Browse > Article
http://dx.doi.org/10.3837/tiis.2011.04.012

Local Linear Transform and New Features of Histogram Characteristic Functions for Steganalysis of Least Significant Bit Matching Steganography  

Zheng, Ergong (Zhengzhou Information Science and Technology Institute)
Ping, Xijian (Zhengzhou Information Science and Technology Institute)
Zhang, Tao (Zhengzhou Information Science and Technology Institute)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.5, no.4, 2011 , pp. 840-855 More about this Journal
Abstract
In the context of additive noise steganography model, we propose a method to detect least significant bit (LSB) matching steganography in grayscale images. Images are decomposed into detail sub-bands with local linear transform (LLT) masks which are sensitive to embedding. Novel normalized characteristic function features weighted by a bank of band-pass filters are extracted from the detail sub-bands. A suboptimal feature set is searched by using a threshold selection algorithm. Extensive experiments are performed on four diverse uncompressed image databases. In comparison with other well-known feature sets, the proposed feature set performs the best under most circumstances.
Keywords
Steganalysis; LSB matching; local linear transform; characteristic function;
Citations & Related Records

Times Cited By Web Of Science : 1  (Related Records In Web of Science)
Times Cited By SCOPUS : 2
연도 인용수 순위
  • Reference
1 N. Khanna, A. K Mikkilineni, A. F. Martone, G. N. Ali, G. T.-C. Chiu, J. P. Allebach and E. J. Delp, "A survey of forensic characterization methods for physical devices," Digital Investigation, vol. 3, no. s1, pp. 17-28, Sep. 2006.   DOI   ScienceOn
2 T. V. Lanh, K. S. Chong, S. Emmanuel and M. S Kankanhalli, "A survey on digital camera image forensic methods," in Proc. of IEEE Conf. on Multimedia and Expo, pp. 16-19, Jul. 2007.
3 G. Schaefer and M. Stich, "UCID - An Uncompressed Colour Image Database," in Proc. of SPIE Storage and Retrieval Methods and Applications for Multimedia, pp.472-480, Jan. 2004.
4 [Online]. Available: http://photogallery.nrcs.usda.gov/
5 C.-C. Chang and C.-J. Lin, LIBSVM: A Library for Support Vector Machines [Online]. Available: http://www. csie.ntu.edu.tw/-cjlin/libsvm
6 G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Zhang, P. Chai, C. Chen and W. Chen, "Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions," in Proc. of Int. Workshop on Information Hiding, pp. 262-277, Jun. 2005.
7 I. Ng, T. Tan and J. Kittler, "On local linear transform and gabor filter representation of texture," in Proc. of 11th Int. Conf. on Pattern Recognition, pp. 627-631, 1992.
8 G. Doerr, "Image Database for Steganalysis Studies," [Online]. Available: http://www.cs.ucl.ac.uk/ staff/I.Cox/Content/Downloads.html
9 P. Bas and T. Furon, BOWS-2, Jul. 2007 [Online]. Available: http:// bows2.gipsa-lab.inpg.fr
10 M. Goljan, J. Fridrich and T. Holotyak, "New blind steganalysis and its implications," in Proc. of SPIE Security, Steganography, and Watermarking of Multimedia Contents, pp. 1-13, Jan. 2006.
11 Y. Q. Shi, G. Xuan, D. Zou, J. Gao, C. Yang, Z. Zhang, P. Chai, W. Chen and C. Chen , "Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image,and neural network," in Proc. of IEEE Conf. on Multimedia and Expo, pp. 269-272, Jul. 2005.
12 Y. Wang and P. Moulin, "Optimized feature extraction for learning-based image steganalysis," IEEE Trans. on Information Forensics and Security, vol. 2, no. 1, pp. 31-45, Mar. 2007.   DOI
13 H. Farid, "Detecting hidden messages using higher-order statistical models," in Proc. of IEEE. Conf. on Image Processing, pp.905-908, Sep. 2002.
14 B. Li, J. Huang and Y. Q. Shi, "Textural features based universal steganalysis," in Proc. of SPIE Security, Forensics, Steganography and Watermarking of Multimedia, pp. 681912-681912-12, Jan. 2008.
15 J. Fridrich, D. Soukal and M. Goljan, "Maximum likelihood estimation of length of secret message embedded using ${\pm}$K steganography in spatial domain," in Proc. of SPIE Security, Steganography, and Wartermarking of Multimedia Contents, pp. 595-606, Mar. 2005.
16 P. W. Wong, H. Chen and Z. Tang, "On steganalysis of plus-minus one embedding of continuous tone image," in Proc. of SPIE Security, Steganography, and Wartermarking of Multimedia Contents, pp. 643-652, Mar. 2005.
17 G. Cancelli, G. Doerr, I. J. Cox and M. Barni, "Detection of ${\pm}$1 LSB steganography based on the amplitude of histogram local extrema," in Proc. of IEEE Conf. on Image Processing, pp. 1288-1291, Oct. 2008.
18 T. Holotyak, J. Fridrich and S. Voloshynovskiy, "Blind statistical steganalysis of additive steganography using wavelet higher order statistics," in Proc. of 9th IFIP Conf. on Communications and Multimedia Security, pp. 273-274, Sep. 2005.
19 G. Wang, X. Ping, M. Xu, T. Zhang and X. Bao, "Steganalytic method based on short and repeated sequence distance statistics," Science in China Series F: Information Sciences, vol.51, no.10, pp. 1466-1474, Oct. 2008.   DOI   ScienceOn
20 T. Pevny, P. Bas and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. on Information Forensics and Security, vol. 5, no.2, pp. 215-224, Mar. 2010.   DOI
21 Y. Gao, X. Li, B. Yang and Y. Lu, "Detecting LSB matching by characterizing the amplitude of histogram," in Proc. of IEEE Conf. on Acoustics Speech, Signal Processing, pp. 1505-1508, Apr. 2009.
22 T. Zhang, W. Li, Y. Zhang, E. Zheng and X. Ping, "Steganalysis of LSB matching based on statistical modeling of pixel difference distributions," Information Sciences, vol. 180, no. 23, pp. 4685-4694, Dec. 2010.   DOI   ScienceOn
23 K. Cai, X. Li and T. Zeng, "Reliable histogram features for detecting LSB matching," in Proc. of IEEE Conf. on Image Processing, pp. 1761-1764, Sep. 2010.
24 F. Huang, B. Li and J. Huang, "Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels," in Proc. of IEEE Conf. on Image Processing, pp. 401-404, Sep. 2007.
25 A. D. Ker, "Steganalysis of LSB matching in grayscale images," IEEE Signal Processing Letters, vol. 12, no. 6, pp. 441-444, Jun. 2005.   DOI
26 Q. Liu, A. H. Sung, B. Ribeiro, M. Wei, Z. Chen and J. Xu, "Image complexity and feature mining for steganalysis of least significant bit matching steganography," Information Sciences, vol. 178, no. 1, pp. 21-36, Jan. 2008.   DOI   ScienceOn
27 A. D. Ker and I. Lubenko, "Feature redunction and payload location with WAM steganalysis," in Proc. of SPIE Electronic Imaging, Media Forensics and Security, pp. 72540A-01-72540A-13, Jan. 2009.
28 J. J. Harmsen and W. A. Pearlman, "Steganalysis of additive noise modelable information hiding," in Proc. SPIE Security, Steganography, and Wartermarking of Multimedia Contents, pp. 131-142, Jan. 2003.
29 J. Zhang, I. J. Cox and G. Doёrr, "Steganalysis for LSB matching in images with high-frequency noise," in Proc. of IEEE Workshop on Multimedia Signal Processing, pp. 385-388, Oct. 2007.
30 X. Li, T. Zeng and B. Yang, "Detecting LSB matching by applying calibration technique for difference image," in Proc. of 10th ACM Multimedia & Security Workshop, pp. 133-138, Sep. 2008.
31 S. Dumitrescu, X. Wu and Z. Wang, "Detection of LSB steganography via sample pair analysis," in Proc. of 5th Int. Workshop on Information Hiding, pp. 355-372, Oct. 2002.
32 J. Fridrich, M. Goljan and R. Du, "Detecting LSB steganography in color and gray-scale images," IEEE Multimedia, vol. 8, no. 4, pp. 22-28, Oct. 2001.   DOI   ScienceOn
33 G. Cancelli, G. Doerr, I. J. Cox and M.Barni, "A comparative study of ${\pm}$1 steganalyzers," in Proc. of IEEE Workshop on Multimedia Signal Processing, pp. 791-796, Oct. 2008.
34 T. Zhang and X. Ping, "A new approach to reliable detection of LSB steganography in natural images," Int. Journal Signal Processing, vol. 83, no. 10, pp. 2085-2093, Oct. 2003.   DOI   ScienceOn