Skip to main content

Steganalysis Based on Differential Statistics

  • Conference paper
Cryptology and Network Security (CANS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4301))

Included in the following conference series:

Abstract

Differential statistics were proposed in this paper to disclose the existence of hidden data in grayscale raw images. Meanwhile, differential statistics were utilized to improve the algorithm introduced by Fridrich to attack steganographic schemes in grayscale JPEG images. In raw images, to describe the correlation between data and their spatial positions, co-occurrence matrix based on intensities of adjacent pixels was adopted and the use of co-occurrence matrix was extended to high-order differentiations. The COMs (center of mass) of HCFs (histogram character function) were calculated from these statistics to form a 30-dimensional feature vector for steganalysis. For JPEG files, differential statistics were collected from boundaries of DCT blocks in their decompressed images. The COM of HCF was computed for each of these differential statistics and statistics from DCT domain so that a 28-dimensional feature vector can be extracted from a JPEG image. Two blindly steganalytic algorithms were constructed based on Support Vector Machine and the two kinds of feature vectors respectively. The presented methods demonstrate higher detecting rates with lower false positives than known schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Harmsen, J.J., Pearlman, W.A.: Steganalysis of additive noise modelable information hiding. In: Proc. SPIE Electronic Imaging, Santa Clara, CA, January 21-24, vol. 5022, pp. 131–142 (2003)

    Google Scholar 

  2. Harmsen, J.J., Bowers, K.D., Pearlman, W.A.: Fast Additive Noise Steganalysis. In: Proc. SPIE Symposium on Electronic Imaging, San Jose, CA, January 19-22, pp. 489–495 (2004)

    Google Scholar 

  3. Cox, I.J., Kilian, J., Leighton, T., et al.: Secure spread spectrum watermarking for multimedia. IEEE Transaction on Image Processing 6(12), 1673–1687 (1997)

    Article  Google Scholar 

  4. Piva, A., Barni, M., Bartolini, E., et al.: DCT-based watermark recovering without resorting to the uncorrupted original image. In: Proceedings of 4th IEEE International Conference on Image Processing ICIP 1997, Atlanta, USA, pp. 520–523 (1997)

    Google Scholar 

  5. Ker, A.: Steganalysis of LSB matching in grayscale images. IEEE. Signal Processing Letters 12(6), 441–444 (2005)

    Article  Google Scholar 

  6. Shi, Y.Q., Xuan, G., Zou, D., Gao, J., Yang, C., Zhang, Z., Chai, P., Chen, W., Chen, C.: Steganalysis Based on Moments of Characteristic Functions Using Wavelet Decomposition, Prediction-Error Image, and Neural Network. In: Proc. ICME 2005, Amsterdam, Netherlands, July 6-8, pp. 269–272 (2005)

    Google Scholar 

  7. Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340–354. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Pevny, T., Fridrich, J.: Towards Multi-class Blind Steganalyzer for JPEG Images. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 39–53. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Upham, D.: Jsteg. ftp.funet.fi

    Google Scholar 

  11. Westfeld, A.: F5, http://wwwrn.inf.tu-dresden.de/

  12. Provos, N.: http://Outguess.www.outguess.org/

  13. Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics 5(1), 167–189 (2005)

    Article  Google Scholar 

  14. Hetzl, S.: http://steghide.sourceforge.net/

  15. Bohme, R., Westfeld, A.: Breaking cauchy model-based. jpeg steganography with first order statistics. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 125–140. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Lyu, S., Farid, H.: Steganalysis Using Color Wavelet Statistics and One-Class Support Vector Machines. In: Proc. SPIE Symposium on Electronic Imaging, San Jose, CA, January 19-22, pp. 35–45 (2004)

    Google Scholar 

  17. http://www.corel.com/

  18. http://www.cs.washington.edu/

  19. Chandramouli, R., Kharrazi, M., Memon, N.D.: Image Steganography and Steganalysis: Concepts and Practice. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 35–49. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  20. Wallace, G.: The JPEG Still Picture Compression Standard. Communications of the ACM 34(4), 30–44 (1991)

    Article  Google Scholar 

  21. Chih-Chung, C., Chih-Jen, L.: LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm

  22. Shi, Y.Q., Xuan, G., Yang, C., Gao, J., Zhang, Z., Chai, P., Zou, D., Chen, C., Chen, W.: Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function. ITCC (1), 768–773 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, Z., Ping, L., Chen, J., Wang, J., Pan, X. (2006). Steganalysis Based on Differential Statistics. In: Pointcheval, D., Mu, Y., Chen, K. (eds) Cryptology and Network Security. CANS 2006. Lecture Notes in Computer Science, vol 4301. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11935070_16

Download citation

  • DOI: https://doi.org/10.1007/11935070_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49462-1

  • Online ISBN: 978-3-540-49463-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics