Browse > Article

Steganalysis Using Joint Moment of Wavelet Subbands  

Park, Tae-Hee (Dept. Mechatronics Eng., TongMyong University)
Hyun, Seung-Hwa (School of Electrical Eng., Pusan National University)
Kim, Jae-Ho (School of Electrical Eng., Pusan National University)
Eom, Il-Kyu (School of Electrical Eng., Pusan National University)
Publication Information
Abstract
This paper propose image steganalysis scheme based on independence between parent and child subband on the multi-layer wavelet domain. The proposed method decompose cover and stego images into 12 subbands by applying 3-level Haar UWT(Undecimated Wavelet Transform), analyze statistical independency between parent and child subband. Because this independency is appeared more difference in stego image than in cover image, we can use it as feature to differenciate between cover and stego image. Therefore we extract 72D features by calculation first 3 order statistical moments from joint characteristic function between parent and child subband. Multi-layer perceptron(MLP) is applied as classifier to discriminate between cover and stego image. We test the performance of proposed scheme over various embedding rates by the LSB, SS, BSS embedding method. The proposed scheme outperforms the previous schemes in detection rate to existence of hidden message as well as exactness of discrimination.
Keywords
steganalysis; undecimated wavelet transform; statistical moment; characteristic function; MLP;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R.W. Buccigrossi, E.P. Simoncelli, "Image Compression via Joint Statistical Characterization in the Wavelet Domain," IEEE Trans Image Proc, vol. 8(12), pp. 1688-1701, Dec 1999.   DOI   ScienceOn
2 CorelDraw Software, www.CorelDraw.com
3 I. H. Witten and E. Frank, Data Mining, Elsevier, 2005.
4 A. P. Bradley. The use of the area under the ROC curve in the evaluation of machine learning algorithms, Pattern Recognition, 30:1145-1159, 1997.   DOI   ScienceOn
5 원태연, 통계조사분석, 한나래아카데미, 2010.
6 G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Zhang, P. Chai, C. Chen, and W. Chen, "Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions," in Proceedings of Information Hiding Workshop, Barcelona, Spain, pp. 262-277, Jun, 2005.
7 J.-L. Starck, J. Fadili, F. Murtagh, "The Undecimated Wavelet Decomposition and its Reconstruction," IP(16), No. 2, February 2007, pp. 297-309. IEEE DOI Link 0702
8 M.A. Mehrabi, H. Aghaeinia, M. Abolghasemi, "Image Steganalysis Based on Statistical Moments of Wavelet Subband Histogram of Images with Least Signigicant Bit Planes," Congress on Images and Signal Processing, IEEE, 2008.
9 I. Avcibas, N. Memon, and B. sankur, "Image steganalysis with binary similarity measures," in IEEE International Conference on Image Processing, September, 2002.
10 S. Lyu, H. Farid, "Detecting hidden messages using higher order statistics and support vector machines," presented at the 5th Int. Workshop on Information Hiding, Noordwijkerhout, The Netherlands, 2002.
11 Y.Shi, G. Xuan, C. Yang, J. Gao, Z. Zhang, P. Chai, D. Zou, C. Chen, W. Chen, "Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Functions," Int1. Conf. on Infor.Tech., Las Vegas, USA, April 4-6, 2005.
12 Y. Sun, F. Liu, B. Liu and P. Wang, "Steganalysis Based on Difference Image," IWDW 2008, LNCS, vol. 5450, pp. 184-198, Springer, Heidelberg, 2009.
13 R. Anderson and F. Petitcolas, "On the limits of steganography," IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 474-481, 1998.   DOI   ScienceOn
14 A. Piva, M. Barni and E. Bartolini, "DCT-based watermark recovering without resorting to the uncorrupted original image," Proc. ICIP 97, vol. 1, pp. 520
15 N. Johnson and S. Jajodia, "Exploring steganography: Seeing the unseen," IEEE Computer, vol. 31, no. 2, pp. 26-34, 1998.   DOI
16 T. Zhang, X. Ping, "A new approach to reliable detection of LSB steganography in natural images," Signal Processing, vol. 83, no. 10, pp 2085-2093, 2003.   DOI   ScienceOn
17 I.J. Cox, J. Kilian, T. Leighton and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. On Image Processing, vol. 6, pp. 1673-1687, 1997.
18 http://en.wikipedia.org/wiki/Steganalysis
19 D. Kahn, "The history of steganography," in Proc Information Hiding, First International Workshop, Cambridge, U.K., 1996.
20 http://en.wikipedia.org/wiki/Steganography