Abstract
This paper proposes a novel universal steganalyzer for additive noise steganography in JPEG decompressed images. On the basis of the influence of the message embedding on the statistical distributions of alternating current (ac) discrete cosine transform (DCT) coefficients, we first develop a new steganalytic feature which is defined as the ratio between different ranges of the normalized ac coefficients histogram. Then a powerful blind detector is constructed with the proposed one-dimensional (1-D) feature. Extensive experimental results demonstrate that the proposed steganalyzer outperforms the existing state-of-the-art schemes significantly and even can detect the additive noise steganography effectively at a very low embedding rate. In addition, our method using a 1-D feature is not only practical and real-time, but also can provide a better control of the false positive rate and the false negative rate by adjusting the detection threshold. Moreover, the proposed feature can also be used to identify JPEG compression besides steganalysis, which indicates that our method has a great promise in practical applications.
Similar content being viewed by others
Abbreviations
- ac:
-
Alternating current
- DCT:
-
Discrete cosine transform
- 1-D:
-
One-dimensional
- LSB:
-
Least significant bit
- SSIS:
-
Spread spectrum image steganography
- SM:
-
Stochastic modulation
- RS:
-
Regular and singular
- AHCF-COM:
-
The center of the mass of the adjacency histogram characteristic function
- ALE:
-
The amplitude of local extrema
- CAM:
-
Central absolute moment
- WAM:
-
Wavelet absolute moments
- SPAM2nd:
-
The second subtractive pixel adjacency matrix
- bpp:
-
Bit per pixel
- pdf:
-
Probability density function
- pmf:
-
Probability mass function
- ROC:
-
Receiver operation characteristic
- SVM:
-
Support vector machine
References
Bas P, Furon T (2007) BOWS-2 [online]. http://bows2.gipsa-lab.inpg.fr. Accessed May 11 2010
Cancelli G, Doёrr G, Barni M, Cox I (2008) A comparative study of ±1 steganalyzers. In Proc. IEEE Int. Workshop on Multimedia Signal Processing, pp 791–796
Doёrr G Image database for steganalysis studies [Online]. http://www.cs.ucl.ac.uk/staff/I.Cox/Content/Downloads.html. Accessed May 11 2009
Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007. doi:10.1109/TSP.2003.812753
Fridrich J, Goljan M (2003) Digital image steganography using stochastic modulation. In Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, CA, 5020: 191–202
Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color and gray-scale images. IEEE Multimedia 8(4):22–28
Fridrich J, Goljan M, Du R (2001) Steganalysis based on JPEG compatibility. In Proc. Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, Multimedia Systems and Applications IV, pp 275–280
Fridrich J, Soukal D, Goljan M (2005) Maximum likelihood estimation of secret message length embedded using ±k steganography in spatial domain. In Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, 5681: 595–606
Goljan M, Fridrich J, Holotyak T (2006) New blind steganalysis and its implications. In Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, 6072: 1–13
Harmsen J, Pearlman W (2003) Steganalysis of additive noise modelable information hiding. In Proc. SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, Santa Clara, CA, 5020: 131–142
Holotyak T, Fridrich J, Voloshynovskiy S (2005) Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In Proc. 9th IFIP TC-6 TC-11 Conf. Communications and Multimedia Security, Salzburg, Austria, 3677: 273–274
Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444. doi:10.1109/LSP.2005.847889
Ker AD, Lubenko I (2009) Feature reduction and payload location with WAM steganalysis. In Proc. SPIE, Electronic Imaging, Media Forensics and Security, 7254: 0A01–0A13. doi: 10.1117/12.805910
Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10(5):746–757. doi:10.1109/TMM.2008.922795
Lin TL, Horng SJ, Lee KH, Chiu PL, Kao TW, Chen YH, Run RS, Lai JL, Chen RJ (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37:7858–7869. doi:10.1016/j.eswa.2010.04.051
Lin TL, Horng SJ, Lee KH, Chiu PL, Kao TW, Run RS, Lai JL, Chen RJ (2010) A visual sharing scheme for multiple secrets by camouflaging process. Int J Innov Comput Inform Cont 6(12):5749–5769
Luo WQ, Huang FJ, Huang JW (2010) JPEG error analysis and its applications to digital image forensics. IEEE Trans Inf Forensics Security 5(3):480–491. doi:10.1109/TIFS.2010.2051426
Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075–1083
NRCS Photo Gallery [Online]. http://photogallery.nrcs.usda.gov/. Accessed August 22 2009
Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062–1078. doi:S0018-9219(99)04946-4
Pevný T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Security 5(2):215–224. doi:10.1109/TIFS.2010.2045842
Schaefer G, Stich M (2003) UCID: an uncompressed color image database. In Proc. SPIE, Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia. 5307: 472–480
Sharp T (2001) An implementation of key-based digital signal steganography. In Proc. 4th Int. Workshop Information Hiding, Springer LNCS, 2137: 13–26
Theodoridis S, Koutroumbas K (2003) Pattern recognition, 2nd edn. China Machine Press, Beijing
Wang Y, Moulin P (2007) Optimized feature extraction for learning-based image steganalysis. IEEE Trans Inf Forensics Security 2(1):31–45. doi:10.1109/TIFS.2006.890517
Zhang J, Cox IJ, Doёrr G (2007) Steganalysis for LSB matching in images with high-frequency noise. In Proc. IEEE 9th Workshop on Multimedia Signal Processing, pp 385–388
Zhang T, Li WX, Zhang Y, Zheng EG, Ping XJ (2010) Steganalysis of LSB matching based on statistical modeling of pixel difference distributions. Inform Sci 180:4685–4694. doi:10.1016/j.ins.2010.07.037
Zhang T, Ping XJ (2003) A new approach to reliable detection of LSB steganography in natural images. Signal Process 83(10):2085–2093
Zhang J, Zhang D (2010) Detection of LSB matching steganography in decompressed images. IEEE Signal Process Lett 17(2):141–144. doi:10.1109/LSP.2009.2035379
Zheng EG, Ping XJ, Zhang T (2011) Local linear transform and new features of histogram characteristic functions for steganalysis of least significant bit matching steganography. KSII Trans Int Inform Syst 5(4):840–855. doi:10.3837/tiis.2011.04.012
Acknowledgments
This work was supported by the National Natural Science Foundation of China (No. 60903221). The authors would like to thank the reviewers for their insightful comments and helpful suggestions.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, X., Zhang, T., Zhang, Y. et al. A novel blind detector for additive noise steganography in JPEG decompressed images. Multimed Tools Appl 68, 1051–1068 (2014). https://doi.org/10.1007/s11042-012-1112-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-012-1112-2