Browse > Article
http://dx.doi.org/10.3837/tiis.2017.11.023

Detection for JPEG steganography based on evolutionary feature selection and classifier ensemble selection  

Ma, Xiaofeng (State key Laboratory of Mathematical Engineering and Advanced Computing)
Zhang, Yi (State key Laboratory of Mathematical Engineering and Advanced Computing)
Song, Xiangfeng (Xi'an Communication Institute)
Fan, Chao (Zhengzhou Science and Technology Institute)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.11, no.11, 2017 , pp. 5592-5609 More about this Journal
Abstract
JPEG steganography detection is an active research topic in the field of information hiding due to the wide use of JPEG image in social network, image-sharing websites, and Internet communication, etc. In this paper, a new steganalysis method for content-adaptive JPEG steganography is proposed by integrating the evolutionary feature selection and classifier ensemble selection. First, the whole framework of the proposed steganalysis method is presented and then the characteristic of the proposed method is analyzed. Second, the feature selection method based on genetic algorithm is given and the implement process is described in detail. Third, the method of classifier ensemble selection is proposed based on Pareto evolutionary optimization. The experimental results indicate the proposed steganalysis method can achieve a competitive detection performance by compared with the state-of-the-art steganalysis methods when used for the detection of the latest content-adaptive JPEG steganography algorithms.
Keywords
JPEG steganography; steganalysis; detection; feature selection; classifier ensemble;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 L. F. Yu, Y. Zhao, R. R. Ni, Z. F. Zhu. "PM1 steganography in JPEG images using genetic algorithm," Soft Computing, vol. 13, no. 4, pp. 393-400, February, 2009.   DOI
2 D. Whitley, "A genetic algorithm tutorial," Statistics and computing, vol. 4, no. 2, pp. 65-85, June, 1994.   DOI
3 S. Lin, B. W. Kernighan, "An effective heuristic algorithm for the traveling-salesman problem," Operations research, vol.21, no.2, pp. 498-516, April, 1973.   DOI
4 T. Denemark, J. Fridrich, "Steganography with Multiple JPEG Images of the Same Scene," IEEE Transactions on Information Forensics and Security," vol.12, no.10, pp. 2308-2319, October, 2017.   DOI
5 T. Pevny, T. Filler, P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Proc of the 12th International Workshop on Information Hiding, pp. 161-177, June 28-30, 2010.
6 B. Li, M. Wang, X. L. Li, S. Q. Tan, J. W. Huang, "A strategy of clustering modification directions in spatial image steganography," IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 1905-1917, September, 2015.   DOI
7 W. M. Zhang, Z. Zhang, L. L. Zhang, H. Y. Li N. H. Yu, "Decomposing Joint Distortion for Adaptive Steganography," IEEE Transactions on Circuits and Systems for Video Technology, vol.PP, no.99, pp.1-1, July, 2016.
8 F. J. Huang, J. W. Huang, Y. Q. Shi, "New Channel Selection Rule for JPEG Steganography," IEEE Transactions on Information Forensics and Security, vol. 7, no. 4, pp. 1181-1191, August, 2012.   DOI
9 V. Holub and J. Fridrich, "Digital image steganography using universal distortion," in Proc. of 1st ACM IH&MMSec. Workshop, pp.59-68, June 20-22, 2013.
10 L. J. Guo, J. Q. Ni, Y. Q. Shi, "Uniform embedding for efficient JPEG steganography," IEEE Transactions on Information Forensics and Security, vol.9, no.5, pp. 814-825, May, 2014.   DOI
11 J. Kodovsky and J. Fridrich, "Steganalysis of JPEG images using rich models," in Proc. of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, pp. 0A 1-13, January 22-26, 2012.
12 F. Y. Li, X. P. Zhang, J. Yu, W. F, Shen, "Adaptive JPEG steganography with new distortion function," Annals of Telecommunications, vol. 69, no. 7, pp. 431-440, August, 2014.   DOI
13 Z. C. Wang, X. P. Zhang, Z. X. Yin, "Hybrid distortion function for JPEG steganography," Journal of Electronic Imaging, vol. 25, no. 5, pp. 050501, September, 2016.   DOI
14 T. Filler, J. Judas, and J. Fridrich, "Minimizing additive distortion in steganography using syndrome-trellis codes," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 920-935, September, 2011.   DOI
15 V. Holub, J. Fridrich, "Phase-Aware Projection Model for Steganalysis of JPEG Images," in Proc. of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, pp. 94090T-94090T-11, February 8-12, 2015..
16 V. Holub and J. Fridrich, "Low Complexity Features for JPEG Steganalysis Using Undecimated DCT," IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, pp. 219-228, February, 2015.   DOI
17 J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications, Cambridge University Press, Cambridge, 2010.
18 H. Q. Wang, S. Z. Wang, "Cyber warfare: steganography vs. steganalysis," Communications of the ACM, vol. 47, no. 10, pp. 76-82, October, 2004.   DOI
19 X. F. Song, F. L. Liu, C. F. Yang, X. Y. Luo and Y. Zhang, "Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters," in Proc. of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 15-23, June 17-19, 2015..
20 G. S. Xu, H. Z. Wu, Y. Q. Shi, "Structural Design of Convolutional Neural Networks for Steganalysis," IEEE Signal Processing Letters, vol.23, no.5, pp.708-712, May, 2016.   DOI
21 S. Q. Tan, B. Li, "Stacked convolutional auto-encoders for steganalysis of digital images," in Proc of Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, pp.1-4, December 9-12, 2015.
22 X. F. Song, F. L. Liu, C. F. Yang, X. Y. Luo, "2D Gabor Filters based steganalysis of content-adaptive JPEG Steganography," Multimedia Tools and Application, December, 2016.
23 Y. L. Qian, J. Dong, W. Wang, et al, "Deep learning for steganalysis via convolutional neural networks," in Proc of SPIE Media Watermarking, Security, and Forensics 2015, Part of IS&T International Symposium on Electronic Imaging," pp. 94090J-94090J-10, 2015.
24 J. S. Zeng, S. Q. Tan, B. Li, et al, "Large-scale JPEG steganalysis using hybrid deep-learning framework," arXiv preprint arXiv:1611.03233v2, 2017.
25 M. Chen, V. Sedighi, M. Boroumand, J. Fridrich, "JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images," in Proc. of the 5rd ACM Workshop on Information Hiding and Multimedia Security, pp. 75-84, June 20-22, 2017.
26 Y. Zhang, F. L. Liu, C. F. Yang, et al, "Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank," Journal of Electronic Imaging, vol. 26, no. 1, pp. 013011-013011, February, 2017.   DOI
27 V. Sachnev, H. J. Kim, "Binary Coded Genetic Algorithm with Ensemble Classifier for feature selection in JPEG steganalysis," in Proc of the 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, pp.1-6, April 21-24, 2014.
28 X. F. Song, F. L. Liu, C. F. Yang, et al, "Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion," KSII Transactions on Internet and Information Systems, vol. 9, no. 12, pp. 5209-5228, December, 2015.   DOI
29 T. Denemark, M. Boroumand, J. Fridrich, "Steganalysis Features for Content-Adaptive JPEG Steganography," IEEE Transactions on Information Forensics and Security, vol. 11, no. 8, pp. 1736-1746, August, 2016.   DOI
30 J. Kodovsky, J. Fridrich and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Transactions on Information Forensics and Security, vol.7, no. 2, pp. 432-444, April, 2012.   DOI
31 B. Cao, G. R. Feng, Z. X. Yin, "Optimizing Feature for JPEG Steganalysis via Gabor Filter and Co-occurrences Matricesm," in Proc of the International Conference on Cloud Computing and Security, pp.84-93, July 29-31, 2016.
32 F. Y. Li, X. P. Zhang, B. Chen, et al, "JPEG steganalysis with high-dimensional features and Bayesian ensemble classifier," IEEE Signal Processing Letters, vol.20, no. 3, pp.233-236, March, 2013.   DOI
33 R. Cogranne, V. Sedighi, J. Fridrich, et al, "Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?," in Proc of the IEEE International Workshop on Information Forensics and Security, pp.1-6, November, 2015.
34 C. L. Qian, Y. Yu, Z. H, Zhou. "Pareto Ensemble Pruning," in Proc of the Twenty-Ninth AAAI Conference on Artificial Intelligence, pp. 2935-2941, January, 2015.
35 R. T. Marler, J. S. Arora, "Survey of multi-objective optimization methods for engineering," Structural and multidisciplinary optimization, vol. 26, no. 6, pp. 369-395, April, 2004.   DOI