Abstract
Yet Another Steganographic Scheme (YASS) is one of the recent steganographic schemes that embeds data at randomized locations in a JPEG image, to avert blind steganalysis. In this paper we present JHUF-5, a statistical steganalyzer wherein J stands for JPEG, HU represents Huffman based statistics, F denotes FR Index (ratio of file size to resolution) and 5 - the number of features used as predictors for classification. The contribution of this paper is twofold; first the ability of the proposed blind steganalyzer to detect YASS reliably with a consistent performance for several settings. Second, the algorithm is based on only five uncalibrated features for efficient prediction as against other techniques, some of which employs several hundreds of predictors. The detection accuracy of the proposed method is found to be superior to existing blind steganalysis techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bin, L., Jiwu, H., Yun, Q.S.: Steganalysis of YASS. IEEE Transaction on Information Forensics and Security 3, 369–382 (2009)
Bhat, V.H., Krishna, S., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: JPEG Steganalysis using HBCL Statistics and FR Index. In: Chau, M. (ed.) PAISI 2010. LNCS, vol. 6122, pp. 105–112. Springer, Heidelberg (2010)
Pevn’y, T., Fridrich, J.: Merging Markov and DCT Features for Multi-class JPEG Steganalysis. In: Proc. of SPIE, San Jose, CA, vol. 6505, pp. 3–4 (2007)
Kodovsk’y, J., Fridrich, J.: Calibration Revisited. In: Proc. of the 11th ACM workshop on Multimedia and Security, New York, USA, pp. 63–74 (2009)
Shi, Y.Q., Chen, C., Chen, W.: A Markov Process based Approach to Effective Attacking JPEG Steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)
Fu, D., Shi, Y.Q., Zou, D., Xuan, G.: JPEG Steganalysis using Empirical Transition Matrix in Block DCT Domain. In: International Workshop on Multimedia Signal Processing, Victoria, BC, Canada (2006)
Chen, C., Shi, Y.Q.: JPEG Image Steganalysis Utilizing both Intrablock and Interblock Correlations. In: Proc. of Intl. Symposium on Circuits and Systems, pp. 3029–3032 (2008)
Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet Another Steganographic Scheme that Resists Blind Steganalysis. In: Proc. of 9th International Workshop on Information Hiding, pp. 16–31 (2007)
Solanki, K., Sarkar, A., Manjunath, B.S.: Further Study on YASS: Steganography based on Randomized Embedding to Resist Blind Steganalysis. In: Proc. of SPIE, San Jose, CA, vol. 6819, pp. 16–31 (2008)
Kodovsky, J., Pevny, T., Fridrich, J.: Modern Steganalysis can Detect YASS. In: Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA (2010)
Lyu, S., Farid, H.: Detecting Hidden Messages using Higher-order Statistics and Support Vector Machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340–354. Springer, Heidelberg (2002)
Pevny, T., Fridrich, J.: Multi-class Blind Steganalysis for JPEG Images. In: Proc. of SPIE, San Jose, CA, vol. 6072, pp. 1–13 (2006)
Solanki, K., Sullivan, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Probably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration. In: Proc. ICIP, pp. 125–128 (2006)
Xuan, G., et al.: Steganalysis based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions. In: Barni, M., Herrera-JoancomartÃ, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 262–277. Springer, Heidelberg (2005)
Chen, C., Shi, Y.Q., Chen, W., Xuan, G.: Statistical Moments based Universal Steganalysis using JPEG-2D Array and 2-D Characteristic Function. In: Proc. ICIP, Atlanta, GA, USA, pp. 105–108 (2006)
Pevný, T., Bas, P., Fridrich, J.: Steganalysis by Subtractive Pixel Adjacency Matrix. In: Proc. of the 11th ACM Multimedia & Security Workshop, Princeton, pp. 75–84 (2009)
Huang, F., Huang, J., Shi, Y.Q.: An Experimental Study on the Security Performance of YASS. IEEE press, Los Alamitos
Chen, B., Wornell, G.W.: Quantization Index Modulation: A class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Trans. on Information Theory 47, 1423–1443 (2001)
Random Forests, http://debian.mc.vanderbilt.edu/R/CRAN/web/packages/randomForest/randomForest.pdf
Kharrazi, M., Sencar, H.T., Memon, N.: A Performance Study of Common Image Steganography and Steganalysis Techniques. Journal of Electronic Imaging 15(4) (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bhat, V.H., Krishna, S., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M. (2010). JHUF-5 Steganalyzer: Huffman Based Steganalytic Features for Reliable Detection of YASS in JPEG Images. In: Kim, Th., Pal, S.K., Grosky, W.I., Pissinou, N., Shih, T.K., Ślęzak, D. (eds) Signal Processing and Multimedia. MulGraB SIP 2010 2010. Communications in Computer and Information Science, vol 123. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17641-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-17641-8_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17640-1
Online ISBN: 978-3-642-17641-8
eBook Packages: Computer ScienceComputer Science (R0)