Multimedia Tools and Applications

, Volume 78, Issue 6, pp 7643–7666 | Cite as

Study on the interaction between the cover source mismatch and texture complexity in steganalysis

  • Donghui HuEmail author
  • Zhongjin Ma
  • Yuqi Fan
  • Shuli Zheng
  • Dengpan Ye
  • Lina Wang


Cover source mismatch (CSM) occurs when a detection classifier for steganalysis trained on objects from one cover source is tested on another source. However, it is very hard to find the same sources as suspicious images in real-world applications. Therefore, the CSM is one of the biggest stumbling blocks to hinder current classifier based steganalysis methods from becoming practical. Meanwhile, the texture complexity (of digital images) also plays an important role in affecting the detection accuracy of steganalysis. Previous work seldom conduct research on the interaction between the two factors of the CSM and the texture complexity (TC). This paper studies the interaction between the two factors and explore certain factor related to cover source mismatch, aiming to improve the steganalysis accuracy in the case of CSM. We propose an effective method to measure the TC via image filtering, and use the two-way analysis of variance to study the interaction between the two factors. Both non-adaptive and adaptive steganography experiments are carried out with different levels of TC and CSM. The experimental results have shown that the interaction between the two factors affects the detection accuracy significantly.


Cover source mismatch Texture complexity Analysis of variance Steganalysis 



This work was supported by the National Natural Science Foundation of China (NSFC) under the grant No. 61379151, U1636219 and U1636101.


  1. 1.
    Bas P, Filler T, Pevnỳ T (2011) Break our steganographic system: the ins and outs of organizing boss. In: Information hiding. Springer, pp 59–70Google Scholar
  2. 2.
    Cancelli G, Doërr G, Barni M, Cox IJ (2008) A comparative study of±steganalyzers. In: 2008 IEEE 10th Workshop on multimedia signal processing. IEEE, pp 791–796Google Scholar
  3. 3.
    Cui J, Ye L, Xu Y, Zhao H, Zha H (2013) Tracking generic human motion via fusion of low- and high-dimensional approaches. IEEE Trans Syst Man Cybern Part B 43(4):996–1002CrossRefGoogle Scholar
  4. 4.
    Farhat F, Ghaemmaghami S (2014) Towards blind detection of low-rate spatial embedding in image steganalysis. IET Image Process 9(1):31–42CrossRefGoogle Scholar
  5. 5.
    Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forens Secur 7(3):868–882CrossRefGoogle Scholar
  6. 6.
    Goljan M, Fridrich J, Holotyak T (2006) New blind steganalysis and its implications. InL Electronic imaging 2006. International Society for Optics and Photonics, pp 607201–607201Google Scholar
  7. 7.
    Hou X, Zhang T, Ji L, Wu Y (2017) Combating highly imbalanced steganalysis with small training samples using feature selection. J Vis Commun Image Represent 49:243–256CrossRefGoogle Scholar
  8. 8.
    Hu D, Ma Z, Fan Y, Wang L (2016) A study of the two-way effects of cover source mismatch and texture complexity in steganalysis. In: International Workshop on digital watermarking. Springer, pp 601–615Google Scholar
  9. 9.
    Huang F, Zhong Y, Huang J (2013) Improved algorithm of edge adaptive image steganography based on lsb matching revisited algorithm. In: Digital-Forensics and watermarking. Springer, pp 19–31Google Scholar
  10. 10.
    Iversen GR, Gergen M (2012) Statistics: the conceptual approach. Springer Science & Business MediaGoogle Scholar
  11. 11.
    Ker AD, Pevnỳ T (2014) A mishmash of methods for mitigating the model mismatch mess. In: IS&T/SPIE Electronic imaging. International Society for Optics and Photonics, pp 90280I–90280IGoogle Scholar
  12. 12.
    Ker AD, Bas P, Böhme R, Cogranne R, Craver S, Filler T, Fridrich J, Pevnỳ T (2013) Moving steganography and steganalysis from the laboratory into the real world. In: Proceedings of the first ACM workshop on information hiding and multimedia security. ACM, pp 45–58Google Scholar
  13. 13.
    Kodovskỳ J, Sedighi V, Fridrich J (2014) Study of cover source mismatch in steganalysis and ways to mitigate its impact. In: IS&T/SPIE Electronic imaging. International Society for Optics and Photonics, pp 90280J–90280JGoogle Scholar
  14. 14.
    Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2015) Action2activity: recognizing complex activities from sensor data. In: International conference on artificial intelligence, pp 1617–1623Google Scholar
  15. 15.
    Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108–115CrossRefGoogle Scholar
  16. 16.
    Lubenko I, Ker AD (2012) Going from small to large data in steganalysis. Proc Spie 8303:16Google Scholar
  17. 17.
    Luo X, Song X, Li X, Zhang W, Lu J, Yang C, Liu F (2016) Steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75(21):13557–13583CrossRefGoogle Scholar
  18. 18.
    Ng WWY, He ZM, Yeung DS, Chan PPK (2014) Steganalysis classifier training via minimizing sensitivity for different imaging sources. Inform Sci 281:211–224CrossRefGoogle Scholar
  19. 19.
    Ojala T, Pietikainen M, Harwood D (1996) A comparative study of texture measures with classification based on featured distributions. Pattern Recogn 29(1):51–59CrossRefGoogle Scholar
  20. 20.
    Pasquet J, Bringay S, Chaumont M (2014) Steganalysis with cover-source mismatch and a small learning database. In: Eusipco 2014, European signal processing Conference, pp 2425–2429Google Scholar
  21. 21.
    Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062–1078CrossRefGoogle Scholar
  22. 22.
    Petrou M, Sevilla PG (2006) Image processing: dealing with texture DBLPGoogle Scholar
  23. 23.
    Pevnỳ T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forens Secur 5(2):215–224CrossRefGoogle Scholar
  24. 24.
    Pevnỳ T, Filler T , Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: International Workshop on information hiding. Springer, pp 161–177Google Scholar
  25. 25.
    Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. In: IS&T/SPIE Electronic imaging. International Society for Optics and Photonics, pp 94090J–94090JGoogle Scholar
  26. 26.
    Rice J (2006) Mathematical statistics and data analysis. Nelson EducationGoogle Scholar
  27. 27.
    Sharp T (2001) An implementation of key-based digital signal steganography. In: Information hiding. Springer, pp 13–26Google Scholar
  28. 28.
    Shi YQ, Sutthiwan P, Chen L (2012) Textural features for steganalysis. In: International Workshop on information hiding. Springer, pp 63–77Google Scholar
  29. 29.
    Walpole RE, Myers R, Myers SL, Keying EY (2012) Essentials of probabilty & statistics for engineers & scientists. Pearson Higher EdGoogle Scholar
  30. 30.
    Wang C, Yang H, Meinel C (Nov 2015) Deep semantic mapping for cross-modal retrieval. In: 2015 IEEE 27th International conference on tools with artificial intelligence (ICTAI), pp 234–241Google Scholar
  31. 31.
    Wang C, Yang H, Bartz C, Meinel C (2016) Image captioning with deep bidirectional lstms. In: Proceedings of the 2016 ACM on multimedia conference, MM ’16. ACM, New York, pp 988–997Google Scholar
  32. 32.
    Wang C, Yang H, Meinel C (2016) A deep semantic framework for multimodal representation learning. Multimed Tools Appl 75(15):9255–9276CrossRefGoogle Scholar
  33. 33.
    Wang C, Yang H, Meinel C (2018) Image captioning with deep bidirectional lstms and multi-task learning. ACM Trans Multimed Comput Commun Appl 14(2s):40,1–40,20Google Scholar
  34. 34.
    Xiong G, Ping X, Zhang T, Hou X (2012) Image textural features for steganalysis of spatial domain steganography. J Electron Imag 21(3):3015CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Computer Science and Information EngineeringHefei University of TechnologyHefeiChina
  2. 2.Anhui Province Key Laboratory of Industry Safety and Emergency TechnologyHefeiChina
  3. 3.School of Cyber Science and EngineeringWuhan UniversityWuhanChina

Personalised recommendations