DOI QR코드

DOI QR Code

Detection for JPEG steganography based on evolutionary feature selection and classifier ensemble selection

  • Ma, Xiaofeng (State key Laboratory of Mathematical Engineering and Advanced Computing) ;
  • Zhang, Yi (State key Laboratory of Mathematical Engineering and Advanced Computing) ;
  • Song, Xiangfeng (Xi'an Communication Institute) ;
  • Fan, Chao (Zhengzhou Science and Technology Institute)
  • Received : 2017.05.04
  • Accepted : 2017.08.01
  • Published : 2017.11.30

Abstract

JPEG steganography detection is an active research topic in the field of information hiding due to the wide use of JPEG image in social network, image-sharing websites, and Internet communication, etc. In this paper, a new steganalysis method for content-adaptive JPEG steganography is proposed by integrating the evolutionary feature selection and classifier ensemble selection. First, the whole framework of the proposed steganalysis method is presented and then the characteristic of the proposed method is analyzed. Second, the feature selection method based on genetic algorithm is given and the implement process is described in detail. Third, the method of classifier ensemble selection is proposed based on Pareto evolutionary optimization. The experimental results indicate the proposed steganalysis method can achieve a competitive detection performance by compared with the state-of-the-art steganalysis methods when used for the detection of the latest content-adaptive JPEG steganography algorithms.

Keywords

References

  1. J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications, Cambridge University Press, Cambridge, 2010.
  2. H. Q. Wang, S. Z. Wang, "Cyber warfare: steganography vs. steganalysis," Communications of the ACM, vol. 47, no. 10, pp. 76-82, October, 2004. https://doi.org/10.1145/1022594.1022597
  3. T. Pevny, T. Filler, P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Proc of the 12th International Workshop on Information Hiding, pp. 161-177, June 28-30, 2010.
  4. B. Li, M. Wang, X. L. Li, S. Q. Tan, J. W. Huang, "A strategy of clustering modification directions in spatial image steganography," IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 1905-1917, September, 2015. https://doi.org/10.1109/TIFS.2015.2434600
  5. W. M. Zhang, Z. Zhang, L. L. Zhang, H. Y. Li N. H. Yu, "Decomposing Joint Distortion for Adaptive Steganography," IEEE Transactions on Circuits and Systems for Video Technology, vol.PP, no.99, pp.1-1, July, 2016.
  6. F. J. Huang, J. W. Huang, Y. Q. Shi, "New Channel Selection Rule for JPEG Steganography," IEEE Transactions on Information Forensics and Security, vol. 7, no. 4, pp. 1181-1191, August, 2012. https://doi.org/10.1109/TIFS.2012.2198213
  7. V. Holub and J. Fridrich, "Digital image steganography using universal distortion," in Proc. of 1st ACM IH&MMSec. Workshop, pp.59-68, June 20-22, 2013.
  8. L. J. Guo, J. Q. Ni, Y. Q. Shi, "Uniform embedding for efficient JPEG steganography," IEEE Transactions on Information Forensics and Security, vol.9, no.5, pp. 814-825, May, 2014. https://doi.org/10.1109/TIFS.2014.2312817
  9. F. Y. Li, X. P. Zhang, J. Yu, W. F, Shen, "Adaptive JPEG steganography with new distortion function," Annals of Telecommunications, vol. 69, no. 7, pp. 431-440, August, 2014. https://doi.org/10.1007/s12243-013-0415-2
  10. Z. C. Wang, X. P. Zhang, Z. X. Yin, "Hybrid distortion function for JPEG steganography," Journal of Electronic Imaging, vol. 25, no. 5, pp. 050501, September, 2016. https://doi.org/10.1117/1.JEI.25.5.050501
  11. T. Filler, J. Judas, and J. Fridrich, "Minimizing additive distortion in steganography using syndrome-trellis codes," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 920-935, September, 2011. https://doi.org/10.1109/TIFS.2011.2134094
  12. J. Kodovsky and J. Fridrich, "Steganalysis of JPEG images using rich models," in Proc. of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, pp. 0A 1-13, January 22-26, 2012.
  13. V. Holub and J. Fridrich, "Low Complexity Features for JPEG Steganalysis Using Undecimated DCT," IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, pp. 219-228, February, 2015. https://doi.org/10.1109/TIFS.2014.2364918
  14. V. Holub, J. Fridrich, "Phase-Aware Projection Model for Steganalysis of JPEG Images," in Proc. of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, pp. 94090T-94090T-11, February 8-12, 2015..
  15. X. F. Song, F. L. Liu, C. F. Yang, X. Y. Luo and Y. Zhang, "Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters," in Proc. of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 15-23, June 17-19, 2015..
  16. X. F. Song, F. L. Liu, C. F. Yang, X. Y. Luo, "2D Gabor Filters based steganalysis of content-adaptive JPEG Steganography," Multimedia Tools and Application, December, 2016.
  17. Y. Zhang, F. L. Liu, C. F. Yang, et al, "Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank," Journal of Electronic Imaging, vol. 26, no. 1, pp. 013011-013011, February, 2017. https://doi.org/10.1117/1.JEI.26.1.013011
  18. X. F. Song, F. L. Liu, C. F. Yang, et al, "Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion," KSII Transactions on Internet and Information Systems, vol. 9, no. 12, pp. 5209-5228, December, 2015. https://doi.org/10.3837/tiis.2015.12.026
  19. T. Denemark, M. Boroumand, J. Fridrich, "Steganalysis Features for Content-Adaptive JPEG Steganography," IEEE Transactions on Information Forensics and Security, vol. 11, no. 8, pp. 1736-1746, August, 2016. https://doi.org/10.1109/TIFS.2016.2555281
  20. J. Kodovsky, J. Fridrich and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Transactions on Information Forensics and Security, vol.7, no. 2, pp. 432-444, April, 2012. https://doi.org/10.1109/TIFS.2011.2175919
  21. V. Sachnev, H. J. Kim, "Binary Coded Genetic Algorithm with Ensemble Classifier for feature selection in JPEG steganalysis," in Proc of the 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, pp.1-6, April 21-24, 2014.
  22. B. Cao, G. R. Feng, Z. X. Yin, "Optimizing Feature for JPEG Steganalysis via Gabor Filter and Co-occurrences Matricesm," in Proc of the International Conference on Cloud Computing and Security, pp.84-93, July 29-31, 2016.
  23. F. Y. Li, X. P. Zhang, B. Chen, et al, "JPEG steganalysis with high-dimensional features and Bayesian ensemble classifier," IEEE Signal Processing Letters, vol.20, no. 3, pp.233-236, March, 2013. https://doi.org/10.1109/LSP.2013.2240385
  24. R. Cogranne, V. Sedighi, J. Fridrich, et al, "Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?," in Proc of the IEEE International Workshop on Information Forensics and Security, pp.1-6, November, 2015.
  25. R. T. Marler, J. S. Arora, "Survey of multi-objective optimization methods for engineering," Structural and multidisciplinary optimization, vol. 26, no. 6, pp. 369-395, April, 2004. https://doi.org/10.1007/s00158-003-0368-6
  26. C. L. Qian, Y. Yu, Z. H, Zhou. "Pareto Ensemble Pruning," in Proc of the Twenty-Ninth AAAI Conference on Artificial Intelligence, pp. 2935-2941, January, 2015.
  27. L. F. Yu, Y. Zhao, R. R. Ni, Z. F. Zhu. "PM1 steganography in JPEG images using genetic algorithm," Soft Computing, vol. 13, no. 4, pp. 393-400, February, 2009. https://doi.org/10.1007/s00500-008-0327-7
  28. D. Whitley, "A genetic algorithm tutorial," Statistics and computing, vol. 4, no. 2, pp. 65-85, June, 1994. https://doi.org/10.1007/BF00175354
  29. S. Lin, B. W. Kernighan, "An effective heuristic algorithm for the traveling-salesman problem," Operations research, vol.21, no.2, pp. 498-516, April, 1973. https://doi.org/10.1287/opre.21.2.498
  30. T. Denemark, J. Fridrich, "Steganography with Multiple JPEG Images of the Same Scene," IEEE Transactions on Information Forensics and Security," vol.12, no.10, pp. 2308-2319, October, 2017. https://doi.org/10.1109/TIFS.2017.2705625
  31. S. Q. Tan, B. Li, "Stacked convolutional auto-encoders for steganalysis of digital images," in Proc of Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, pp.1-4, December 9-12, 2015.
  32. Y. L. Qian, J. Dong, W. Wang, et al, "Deep learning for steganalysis via convolutional neural networks," in Proc of SPIE Media Watermarking, Security, and Forensics 2015, Part of IS&T International Symposium on Electronic Imaging," pp. 94090J-94090J-10, 2015.
  33. G. S. Xu, H. Z. Wu, Y. Q. Shi, "Structural Design of Convolutional Neural Networks for Steganalysis," IEEE Signal Processing Letters, vol.23, no.5, pp.708-712, May, 2016. https://doi.org/10.1109/LSP.2016.2548421
  34. J. S. Zeng, S. Q. Tan, B. Li, et al, "Large-scale JPEG steganalysis using hybrid deep-learning framework," arXiv preprint arXiv:1611.03233v2, 2017.
  35. M. Chen, V. Sedighi, M. Boroumand, J. Fridrich, "JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images," in Proc. of the 5rd ACM Workshop on Information Hiding and Multimedia Security, pp. 75-84, June 20-22, 2017.