Skip to main content

Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3727))

Abstract

In this paper, a steganalysis scheme based on multiple features formed by statistical moments of wavelet characteristic functions is proposed. Our theoretical analysis has pointed out that the defined n-th statistical moment of a wavelet characteristic function is related to the n-th derivative of the corresponding wavelet histogram, and hence is sensitive to data embedding. The selection of the first three moments of the characteristic functions of wavelet subbands of the three-level Haar wavelet decomposition as well as the test image has resulted in total 39 features for steganalysis. The effectiveness of the proposed system has been demonstrated by extensive experimental investigation. The detection rate for Cox et al.’s non-blind spread spectrum (SS) data hiding method, Piva et al.’s blind SS method, Huang and Shi’s 8×8 block SS method, a generic LSB method (as embedding capacity being 0.3 bpp), and a generic QIM method (as embedding capacity being 0.1 bpp) are all above 90% over all of the 1096 images in the CorelDraw image database using the Bayes classifier. Furthermore, when these five typical data hiding methods are jointly considered for steganalysis, i.e., when the proposed steganalysis scheme is first trained sequentially for each of these five methods, and is then tested blindly for stego-images generated by all of these methods, the success classification rate is 86%, thus pointing out a new promising approach to general blind steganalysis. The detection results of steganalysis on Jsteg, Outguess and F5 have further demonstrated the effectiveness of the proposed steganalysis scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340–354. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Harmsen, J.J.: Steganalysis of Additive Noise Modelable Information Hiding. Master Thesis of Rensselaer Polytechnic Institute, Troy, New York, advised by Professor W. A. Pearlman (2003)

    Google Scholar 

  3. Leon-Garcia, A.: Probability and Random Processes for Electrical Engineering, 2nd edn. Addison-Wesley, Reading (1994)

    Google Scholar 

  4. Mitrinovic, D.S., Pecaric, J.E., Fink, A.M.: Classical and New Inequalities in Analysis. Kluwer Academic Publishers, The Netherlands (1993)

    MATH  Google Scholar 

  5. CorelDraw Software, http://www.corel.com

  6. Christopoulos, C., Skodras, A., Ebrahimi, T.: The JPEG2000 Still Image Coding Sysyem: An Overview. IEEE Transactions on Consumer Electronics 46, 1103–1127 (2000)

    Article  Google Scholar 

  7. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing 6, 1673–1687 (1997)

    Article  Google Scholar 

  8. Fukunaga, K.: Introduction to Statistical Pattern Recognition, 2nd edn. Academic Press Inc., Boston (1990)

    MATH  Google Scholar 

  9. The MNIST DATABASE of handwritten digits. Yann Le Cun, NEC Research Institute, http://yann.lecun.com/exdb/mnist/

  10. Piva, A., Barni, M., Bartolini, E., Cappellini, V.: DCT-based Watermark Recovering without Resorting to the Uncorrupted Original Image. In: Proc. of the 1997 International Conference on Image Processing, vol. 1, p. 520 (1997)

    Google Scholar 

  11. Huang, J., Shi, Y.Q.: An adaptive image watermarking scheme based on visual masking. IEE Electronic Letters 34, 748–750 (1998)

    Article  Google Scholar 

  12. Chen, B., Wornell, G.W.: Digital watermarking and information embedding using dither modulation. In: Proc. of IEEE Second Workshop of Multimedia Signal Processing. Los Angeles, CA, (December 1998) pp. 273–278 (1998)

    Google Scholar 

  13. Xuan, G., Shi, Y.Q., Ni, Z.: Reversible data hiding using integer wavelet transform and companding technique. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 115–124. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Jsteg V4, by Derek Upham, is available at ftp.funet.fi

  15. OutGuess, by Niels Provos is available at: http://www.outguess.org

  16. F5, by Westfeld, A. is available at: http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html

  17. Xuan, G., Chai, P., Wu, M.: Bhattacharyya distance feature selection. In: Proceedings of the 13th International Conference on Pattern Recognition, Vienna, Austria, August 25-29, pp. 195–199 (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xuan, G. et al. (2005). Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds) Information Hiding. IH 2005. Lecture Notes in Computer Science, vol 3727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558859_20

Download citation

  • DOI: https://doi.org/10.1007/11558859_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29039-1

  • Online ISBN: 978-3-540-31481-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics