sequence distance statistics," Science in China Series F: Information Sciences, vol.51, no.10, pp. 1466-1474, Oct. 2008. https://doi.org/10.1007/s11432-008-0110-5
  17. T. Pevny, P. Bas and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. on Information Forensics and Security, vol. 5, no.2, pp. 215-224, Mar. 2010. https://doi.org/10.1109/TIFS.2010.2045842
  18. J. Fridrich, D. Soukal and M. Goljan, "Maximum likelihood estimation of length of secret message embedded using ${\pm}$K steganography in spatial domain," in Proc. of SPIE Security, Steganography, and Wartermarking of Multimedia Contents, pp. 595-606, Mar. 2005.
  19. P. W. Wong, H. Chen and Z. Tang, "On steganalysis of plus-minus one embedding of continuous tone image," in Proc. of SPIE Security, Steganography, and Wartermarking of Multimedia Contents, pp. 643-652, Mar. 2005.
  20. H. Farid, "Detecting hidden messages using higher-order statistical models," in Proc. of IEEE. Conf. on Image Processing, pp.905-908, Sep. 2002.
  21. T. Holotyak, J. Fridrich and S. Voloshynovskiy, "Blind statistical steganalysis of additive steganography using wavelet higher order statistics," in Proc. of 9th IFIP Conf. on Communications and Multimedia Security, pp. 273-274, Sep. 2005.
  22. M. Goljan, J. Fridrich and T. Holotyak, "New blind steganalysis and its implications," in Proc. of SPIE Security, Steganography, and Watermarking of Multimedia Contents, pp. 1-13, Jan. 2006.
  23. G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Zhang, P. Chai, C. Chen and W. Chen, "Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions," in Proc. of Int. Workshop on Information Hiding, pp. 262-277, Jun. 2005.
  24. Y. Q. Shi, G. Xuan, D. Zou, J. Gao, C. Yang, Z. Zhang, P. Chai, W. Chen and C. Chen , "Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image,and neural network," in Proc. of IEEE Conf. on Multimedia and Expo, pp. 269-272, Jul. 2005.
  25. Y. Wang and P. Moulin, "Optimized feature extraction for learning-based image steganalysis," IEEE Trans. on Information Forensics and Security, vol. 2, no. 1, pp. 31-45, Mar. 2007. https://doi.org/10.1109/TIFS.2006.890517
  26. B. Li, J. Huang and Y. Q. Shi, "Textural features based universal steganalysis," in Proc. of SPIE Security, Forensics, Steganography and Watermarking of Multimedia, pp. 681912-681912-12, Jan. 2008.
  27. I. Ng, T. Tan and J. Kittler, "On local linear transform and gabor filter representation of texture," in Proc. of 11th Int. Conf. on Pattern Recognition, pp. 627-631, 1992.
  28. G. Doerr, "Image Database for Steganalysis Studies," [Online]. Available: http://www.cs.ucl.ac.uk/ staff/I.Cox/Content/Downloads.html
  29. P. Bas and T. Furon, BOWS-2, Jul. 2007 [Online]. Available: http:// bows2.gipsa-lab.inpg.fr
  30. G. Schaefer and M. Stich, "UCID - An Uncompressed Colour Image Database," in Proc. of SPIE Storage and Retrieval Methods and Applications for Multimedia, pp.472-480, Jan. 2004.
  31. [Online]. Available: http://photogallery.nrcs.usda.gov/
  32. C.-C. Chang and C.-J. Lin, LIBSVM: A Library for Support Vector Machines [Online]. Available: http://www. csie.ntu.edu.tw/-cjlin/libsvm
  33. N. Khanna, A. K Mikkilineni, A. F. Martone, G. N. Ali, G. T.-C. Chiu, J. P. Allebach and E. J. Delp, "A survey of forensic characterization methods for physical devices," Digital Investigation, vol. 3, no. s1, pp. 17-28, Sep. 2006. https://doi.org/10.1016/j.diin.2006.01.011
  34. T. V. Lanh, K. S. Chong, S. Emmanuel and M. S Kankanhalli, "A survey on digital camera image forensic methods," in Proc. of IEEE Conf. on Multimedia and Expo, pp. 16-19, Jul. 2007.

Cited by

  1. Detection of LSB Matching Revisited Using Pixel Difference Feature vol.7, pp.10, 2011, https://doi.org/10.3837/tiis.2013.10.011
  2. Quantitative steganalysis of spatial ±1 steganography in JPEG decompressed images vol.73, pp.3, 2011, https://doi.org/10.1007/s11042-013-1654-y