Browse > Article
http://dx.doi.org/10.5909/JBE.2018.23.4.526

Experimental Verification of the Versatility of SPAM-based Image Steganalysis  

Kim, Jaeyoung (Department of Electronic Engineering, Pukyong National University)
Park, Hanhoon (Department of Electronic Engineering, Pukyong National University)
Park, Jong-Il (Department of Computer and Software, Hanyang University)
Publication Information
Journal of Broadcast Engineering / v.23, no.4, 2018 , pp. 526-535 More about this Journal
Abstract
Many steganography algorithms have been studied, and steganalysis for detecting stego images which steganography is applied to has also been studied in parallel. Especially, in the case of the image steganalysis, the features such as ALE, SPAM, and SRMQ are extracted from the statistical characteristics of the image, and stego images are classified by learning the classifier using various machine learning algorithms. However, these studies did not consider the effect of image size, aspect ratio, or message-embedding rate, and thus the features might not function normally for images with conditions different from those used in the their studies. In this paper, we analyze the classification rate of the SPAM-based image stegnalysis against variety image sizes aspect ratios and message-embedding rates and verify its versatility.
Keywords
Image steganography; Steganalysis; SPAM; Statistical feature; Versatility verification;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 C. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, Vol.. 37, pp. 469-474, 2004.   DOI
2 P. Bas, T. Filler and T. Pevny, "'Break our steganographic system': The ins and outs of organizing boss," in Proc. Int. Workshop Inf. Hiding, pp. 59-70, 2011.
3 J. Kim and H. Park, "Image steganography using layered pixel-value differencing," Jounal of Broadcasting Engineering, Vol. 22, No. 3, 2017.
4 G. Cancelli, G. Doerr, I. J. Cox and M. Barni, "Detection of ${\pm}$1 LSB steganography based on the amplitude of histogram local extrema," ICIP, 2008.
5 T. Pevny. P. Bas and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, pp. 215-224, 2010.   DOI
6 J. Fridrich, Member, IEEE and J. Kodovsky, "Rich models for steganalysis of digital images," IEEE Transactions on Information Forensics and Security, Vol. 7, No. 3, pp. 868-882, 2012.   DOI
7 J. Kodovsky, J. Fridrich, Member, IEEE and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, pp. 432-444, 2012.   DOI
8 J. Ye, J. Ni, Member, IEEE and Y. Yi, "Deep learning hierarchical representations for image steganalysis," IEEE Transactions on Information Forensics and Security, Vol. 12, No. 11, pp. 2545-2557, 2017.   DOI
9 C. Cortes and V. Vapnik, "Support-vector networks," Machine Learning, Vol. 20, pp. 273-297, 1995.
10 S. Kim and D. S. Han, "Real time traffic light detection algorithm based on color map and multilayer HOG-SVM," Journal of Broadcast Engineering, Vol. 22, No. 1, pp. 62-69, 2017.   DOI
11 J. Kim and H. Park, "A statistical approach for improving the embedding capacity of block matching based image steganography, Journal of Broadcast Engineering, Vol. 22, No. 5, 2017.
12 W. Sohn and L. N. T. dung, "A blind watermarking scheme using singular vector based on DWT/RDWT/SVD," Journal of Broadcast Engineering, Vol. 21, No. 2, pp. 149-156, 2016.   DOI
13 J. Seon-Su, "A study of optimal image steganography based on LSB techniques," Journal of the Korea Industrial Information Systems Reasearch, Vol. 20, No. 3, pp. 29-36, 2015.
14 D. Wu and W. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognition Latters, Vol. 24, pp. 1613-1626, 2003.   DOI
15 L. Pibre, J. Pasquet, D. ienco and M. Chaumont, "Deep learning is a good steganalysis tool when embedding key is reused for different im ages even if there is a cover source-mismatch," Society for Imagng Science and Technology, 2016.