Abstract
In recent years, there have been many steganographic schemes designed by different technologies to enhance their security. And a benchmarking scheme is needed to measure which one is more detectable. In this paper, we propose a novel approach of benchmarking for steganography via Kernel Fisher Discriminant Criterion (KFDC), independent of the techniques in steganalysis. In KFDC, besides between-class variance resembles what Maximum Mean Discrepancy (MMD)merely concentrated on, within-class variance plays another important role. Experiments show that KFDC is qualified for the indication of the detectability of steganographic algorithms. Then, we use KFDC to illustrate detailed analysis on the security of JPEG and spatial steganographic algorithms.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)
Pevný, T., Fridrich, J.: Benchmarking for Steganography. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 251–267. Springer, Heidelberg (2008)
Hopper, N.J., Langford, J., von Ahn, L.: Provably Secure Steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 77–92. Springer, Heidelberg (2002)
Wang, Y., Moulin, P.: Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Trans. on Information Theory 54, 2706–2722 (2008)
Pevný, T., Filler, T., Bas, P.: Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010)
Kim, Y., Duric, Z., Richards, D.: Modified Matrix Encoding Technique for Minimal Distortion Steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314–327. Springer, Heidelberg (2007)
Fridrich, J., Pevný, T., Kodovský, J.: Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In: Dittmann, J., Fridrich, J. (eds.) Proc. of the 9th ACM Workshop on Multimedia & Security Workshop (MM&Sec 2007), pp. 3–14. ACM Press, New York (2007)
Kharrazi, M., Sencar, H.T., Memon, N.D.: Benchmarking steganographic and steganalytic techniques. In: Delp, E.J., Wong, P.W. (eds.) Proc. of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 252–263 (2005)
Kodovský, J., Fridrich, J.: Calibration revisited. In: Dittmann, J., Fridrich, J., Craver, S. (eds.) Proc. of the 11th ACM Workshop on Multimedia & Security Workshop (MM&Sec 2009), pp. 63–74. ACM Press, New York (2009)
Westfeld, A.: F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Kraetzer, C., Dittmann, J., Lang, A.: Transparency benchmarking on audio watermarks and steganography. In: Delp, E.J., Wong, P.W. (eds.) Proc. of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 6072, pp. 610–621 (2005)
Pevný, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Delp, E.J., Wong, P.W. (eds.) Proc. of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, pp. 3-1–3-14 (2007)
Pevný, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. In: Dittmann, J., Fridrich, J., Craver, S. (eds.) Proc. of the 11th ACM Workshop on Multimedia & Security Workshop (MM&Sec 2009), pp. 63–74. ACM Press, New York (2009)
Davidson, J., Jalan, J.: Steganalysis Using Partially Ordered Markov Models. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 118–132. Springer, Heidelberg (2010)
Mika, S., Rätsch, G., Weston, J., Schölkopf, B., Müller, K.: Fisher discriminant analysis with kernels. In: Hu, Y., Larsen, J., Wilson, E., Douglas, S. (eds.) Neural Networks for Signal Processing IX, pp. 41–48. IEEE Press, NJ (1999)
Fisher, R.A.: The statistical utilization of multiple measurements. Annals of Eugenics 8, 376–386 (1938)
Chang, C., Lin, C.: LIBSVM: a library for support vector machines (2001), software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm
Hansen, L., Salamon, P.: Neural network ensembles. IEEE Trans. on Pattern Analysis and Machine Intelligence 12(10), 993–1001 (1990)
Kodovský, J., Fridrich, J.: On completeness of feature spaces in blind steganalysis. In: Dittmann, J., et al. (eds.) Proc. of the 10th ACM Workshop on Multimedia & Security Workshop (MM&Sec 2008), pp. 123–132. ACM Press, New York (2008)
Müller, K.-R., Mika, S., Rätsch, G., Tsuda, K., Schölkopf, B.: An introduction to kernel-based learning algorithms. IEEE Trans. on Neural Networks 12(2), 181–201 (2001)
Steinwart, I.: On the influence of the kernel on the consistency of support vector machines. Journal of Machine Learning Research 2, 67–93 (2001)
Sallee, P.: Model-Based Steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)
Hetzl, S., Mutzel, P.: A Graph–Theoretic Approach to Steganography. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 119–128. Springer, Heidelberg (2005)
Mielikainen, J.: LSB matching revisited. IEEE Signal Processing Letters 13(5), 285–287 (2006)
Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory 47(4), 1423–1443 (2001)
Marvel, L., Boncelet, C., Retter, C.: Spread spectrum image steganography. IEEE Trans. on Image Processing 8(8), 1075–1083 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, W., Zhao, X., Feng, D., Sheng, R. (2012). Benchmarking for Steganography by Kernel Fisher Discriminant Criterion. In: Wu, CK., Yung, M., Lin, D. (eds) Information Security and Cryptology. Inscrypt 2011. Lecture Notes in Computer Science, vol 7537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34704-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-34704-7_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34703-0
Online ISBN: 978-3-642-34704-7
eBook Packages: Computer ScienceComputer Science (R0)