Advertisement

Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography

  • Mehdi Kharrazi
  • Husrev T. Sencar
  • Nasir Memon
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4300)

Abstract

In the past few years, we have witnessed a number of powerful steganalysis technique proposed in the literature. These techniques could be categorized as either specific or universal. Each category of techniques has a set of advantages and disadvantages. A steganalysis technique specific to a steganographic embedding technique would perform well when tested only on that method and might fail on all others. On the other hand, universal steganalysis methods perform less accurately overall but provide acceptable performance in many cases. In practice, since the steganalyst will not be able to know what steganographic technique is used, it has to deploy a number of techniques on suspected images. In such a setting the most important question that needs to be answered is: What should the steganalyst do when the decisions produced by different steganalysis techniques are in contradiction? In this work, we propose and investigate the use of information fusion methods to aggregate the outputs of multiple steganalysis techniques. We consider several fusion rules that are applicable to steganalysis, and illustrate, through a number of case studies, how composite steganalyzers with improved performance can be designed. It is shown that fusion techniques increase detection accuracy and offer scalability, by enabling seamless integration of new steganalysis techniques.

Keywords

Feature Vector Cover Image Secret Message Fusion Technique Stego Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kharrazi, M., Sencar, H.T., Memon, N.: Image steganography: Concepts and practice. Lecture Note Series, Institute for Mathematical Sciences, National University of Singapore (to appear, 2004)Google Scholar
  2. 2.
    Westfeld, A.: F5 steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, p. 289. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Fridrich, J., Goljan, M., Hogea, D., Soukal, D.: Quantitive steganalysis of digital images: Estimating the secret message length. ACM Multimedia Systems Journal, Special issue on Multimedia Security (2003)Google Scholar
  4. 4.
    Sallee, P.: Model-based steganography. In: International Workshop on Digital Watermarking, Seoul, Korea (2003)Google Scholar
  5. 5.
    Bhme, R., Westfeld, A.: Breaking cauchy model-based jpeg steganography with first order statistics. In: 9th European Symposium on Research in Computer Security, Sophia Antipolis, France (September 2004)Google Scholar
  6. 6.
    Avcibas, I., Kharrazi, M., Memon, N., sankur, B.: Image steganalysis with binary similarity measures. EURASIP Journal on Applied Signal Processing (to appear, 2005)Google Scholar
  7. 7.
    Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: 5th International Workshop on Information Hiding (2002)Google Scholar
  8. 8.
    Lyu, S., Farid, H.: Steganalysis using color wavelet statistics and one-class support vector machines. In: SPIE Symposium on Electronic Imaging, San Jose, CA (2004)Google Scholar
  9. 9.
    Fridrich, J.: Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In: Proc. 6th Information Hiding Workshop, Toronto, Canada, May 23-25 (2004)Google Scholar
  10. 10.
    Kharrazi, M., Sencar, T.H., Memon, N.: Benchmarking steganographic and steganalysis techniques. In: EI SPIE, San Jose, CA, January 16-20 (2005)Google Scholar
  11. 11.
    Jain, A.K., Nandakumar, K., Ros, A.: Score normalization in multimodal biometric systems. Pattern Recognition (to appear, 2005)Google Scholar
  12. 12.
    Kittler, J., Hatef, M., Duin, R.P.W., Matas, J.: On combining classifiers. IEEE Transactions on Pattern Analysis and Machine Intelligence 20(3), 226–239 (1998)CrossRefGoogle Scholar
  13. 13.
    Avcibas, I., Memon, N., sankur, B.: Image steganalysis with binary similarity measures. In: IEEE International Conference on Image Processing, Rochester, New York (September 2002)Google Scholar
  14. 14.
    Greenspun, P.: Images obtained from philip.greenspun.com
  15. 15.
    Kharrazi, M., Sencar, T.H., Memon, N.: Benchmarking steganographic and steganalysis techniques. Journal of Electronic Imaging (submitted, 2006)Google Scholar
  16. 16.
    Dumitrescu, S., Wu, X., Memon, N.: On steganalysis of random lsb embedding in continuous-tone images. In: IEEE International Conference on Image Processing, Rochester, New York (September 2002)Google Scholar
  17. 17.
    Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines(2001), Software available at, http://www.csie.ntu.edu.tw/~cjlin/libsvm
  18. 18.
    Fridrich, J., Pevny, T.: Multiclass blind steganalysis for jpeg images. In: SPIE Electronic Imaging, Photonics West, San Jose,CA (2006)Google Scholar
  19. 19.
    Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Mehdi Kharrazi
    • 1
  • Husrev T. Sencar
    • 2
  • Nasir Memon
    • 2
  1. 1.Department of Electrical and Computer Engineering 
  2. 2.Department of Computer and Information SciencePolytechnic UniversityBrooklynUSA

Personalised recommendations