Browse > Article
http://dx.doi.org/10.3837/tiis.2012.08.003

Forensics Aided Steganalysis of Heterogeneous Bitmap Images with Different Compression History  

Hou, Xiaodan (Zhengzhou Information Science and Technology Institute)
Zhang, Tao (Zhengzhou Information Science and Technology Institute)
Xiong, Gang (Zhengzhou Information Science and Technology Institute)
Wan, Baoji (Zhengzhou Information Science and Technology Institute)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.6, no.8, 2012 , pp. 1926-1945 More about this Journal
Abstract
In this paper, two practical forensics aided steganalyzers (FA-steganalyzer) for heterogeneous bitmap images are constructed, which can properly handle steganalysis problems for mixed image sources consisting of raw uncompressed images and JPEG decompressed images with different quality factors. The first FA-steganalyzer consists of a JPEG decompressed image identifier followed by two corresponding steganalyzers, one of which is used to deal with uncompressed images and the other is used for mixed JPEG decompressed images with different quality factors. In the second FA-steganalyzer scheme, we further estimate the quality factors for JPEG decompressed images, and then steganalyzers trained on the corresponding quality factors are used. Extensive experimental results show that the proposed two FA-steganalyzers outperform the existing steganalyzer that is trained on a mixed dataset. Additionally, in our proposed FA-steganalyzer scheme, we can select the steganalysis methods specially designed for raw uncompressed images and JPEG decompressed images respectively, which can achieve much more reliable detection accuracy than adopting the identical steganalysis method regardless of the type of cover source.
Keywords
Information hiding; steganalysis; LSB matching; image forensics; forensics aided steganalysis;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
Times Cited By Web Of Science : 0  (Related Records In Web of Science)
연도 인용수 순위
1 J. Fridrich, M. Goljan and D. Hogea, "Steganalysis of JPEG images: Breaking the F5 algorithm," in Proc. of 5th International Workshop on Information Hiding, pp. 310-323, Oct. 2002.
2 G. Cancelli, G. Doerr, I. Cox and M. Barni, "A comparative study of ${\pm}1$ steganalyzers," in Proc. of IEEE International Workshop on Multimedia Signal Processing, pp. 791-796, Oct. 2008.
3 T. Pevny, P. Bas and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Transaction on Information Forensics and Security, vol. 5, no. 2, pp. 215-224, Mar. 2010.   DOI
4 T. Pevny and J. Fridrich, "Determining the stego algorithm for JPEG images," Special Issue of IEE Processing Information Security, vol. 153, no. 3, pp. 77-86, Sep. 2006.   DOI
5 T. Pevny and J. Fridrich, "Multiclass detector of current steganographic methods for JPEG format," IEEE Transaction on Information Forensics and Security, vol. 3, no. 4, pp. 635-650, Dec. 2008.   DOI
6 M. Barni, G. Cancelli and A. Esposito, "Forensics aided steganalysis of heterogeneous images," in Proc. of IEEE Conf. on Acoustic Speech, Signal Processing, pp. 1690-1693, Mar. 2010.
7 H. Amirkhani and M. Rahmati, "New framework for using image contents in blind steganalysis systems," Journal of Electronic Imaging, vol. 20, no. 1, pp. 1-14, Mar. 2011.
8 W. Luo, F. Huang and J. Huang, "JPEG error analysis and its applications to digital image forensics," IEEE Trans. on Information Forensics and Security, vol. 5, no. 3, pp. 480-491, Sep. 2010.   DOI
9 T. Sharp, "An Implementation of key-based digital signal steganography," in Proc. of 4th International Workshop on Information Hiding, pp. 13-26, Apr. 2001.
10 G. Doerr, Image Database for Steganalysis Studies [Online]. Available: http://www.cs.ucl.ac.uk/ staff/I.Cox/Content/Downloads.html.
11 E. Zheng, X. Ping and T. Zhang, "Local linear transform and new features of histogram characteristic functions for steganalysis of least significant bit matching steganography," KSII Transaction on Internet and Information System, vol. 5, no. 4, pp. 840-855, Apr. 2011.
12 K. Cai, X. Li and T. Zeng, "Reliable histogram features for detecting LSB matching," in Proc. of IEEE Conf. on Image Processing, pp. 1761-1764, Sep. 2010.
13 J. Zhang and D. Zhang, "Detection of LSB matching steganography in decompressed images," IEEE Signal Processing Letters, vol. 17, no. 2, pp. 141-144, Feb. 2010.   DOI
14 X. Li, T. Zhang, Y. Zhang, W. Li and K. Li, "A novel blind detector for additive noise steganography in JPEG decompressed images," Multimedia Tools and Applications, published online, May. 2012.
15 M. Goljan, J. Fridrich and T. Holotyak, "New blind steganalysis and its implications," in Proc. of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, pp. 1-13, Jan. 2006.
16 B. Li, J. Huang and Y. Q. Shi, "Textural features based universal steganalysis," in Proc. of SPIE Security, Forensics, Steganography and Watermarking of Multimedia, pp. 1201-1212, Jan. 2008.
17 W. Luo, Y. Wang and J. Huang, "Security analysis on spatial ${\pm}1$ steganography for JPEG decompressed images," IEEE Signal Processing Letters, vol. 18, no. 1, pp. 39-42, Jan. 2011.   DOI