Browse > Article

Steganalysis Using Histogram Characteristic and Statistical Moments of Wavelet Subbands  

Hyun, Seung-Hwa (School of Electronics Eng., Pusan National University)
Park, Tae-Hee (Dept. Mechatronics Eng., TongMyong University)
Kim, Young-In (Dept. Biomedical Eng., Pusan National University)
Kim, Yoo-Shin (School of Electronics Eng., Pusan National University)
Eom, Il-Kyu (School of Electronics Eng., Pusan National University)
Publication Information
Abstract
In this paper, we present a universal steganalysis scheme. The proposed method extract features of two types. First feature set is extracted from histogram characteristic of the wavelet subbands. Second feature set is determined by statistical moments of wavelet characteristic functions. 3-level wavelet decomposition is performed for stego image and cover image using the Haar wavelet basis. We extract one features from 9 high frequency subbands of 12 subbands. The number of second features is 39. We use total 48 features for steganalysis. Multi layer perceptron(MLP) is applied as classifier to distinguish between cover images and stego images. To evaluate the proposed steganalysis method, we use the CorelDraw image database. We test the performance of our proposed steganalysis method over LSB method, spread spectrum data hiding method, blind spread spectrum data hiding method and F5 data hiding method. The proposed method outperforms the previous methods in sensitivity, specificity, error rate and area under ROC curve, etc.
Keywords
steganalysis; wavelet subbend; probability density function; characteristic function; statistical moment;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Ker. "Steganalysis of LSB Matching in Grayscale Images," IEEE Signal processing letters, vol.12, no.6, pp.441-444, 2005.   DOI
2 C. Chen, Y. Shi and W. Chen, et al. "Statistical Moments Based Universal Steganalysis Using JPEG 2-D Array and 2-D Characteristic Function," in Proceedings of IEEE ICIP, pp.105-108, 2006.
3 Q. Liu, A.H. Sung, Z. Chen and J. Xu. "Feature Mining and Pattern Classification for Steganalysis of LSB Matching Steganography in Grayscale Images," Pattern Recognition 41, pp.56-66, 2008.   DOI   ScienceOn
4 CorelDraw Software, www.corel.com.
5 A. Westfeld. "High Capacity Despite Better Steganalysis (F5-A Steganographic Algorithm)," IH 2001, LNCS, vol.2137, Springer, Heidelberg, pp.289-302, 2001.
6 Y. Sun, F. Liu, B. Liu and P. Wang. "Steganalysis Based on Difference Image," IWDW 2008, LNCS, vol.5450, pp.184-198, Springer, Heidelberg, 2009.
7 A. Westfeld. "Roc Curves for Steganalysts," in Proceedings of the Third WAVILA Challenge( Wacha'07), Saint Malo (France), pp. 39-45 2007.
8 WEKA tool http://www.cs.waikato.ac.nz/ml/weka/
9 G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Zhang, P. Chai, C. Chen, and W. Chen, "Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions," in Proceedings of Information Hiding Workshop, Barcelona, Spain, pp. 262-277, Jun. 2005.
10 Y. Wang and P. Moulin. "Optimized Feature Extraction for Learning-based Image Steganalysis," IEEE Trans. Information Forensics and Security, vol. 2, no.1, pp.31-45, March, 2007.   DOI
11 K. Sullivan, U. Madhow, S. Chandrasekaran and B. Manjunath. "Steganalysis for Markov cover data with applications to images," IEEE Trans. Information Forensics and security, vol.1, no.2, pp.275-287, Jun. 2006.   DOI   ScienceOn
12 G. Xuan, X. Cui, Y. Shi., et al. "JPEG Steganalysis Based on Classwise Non-principal Components Analysis and Multi-directional Markov Model," in Proceedings of IEEE ICME, pp903-906, 2007.
13 Y. Shi, C. Chen and W. Chen. "A Markov Process Based Approach to Effective Attacking JPEG Steganography," IH 2006, LNCS, vol. 4437, pp.249-264. Springer, Heidelberg, 2007.
14 J. Harmsen and W. Pearlman. "Steganalysis of Additive Noise Modelable Information Hiding," in Proceedings of Security, Steganography, and Watermarking of Multimedia Contents VI. SPIE, pp.131-142, 2003.
15 H. Farid. "Detecting Hidden Messages Using Higher-order Statistical Models," in Proceedings of IEEE ICIP, pp.905-908, 2002.
16 T. Holotyak, J. Fridrich and S. Voloshynovskiy. "Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics," CMS 2005, LNCS, vol. 3677, pp.273-274. Springer, Heidelberg, 2005.
17 M. Goljan, J. Fridrich and T. Holotyak. "New Blind Steganalysis and its Implications," in Proceedings of Security, Steganography, and Watermarking of Multimedia Contents. SPIE, pp.1-13, 2006.