Skip to main content
Log in

A novel blind detector for additive noise steganography in JPEG decompressed images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a novel universal steganalyzer for additive noise steganography in JPEG decompressed images. On the basis of the influence of the message embedding on the statistical distributions of alternating current (ac) discrete cosine transform (DCT) coefficients, we first develop a new steganalytic feature which is defined as the ratio between different ranges of the normalized ac coefficients histogram. Then a powerful blind detector is constructed with the proposed one-dimensional (1-D) feature. Extensive experimental results demonstrate that the proposed steganalyzer outperforms the existing state-of-the-art schemes significantly and even can detect the additive noise steganography effectively at a very low embedding rate. In addition, our method using a 1-D feature is not only practical and real-time, but also can provide a better control of the false positive rate and the false negative rate by adjusting the detection threshold. Moreover, the proposed feature can also be used to identify JPEG compression besides steganalysis, which indicates that our method has a great promise in practical applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Abbreviations

ac:

Alternating current

DCT:

Discrete cosine transform

1-D:

One-dimensional

LSB:

Least significant bit

SSIS:

Spread spectrum image steganography

SM:

Stochastic modulation

RS:

Regular and singular

AHCF-COM:

The center of the mass of the adjacency histogram characteristic function

ALE:

The amplitude of local extrema

CAM:

Central absolute moment

WAM:

Wavelet absolute moments

SPAM2nd:

The second subtractive pixel adjacency matrix

bpp:

Bit per pixel

pdf:

Probability density function

pmf:

Probability mass function

ROC:

Receiver operation characteristic

SVM:

Support vector machine

References

  1. Bas P, Furon T (2007) BOWS-2 [online]. http://bows2.gipsa-lab.inpg.fr. Accessed May 11 2010

  2. Cancelli G, Doёrr G, Barni M, Cox I (2008) A comparative study of ±1 steganalyzers. In Proc. IEEE Int. Workshop on Multimedia Signal Processing, pp 791–796

  3. Doёrr G Image database for steganalysis studies [Online]. http://www.cs.ucl.ac.uk/staff/I.Cox/Content/Downloads.html. Accessed May 11 2009

  4. Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007. doi:10.1109/TSP.2003.812753

    Article  Google Scholar 

  5. Fridrich J, Goljan M (2003) Digital image steganography using stochastic modulation. In Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, CA, 5020: 191–202

  6. Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color and gray-scale images. IEEE Multimedia 8(4):22–28

    Article  Google Scholar 

  7. Fridrich J, Goljan M, Du R (2001) Steganalysis based on JPEG compatibility. In Proc. Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, Multimedia Systems and Applications IV, pp 275–280

  8. Fridrich J, Soukal D, Goljan M (2005) Maximum likelihood estimation of secret message length embedded using ±k steganography in spatial domain. In Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, 5681: 595–606

  9. Goljan M, Fridrich J, Holotyak T (2006) New blind steganalysis and its implications. In Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, 6072: 1–13

  10. Harmsen J, Pearlman W (2003) Steganalysis of additive noise modelable information hiding. In Proc. SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, Santa Clara, CA, 5020: 131–142

  11. Holotyak T, Fridrich J, Voloshynovskiy S (2005) Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In Proc. 9th IFIP TC-6 TC-11 Conf. Communications and Multimedia Security, Salzburg, Austria, 3677: 273–274

  12. Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444. doi:10.1109/LSP.2005.847889

    Article  Google Scholar 

  13. Ker AD, Lubenko I (2009) Feature reduction and payload location with WAM steganalysis. In Proc. SPIE, Electronic Imaging, Media Forensics and Security, 7254: 0A01–0A13. doi: 10.1117/12.805910

  14. Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10(5):746–757. doi:10.1109/TMM.2008.922795

    Article  Google Scholar 

  15. Lin TL, Horng SJ, Lee KH, Chiu PL, Kao TW, Chen YH, Run RS, Lai JL, Chen RJ (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37:7858–7869. doi:10.1016/j.eswa.2010.04.051

    Article  Google Scholar 

  16. Lin TL, Horng SJ, Lee KH, Chiu PL, Kao TW, Run RS, Lai JL, Chen RJ (2010) A visual sharing scheme for multiple secrets by camouflaging process. Int J Innov Comput Inform Cont 6(12):5749–5769

    Google Scholar 

  17. Luo WQ, Huang FJ, Huang JW (2010) JPEG error analysis and its applications to digital image forensics. IEEE Trans Inf Forensics Security 5(3):480–491. doi:10.1109/TIFS.2010.2051426

    Article  Google Scholar 

  18. Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075–1083

    Article  Google Scholar 

  19. NRCS Photo Gallery [Online]. http://photogallery.nrcs.usda.gov/. Accessed August 22 2009

  20. Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062–1078. doi:S0018-9219(99)04946-4

    Article  Google Scholar 

  21. Pevný T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Security 5(2):215–224. doi:10.1109/TIFS.2010.2045842

    Article  Google Scholar 

  22. Schaefer G, Stich M (2003) UCID: an uncompressed color image database. In Proc. SPIE, Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia. 5307: 472–480

  23. Sharp T (2001) An implementation of key-based digital signal steganography. In Proc. 4th Int. Workshop Information Hiding, Springer LNCS, 2137: 13–26

  24. Theodoridis S, Koutroumbas K (2003) Pattern recognition, 2nd edn. China Machine Press, Beijing

    Google Scholar 

  25. Wang Y, Moulin P (2007) Optimized feature extraction for learning-based image steganalysis. IEEE Trans Inf Forensics Security 2(1):31–45. doi:10.1109/TIFS.2006.890517

    Article  Google Scholar 

  26. Zhang J, Cox IJ, Doёrr G (2007) Steganalysis for LSB matching in images with high-frequency noise. In Proc. IEEE 9th Workshop on Multimedia Signal Processing, pp 385–388

  27. Zhang T, Li WX, Zhang Y, Zheng EG, Ping XJ (2010) Steganalysis of LSB matching based on statistical modeling of pixel difference distributions. Inform Sci 180:4685–4694. doi:10.1016/j.ins.2010.07.037

    Article  Google Scholar 

  28. Zhang T, Ping XJ (2003) A new approach to reliable detection of LSB steganography in natural images. Signal Process 83(10):2085–2093

    Article  MATH  Google Scholar 

  29. Zhang J, Zhang D (2010) Detection of LSB matching steganography in decompressed images. IEEE Signal Process Lett 17(2):141–144. doi:10.1109/LSP.2009.2035379

    Article  Google Scholar 

  30. Zheng EG, Ping XJ, Zhang T (2011) Local linear transform and new features of histogram characteristic functions for steganalysis of least significant bit matching steganography. KSII Trans Int Inform Syst 5(4):840–855. doi:10.3837/tiis.2011.04.012

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (No. 60903221). The authors would like to thank the reviewers for their insightful comments and helpful suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xing Li.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, X., Zhang, T., Zhang, Y. et al. A novel blind detector for additive noise steganography in JPEG decompressed images. Multimed Tools Appl 68, 1051–1068 (2014). https://doi.org/10.1007/s11042-012-1112-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-012-1112-2

Keywords

Navigation