Skip to main content

Benchmarking for Steganography by Kernel Fisher Discriminant Criterion

  • Conference paper
  • 1271 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7537))

Abstract

In recent years, there have been many steganographic schemes designed by different technologies to enhance their security. And a benchmarking scheme is needed to measure which one is more detectable. In this paper, we propose a novel approach of benchmarking for steganography via Kernel Fisher Discriminant Criterion (KFDC), independent of the techniques in steganalysis. In KFDC, besides between-class variance resembles what Maximum Mean Discrepancy (MMD)merely concentrated on, within-class variance plays another important role. Experiments show that KFDC is qualified for the indication of the detectability of steganographic algorithms. Then, we use KFDC to illustrate detailed analysis on the security of JPEG and spatial steganographic algorithms.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  2. Pevný, T., Fridrich, J.: Benchmarking for Steganography. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 251–267. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  3. Hopper, N.J., Langford, J., von Ahn, L.: Provably Secure Steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 77–92. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Wang, Y., Moulin, P.: Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Trans. on Information Theory 54, 2706–2722 (2008)

    Article  MathSciNet  Google Scholar 

  5. Pevný, T., Filler, T., Bas, P.: Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Kim, Y., Duric, Z., Richards, D.: Modified Matrix Encoding Technique for Minimal Distortion Steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314–327. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  7. Fridrich, J., Pevný, T., Kodovský, J.: Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In: Dittmann, J., Fridrich, J. (eds.) Proc. of the 9th ACM Workshop on Multimedia & Security Workshop (MM&Sec 2007), pp. 3–14. ACM Press, New York (2007)

    Google Scholar 

  8. Kharrazi, M., Sencar, H.T., Memon, N.D.: Benchmarking steganographic and steganalytic techniques. In: Delp, E.J., Wong, P.W. (eds.) Proc. of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 252–263 (2005)

    Google Scholar 

  9. Kodovský, J., Fridrich, J.: Calibration revisited. In: Dittmann, J., Fridrich, J., Craver, S. (eds.) Proc. of the 11th ACM Workshop on Multimedia & Security Workshop (MM&Sec 2009), pp. 63–74. ACM Press, New York (2009)

    Chapter  Google Scholar 

  10. Westfeld, A.: F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  11. Kraetzer, C., Dittmann, J., Lang, A.: Transparency benchmarking on audio watermarks and steganography. In: Delp, E.J., Wong, P.W. (eds.) Proc. of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 6072, pp. 610–621 (2005)

    Google Scholar 

  12. Pevný, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Delp, E.J., Wong, P.W. (eds.) Proc. of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, pp. 3-1–3-14 (2007)

    Google Scholar 

  13. Pevný, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. In: Dittmann, J., Fridrich, J., Craver, S. (eds.) Proc. of the 11th ACM Workshop on Multimedia & Security Workshop (MM&Sec 2009), pp. 63–74. ACM Press, New York (2009)

    Google Scholar 

  14. Davidson, J., Jalan, J.: Steganalysis Using Partially Ordered Markov Models. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 118–132. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  15. Mika, S., Rätsch, G., Weston, J., Schölkopf, B., Müller, K.: Fisher discriminant analysis with kernels. In: Hu, Y., Larsen, J., Wilson, E., Douglas, S. (eds.) Neural Networks for Signal Processing IX, pp. 41–48. IEEE Press, NJ (1999)

    Google Scholar 

  16. Fisher, R.A.: The statistical utilization of multiple measurements. Annals of Eugenics 8, 376–386 (1938)

    Article  Google Scholar 

  17. Chang, C., Lin, C.: LIBSVM: a library for support vector machines (2001), software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm

  18. Hansen, L., Salamon, P.: Neural network ensembles. IEEE Trans. on Pattern Analysis and Machine Intelligence 12(10), 993–1001 (1990)

    Article  Google Scholar 

  19. Kodovský, J., Fridrich, J.: On completeness of feature spaces in blind steganalysis. In: Dittmann, J., et al. (eds.) Proc. of the 10th ACM Workshop on Multimedia & Security Workshop (MM&Sec 2008), pp. 123–132. ACM Press, New York (2008)

    Chapter  Google Scholar 

  20. Müller, K.-R., Mika, S., Rätsch, G., Tsuda, K., Schölkopf, B.: An introduction to kernel-based learning algorithms. IEEE Trans. on Neural Networks 12(2), 181–201 (2001)

    Article  Google Scholar 

  21. Steinwart, I.: On the influence of the kernel on the consistency of support vector machines. Journal of Machine Learning Research 2, 67–93 (2001)

    MathSciNet  Google Scholar 

  22. Sallee, P.: Model-Based Steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  23. Hetzl, S., Mutzel, P.: A Graph–Theoretic Approach to Steganography. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 119–128. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  24. Mielikainen, J.: LSB matching revisited. IEEE Signal Processing Letters 13(5), 285–287 (2006)

    Article  Google Scholar 

  25. Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory 47(4), 1423–1443 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  26. Marvel, L., Boncelet, C., Retter, C.: Spread spectrum image steganography. IEEE Trans. on Image Processing 8(8), 1075–1083 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Huang, W., Zhao, X., Feng, D., Sheng, R. (2012). Benchmarking for Steganography by Kernel Fisher Discriminant Criterion. In: Wu, CK., Yung, M., Lin, D. (eds) Information Security and Cryptology. Inscrypt 2011. Lecture Notes in Computer Science, vol 7537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34704-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34704-7_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34703-0

  • Online ISBN: 978-3-642-34704-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics