Browse > Article
http://dx.doi.org/10.3837/tiis.2016.12.026

New Blind Steganalysis Framework Combining Image Retrieval and Outlier Detection  

Wu, Yunda (Zhengzhou Information Science and Technology Institute)
Zhang, Tao (Zhengzhou Information Science and Technology Institute)
Hou, Xiaodan (Zhengzhou Information Science and Technology Institute)
Xu, Chen (Zhengzhou Information Science and Technology Institute)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.12, 2016 , pp. 5643-5656 More about this Journal
Abstract
The detection accuracy of steganalysis depends on many factors, including the embedding algorithm, the payload size, the steganalysis feature space and the properties of the cover source. In practice, the cover source mismatch (CSM) problem has been recognized as the single most important factor negatively affecting the performance. To address this problem, we propose a new framework for blind, universal steganalysis which uses traditional steganalyst features. Firstly, cover images with the same statistical properties are searched from a reference image database as aided samples. The test image and its aided samples form a whole test set. Then, by assuming that most of the aided samples are innocent, we conduct outlier detection on the test set to judge the test image as cover or stego. In this way, the framework has removed the need for training. Hence, it does not suffer from cover source mismatch. Because it performs anomaly detection rather than classification, this method is totally unsupervised. The results in our study show that this framework works superior than one-class support vector machine and the outlier detector without considering the image retrieval process.
Keywords
Blind steganalysis; Image retrieval; Outlier detection;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Janssens, Jeroen H. M., I. Flesch, and E. O. Postma. "Outlier Detection with One-Class Classifiers from ML and KDD." in Proc. of International Conference on Machine Learning and Applications, pp. 147-153, 2009.
2 M. M. Breunig, H. P. Kriegel, R. T. Ng, and J. Sander, "LOF: identifying density-based local outliers," in Proc. of ACM SIGMOD Int. Conf. Manage. Data, pp. 93-104, 2000.
3 T. Gloe and R. Bohme, "The 'Dresden Image Database' for benchmarking digital image forensics," in Proc. of SAC, pp. 1584-1590. 2010.
4 T. Pevny and J. Fridrich, "Merging Markov and DCT features for multi-class JPEG teganalysis," in Proc. of SPIE, Media Watermark., Security, Forensics IX, vol. 6505, pp. 3-14, Feb. 2007.
5 K Yu, L Ji, X Zhang. "Kernel nearest-neighbor algorithm," Neural Processing Letters, pp. 147-156, 20002.
6 S. Gao, "A Hybrid Approach for Camera-Model Detection," International Journal of Security and Its Applications, 2015, Vol. 9, no. 8.
7 V. Holub, J. Fridrich and T. Denemark, "Universal distortion function for steganography in an arbitrary domain," EURASIP Journal on Information Security, pp. 1-13, 2014.
8 L. Guo, J. Ni, and Y. Q. Shi, "An efficient JPEG steganographic scheme using uniform embedding," IEEE Transactions on Information Forensics and Security, vol.9, pp. 169-174, 2012.
9 V. Holub and J. Fridrich, "Low Complexity Features for JPEG Steganalysis Using Undecimated DCT," IEEE Transactions on Information Forensics and Security, Vol. 10, no. 2, 2015.
10 J. Kodovsky, J. Fridrich, and V. Holub, "Ensemble Classifiers for Steganalysis of Digital Media," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 432-444, 2012.   DOI
11 V. Holub and J. Fridrich, "Random projections of residuals for digital image steganalysis," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1996−2006, Dec. 2013.
12 S. Lyu and H. Farid, "Steganalysis using color wavelet statistics and one-class vector support machines," in Proc. of SPIE, Security, Steganography, Watermarking of Multimedia Contents VI, vol. 5306, Jun. 2004.
13 P. Bas, T. Filler, and T. Pevny, "Break our steganographic system: The ins and outs of organizing BOSS," in Proc. of 13th Information Hiding conference, pp. 59-70, 2011.
14 I. Lubenko and A. D. Ker, "Steganalysis with mismatched covers: Do simple classifiers help," in Proc. of 13th Workshop, Multimedia Security, pp. 11-18, 2012.
15 M. Barni, G. Cancelli, and A. Esposito, "Forensics aided steganalysis of heterogeneous images," in Proc. of IEEE Int. Conf. Acoustic Speech and Signal Processing, pp. 1690-1693, 2010.
16 T. Pevny and J. Fridrich, "Novelty detection in blind steganalysis," in Proc. of 10th Workshop, Multimedia Security, pp. 167-176, 2008.
17 I. Lubenko and A. D. Ker, "Going from small to large data in steganalysis," in Proc. of IS&T/SPIE Electron. Image, vol. 8303, p. 83030M, Feb. 2012.
18 X. Hou, T. Zhang, and G. Xiong et al., "Forensics aided steganalysis of heterogeneous bitmap images with different compression history," Ksii Transactions on Internet & Information Systems, vol. 6, no. 8, pp. 1926-1945, Aug. 2012.   DOI
19 G. Cancelli, G. Doerr, I. Cox, and M. Barni, "A comparative study of ${\pm}1$ steganalyzers," in Proc. of IEEE Int. Workshop, Multimedia Signal Processing, pp. 791-796, 2008.
20 T. Pevny and J. Fridrich, "Multiclass detector of current steganographic methods for JPEG format," IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 635-650, Dec. 2008.
21 X. Hou, T. Zhang, and G. Xiong et al., "A novel steganalysis framework of heterogeneous images based on GMM clustering," Signal Process: Image Communication, vol. 29, no. 3, pp. 385-399, Mar. 2014.   DOI
22 S. Cho, M. Gawecki, and C. Kuo, "Content-dependent feature selection for block-based image steganalysis," in Proc. of IEEE Int. Symposium on Circuits and Systems, pp. 1416-1419, 2012.
23 S. Cho, B. Cha, and M. Gawecki et al., "Block-based image steganalysis: Algorithm and performance evaluation," Journal of Visual Communication & Image Representation, vol. 24, no. 7, pp. 846-856, Oct. 2013.   DOI
24 X. Li, X. Kong, B. Wang, Y. Guo, and X. You, "Generalized transfer component analysis for mismatched JPEG steganalysis," in Proc. of IEEE Int. Conf. Image Processing, pp. 4432-4436, 2013.
25 A. D. Ker and T. Pevny, "A new paradigm for steganalysis via clustering," in Proc. of SPIE - The International Society for Optical Engineering, vol.7880, Feb. 2011.
26 A. D. Ker and T. Pevny, "Identifying a steganographer in realistic and heterogeneous data sets," in Proc. of IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, vol. 8303, pp. N01-N13, May 2012.
27 T. Pevny and A. D. Ker, "A mishmash of methods for mitigating the model mismatch mess," in Proc. of SPIE, Media Watermark., Security, and Forensics, vol. 9028, p. 90280I, Feb. 2014.
28 A. D. Ker and T. Pevny, "The steganographer is the outlier: Realistic large-scale steganalysis," IEEE Trans. Inf. Forensics Security, vol. 9, no.9, pp. 1424-1435, Sep. 2014.   DOI
29 W. Ng, Z. He, D. Yeung, and P. Chan, "Steganalysis classifier training via minimizing sensitivity for different imaging sources," Inform. Science, vol. 281, pp. 211-224, May. 2014.   DOI
30 J. Kodovsky, V. Sedighi and J. Fridrich, "Study of cover source mismatch in steganalysis and ways to mitigate its impact," in Proc. of SPIE, Media Watermark., Security, and Forensics, vol. 9028, p. 90280J, Feb. 2014.
31 Kharrazi, M., H. T. Sencar, and N. Memon. "Blind source camera identification," in Proc. of IEEE Int. Conf. Image Processing, pp. 709-712, 2004.
32 Filler, T., J. Fridrich, and M. Goljan. "Using sensor pattern noise for camera model identification," in Proc. of IEEE Int. Conf. Image Processing, pp. 1296-1299, 2008.
33 J. Lukas, J. Fridrich, and M. Goljan. "Determining digital image origin using sensor imperfections," in Proc. of SPIE, Image and Video Communications and Processing, vol. 5685, pp. 249-260, 2005.
34 M. Goljan, Miroslav, J. Fridrich, and T. Filler. "Large scale test of sensor fingerprint camera identification," in Proc. of SPIE, Media Forensics and Security, vol. 7254, 2008.
35 S. Gao, G. S. Xu, and R. M. Hu, "Camera model identification based on the characteristic of CFA and interpolation," in Proc. of International Conference on Digital-Forensics and Watermarking, vol. 7128, pp. 268-280. 2011.
36 Magiera, P., Londahl, C.: ROF Denoising Algorithm (released 2008), http://www.mathworks.com/matlabcentral/fileexchange/22410-rof-denoising-algorithm/content/ ROFdenoise.m.