Abstract
We consider the problem of steganalysis of multi-carrier spread-spectrum steganography in which secret data are embedded over a wide band in a spectrum (transform) domain of a digital medium. The objective is first to identify the presence or absence of hidden data in a given image (i.e., passive steganalysis). Unlike conventional feature-based passive steganalysis algorithms, we describe an unsupervised (blind) low-complexity approach based on iterative generalized least-squares principles that may enable rapid high-volume image processing. Extensive experiments on image sets and comparisons with existing passive steganalysis techniques demonstrate most satisfactory classification performance measured in probability of correct detection versus induced false alarm rate. If the existence of hidden data is identified, we then aim to detect the number of carriers (messages) and blindly extract the hidden data without the knowledge of the original host nor the embedding carriers. This task is also known as active/forensic steganalysis. Experimental studies on images show that the developed algorithm can achieve recovery probability of error close to what may be attained with known embedding carriers.
Similar content being viewed by others
Notes
References
İ. Avcıbaş, N. Memon, B. Sankur, Steganalysis using image quality metrics. IEEE Trans. Image Process. 12, 221–229 (2003)
M. Barni, F. Bartolini, A. De Rosa, A. Piva, A new decoder for the optimum recovery of nonadditive watermarks. IEEE Trans. Image Process. 10, 755–766 (2001)
C. Cachin, An information-theoretic model for steganography, in Proc. 2nd Int. Workshop Inf. Hiding, (Portland, OR, Apr. 1998), pp. 306–318
J.F. Cardoso, High-order contrasts for independent component analysis. Neural Computation 11, 157–192 (1999)
T.M. Cover, J.A. Thomas, Elements of Information Theory, 2nd edn. (John Wiley, Hoboken, 2006)
I.J. Cox, J. Kilian, F.T. Leighton, T. Shannon, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 1673–1687 (1997)
R.O. Duda, P.E. Hart, D.G. Stork, Pattern Classification, 2nd edn. (Wiley, Hoboken, 2000)
H. Farid, Detecting hidden messages using higher-order statistical models, in itProc. IEEE Intern. Conf. Image Process. (ICIP), (New York, Sept. 2002), pp. 905–908
C. Fei, D. Kundur, R.H. Kwong, Analysis and design of watermarking algorithms for improved resistance to compression. IEEE Trans. Image Process. 13, 126–144 (2004)
T. Filler, T. Pevny, P. Bas. BOSS, Break Our Steganography System. http://www.agents.cz/boss/
J. Fridrich, Steganography in Digital Media, Principles, Algorithms, and Applications (Cambridge University Press, Cambridge, 2010)
M. Gkizeli, D.A. Pados, S.N. Batalama, M.J. Medley, Blind iterative recovery of spread-spectrum steganographic messages, in Proc. IEEE Intern. Conf. Image Process. (ICIP), (Genova, Sept. 2005), vol. 2, pp. 11–14
M. Gkizeli, D.A. Pados, M.J. Medley, SINR, bit error rate, and Shannon capacity optimized spread-spectrum steganography, in Proc. IEEE Intern. Conf. Image Process. (ICIP), (Singapore, Oct. 2004), vol. 2, pp. 1561–1564
M. Gkizeli, D.A. Pados, M.J. Medley, Optimal carrier design for spread-spectrum steganography. IEEE Trans. Image Process. 16, 391–405 (2007)
G. Gul, F. Kurugollu, SVD-based universal spatial domain image steganalysis. IEEE Trans. Inf. Forens. Secur. 5, 349–353 (2010)
J. Hernandez, M. Amado, F. Perez-Gonzalez, DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Trans. Image Process. 9, 55–68 (2000)
A. Hyvärinen, E. Oja, A fast fixed-point algorithm for independent component analysis. Neural Computation 9, 1483–1492 (1997)
N.F. Johnson, S. Katzenbeisser, A survey of steganographic techniques, in Information Hiding, ed. by S. Katzenbeisser, F. Peticolas (Artech House, Norwood, 2000), pp. 43–78
M. Li, S. N. Batalama, and D. A. Pados, Population size identification for CDMA eavesdropping, in Proc. IEEE Military Commun. Conf. (MILCOM), (Orlando, FL, Oct. 2007), pp. 1–6
M. Li, S. N. Batalama, D. A. Pados, and J. D. Matyjas, Multiuser CDMA signal extraction, in Proc. IEEE Military Commun. Conf. (MILCOM), (Washington D.C., Oct. 2006), pp. 1–5
T. Li, N.D. Sidiropoulos, Blind digital signal separation using successive interference cancellation iterative least squares. IEEE Trans. Signal Process. 48, 3146–3152 (2000)
M. Li, M. Kulhandjian, D.A. Pados, S.N. Batalama, M.J. Medley, Extracting spread-spectrum hidden data from digital media. IEEE Trans. Inf. Forens. Secur 8(7), 1201–1210 (2013)
W. Lie, G. Lin, A feature-based classification technique for blind image steganalysis. IEEE Trans. Multimed. 7, 1007–1020 (2005)
S. Lyu, H. Farid, Steganalysis using higher-order image statistics. IEEE Trans. Inf. Forens. Secur. 1, 111–119 (2006)
H.S. Malvar, D.A. Florencio, Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans. Signal Process. 51, 898–905 (2003)
D.G. Manolakis, V.K. Ingle, S.M. Kogon, Statistical and Adaptive Signal Processing: Spectral Estimation, Signal Modeling, Adaptive Filtering and Array Processing (McGraw-Hill, Boston, 2000)
C.D. Meyer, Matrix Analysis and Applied Linear Algebra (SIAM, Philadelphia, 2000)
L. Pérez-Freire, F. Pérez-González, Spread-spectrum watermarking security. IEEE Trans. Inf. Forens. Secur. 4, 2–24 (2009)
T. Pevny, P. Bas, J. Fridrich, Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forens. Secur. 5, 215–224 (2010)
C. Qiang, T.S. Huang, An additive approach to transform-domain information hiding and optimum detection structure. IEEE Trans. Multimed. 3, 273–284 (2001)
G. J. Simmons, The prisoner’s problem and the subliminal channel, in Advances in Cryptology: Proc. CRYPTO’83, (New York: Plenum, 1984), pp. 51–67
S. Talwar, A. Paulraj, Blind separation of synchronous co-channel digital signals using an antenna array—part II: performance analysis. IEEE Trans. Signal Process. 45, 706–718 (1997)
S. Talwar, M. Viberg, A. Paulraj, Blind separation of synchronous co-channel digital signals using an antenna array—part I: algorithms. IEEE Trans. Signal Process. 44, 1184–1197 (1996)
The federal plan for cyber security and information assurance research and development, reported by the interagency working group on cyber security and information assurance, (Apr. 2006)
S. Trivedi, R. Chandramouli, Secret key estimation in sequential steganography. IEEE Trans. Signal Process. 53, 746–757 (2005)
A. Valizadeh, Z.J. Wang, Correlation-and-bit-aware spread spectrum embedding for data hiding. IEEE Trans. Inf. Forens. Secur. 6, 267–282 (2011)
Y. Wang, P. Moulin, Steganalysis of block-DCT image steganography, in Proc. IEEE Workshop on Statistical Signal Process., (Saint-Louis, MO, Sept, 2003), pp. 339–342
S. Wang, H. Wang, Cyber warfare: steganography vs. steganalysis. Commun. ACM 47, 76–82 (2004)
Y. Wang, P. Moulin, Optimized feature extraction for learning-based image steganalysis. IEEE Trans. Inf. Forens. Secur. 2, 31–45 (2007)
M. Wax, Detection and localization of multiple sources via the stochastic signals model. IEEE Trans. Signal Process. 39, 2450–2456 (1991)
M. Wax, T. Kailath, Detection of signals by information theroretic criteria. IEEE Trans. Acoust. Speech Signal Process. 33, 387–392 (1985)
Y. Yao, H.V. Poor, Eavesdropping in the synchronous CDMA channel: an EM-based approach. IEEE Trans. Signal Process. 49, 1748–1756 (2001)
Author information
Authors and Affiliations
Corresponding author
Additional information
This work was supported by the Fundamental Research Funds for the Central Universities (Grant No. DUT14RC(3)103). This paper was presented in part at the IEEE Int. Conf. Image Process. (ICIP), Brussels, Belgium, Sept. 2011.
Rights and permissions
About this article
Cite this article
Li, M., Liu, Q. Steganalysis of SS Steganography: Hidden Data Identification and Extraction. Circuits Syst Signal Process 34, 3305–3324 (2015). https://doi.org/10.1007/s00034-015-0007-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00034-015-0007-7