Advertisement

Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines

  • Siwei Lyu
  • Hany Farid
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2578)

Abstract

Techniques for information hiding have become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting hidden messages has become considerably more difficult. This paper describes an approach to detecting hidden messages in images that uses a wavelet-like decomposition to build higher-order statistical models of natural images. Support vector machines are then used to discriminate between untouched and adulterated images.

Keywords

Support Vector Machine Cover Image Information Hiding Image Code Message Size 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    R. J. Anderson and F.A.P. Petitcolas. On the limits of steganography. IEEE Journal on Selected Areas in Communications, 16(4):474–481, 1998. 340CrossRefGoogle Scholar
  2. [2]
    R.W. Buccigrossi and E.P. Simoncelli. Image compression via joint statistical characterization in the wavelet domain. IEEE Transactions on Image Processing, 8(12):1688–1701, 1999. 341, 342CrossRefGoogle Scholar
  3. [3]
    C. J.C. Burges. A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 2:121–167, 1998. 343CrossRefGoogle Scholar
  4. [4]
    Chih-Chung Chang and Chih-Jen Lin. LIBSVM: a library for support vector machines, 2001. Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm. 349, 350
  5. [5]
    R. Duda and P. Hart. Pattern Classification and Scene Analysis. John Wiley and Sons, 1973. 343Google Scholar
  6. [6]
    H. Farid. Detecting hidden messages using higher-order statistical models. In International Conference on Image Processing, page (to appear), Rochester, New York, 2002. 343, 349, 350Google Scholar
  7. [7]
    R. Fisher. The use of multiple measures in taxonomic problems. Annals of Eugenics, 7:179–188, 1936. 343Google Scholar
  8. [8]
    R. Fletcher. Practical Methods of Optimization. JohnWiley and Sons, 2nd edition, 1987. 345Google Scholar
  9. [9]
    J. Fridrich and M. Goljan. Practical steganalysis: State of the art. In SPIE Photonics West, Electronic Imaging, San Jose, CA, 2002. 340Google Scholar
  10. [10]
    N. Johnson and S. Jajodia. Exploring steganography: seeing the unseen. IEEE Computer, pages 26–34, 1998. 340Google Scholar
  11. [11]
    N. Johnson and S. Jajodia. Steganalysis of images created using current steganography software. Lecture notes in Computer Science, pages 273–289, 1998. 340Google Scholar
  12. [12]
    D. Kahn. The history of steganography. In Proceedings of Information Hiding, First International Workshop, Cambridge, UK, 1996. 340Google Scholar
  13. [13]
    D. Kersten. Predictability and redundancy of natural images. Journal of the Optical Society of America A, 4(12):2395–2400, 1987. 340CrossRefGoogle Scholar
  14. [14]
    G. Krieger, C. Zetzsche, and E. Barth. Higher-order statistics of natural images and their exploitation by operators selective to intrinsic dimensionality. In Proceedings of the IEEE Signal Processing Workshop on Higher-Order Statistics, pages 147–151, Banff, Alta., Canada, 1997. 340Google Scholar
  15. [15]
    E.A.P. Petitcolas, R. J. Anderson, and M.G. Kuhn. Information hiding-a survey. Proceedings of the IEEE, 87(7):1062–1078, 1999. 340CrossRefGoogle Scholar
  16. [16]
    N. Provos. Defending against statistical steganalysis. In 10th USENIX Security Symposium, Washington, DC, 2001. 348Google Scholar
  17. [17]
    N. Provos and P. Honeyman. Detecting steganographic content on the internet. Technical Report CITI 01-1a, University of Michigan, 2001. 340Google Scholar
  18. [18]
    R. Rinaldo and G. Calvagno. Image coding by block prediction of multiresolution subimages. IEEE Transactions on Image Processing, 4(7):909–920, 1995. 341CrossRefGoogle Scholar
  19. [19]
    D.L. Ruderman and W. Bialek. Statistics of natural image: Scaling in the woods. Phys. Rev. Letters, 73(6):814–817, 1994. 340CrossRefGoogle Scholar
  20. [20]
    J. Shapiro. Embedded image coding using zerotrees of wavelet coefficients. IEEE Transactions on Signal Processing, 41(12):3445–3462, 1993. 341zbMATHCrossRefGoogle Scholar
  21. [21]
    E.P. Simoncelli. Modeling the joint statistics of images in the wavelet domain. In Proceedings of the 44th Annual Meeting, volume 3813, Denver, CO, USA, 1999. 340Google Scholar
  22. [22]
    E.P. Simoncelli and E.H. Adelson. Subband image coding, chapter Subband transforms, pages 143–192. Kluwer Academic Publishers, 1990. 341Google Scholar
  23. [23]
    P.P. Vaidyanathan. Quadrature mirror filter banks, M-band extensions and perfect reconstruction techniques. IEEE ASSP Magazine, pages 4–20, 1987. 341Google Scholar
  24. [24]
    V. Vapnik. The nature of statistical learning theory. Spring Verlag, 1995. 343Google Scholar
  25. [25]
    V. Vapnik. Statistical learning theory. John Wiley and Sons, 1998. 343Google Scholar
  26. [26]
    M. Vetterli. A theory of multirate filter banks. IEEE Transactions on ASSP, 35(3):356–372, 1987. 341Google Scholar
  27. [27]
    A. Westfeld. High capacity depsite better steganalysis: F5-a steganographic algorithm. In Fourth Information Hiding Workshop, pages 301–315, Pittsburgh, PA, USA, 2001. 350Google Scholar
  28. [28]
    A. Westfeld and A. Pfitzmann. Attacks on steganographic systems. In Proceedings of Information Hiding, Third International Workshop, Dresden, Germany, 1999. 340Google Scholar
  29. [29]
    S.C. Zhu, Y. Wu, and D. Mumford. Filters, random fields and maximum entropy (frame)-towards the unified theory for texture modeling. In IEEE Conference Computer Vision and Pattern Recognition, pages 686–693, 1996. 340Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Siwei Lyu
    • 1
  • Hany Farid
    • 1
  1. 1.Dartmouth CollegeHanoverUSA

Personalised recommendations