Abstract
In this paper, a universal steganalysis scheme for JPEG images based upon hybrid transform features is presented. We first analyzed two different transform domains (Discrete Cosine Transform and Discrete Contourlet Transform) separately, to extract features for steganalysis. Then a combination of these two feature sets is constructed and employed for steganalysis. A Fisher Linear Discriminant classifier is trained on features from both clean and steganographic images using all three feature sets and subsequently used for classification. Experiments performed on images embedded with two variants of F5 and Model based steganographic techniques reveal the effectiveness of proposed steganalysis approach by demonstrating improved detection for hybrid features.
Chapter PDF
Similar content being viewed by others
References
McBride, B.T., Peterson, G.L., Gustafson, S.C.: A new Blind Method for Detecting Novel Steganography. Digital Investigation 2, 50–70 (2005)
Simmons, G.J.: ‘Prisoners’ Problem and the Subliminal Channel. In: CRYPTO 1983-Advances in Cryptology, pp. 51–67 (1984)
Kharrazi, M., Sencar, T.H., Memon, N.: Benchmarking Steganographic and Steganalysis Techniques. In: Proc. of SPIE Electronic Imaging, Security, Steganography and Watermarking of Multimedia Contents VII, San Jose, California, USA (2005)
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 Algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)
Aboalsamh, H.A., Dokheekh, S.A., Mathkour, H.I., Assassa, G.M.: Breaking the F5 Algorithm: An Improved Approach. Egyptian Computer Science Journal 29(1), 1–9 (2007)
Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Proc. 3rd Information Hiding Workshop, Dresden, Germany, pp. 61–76 (1999)
Fridrich, J., Goljan, M., Hogea, D.: Attacking the OutGuess. In: Proc. ACM Workshop on Multimedia and Security 2002. ACM Press, Juan-les-Pins (2002)
Avcibas, I., Memon, N., Sankur, B.: Image Steganalysis with Binary Similarity Measures. In: Proc. of the IEEE International Conference on Image Processing, Rochester, New York (September 2002)
Farid, H.: Detecting Hidden Messages Using Higher-order Statistical Models. In: Proc. of the IEEE International Conference on Image Processing, vol. 2, pp. 905–908 (2002)
Fridrich, J.: Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes. In: Moskowitz, I.S. (ed.) Information Hiding 2004. LNCS, vol. 2137, pp. 67–81. Springer, Heidelberg (2005)
Avcibas, I., Memon, N., Sankur, B.: Steganalysis Using Image Quality Metrics. IEEE Transactions on Image Processing 12(2), 221–229 (2003)
Wang, Y., Moulin, P.: Optimized Feature Extraction for Learning-Based Image Steganalysis. IEEE Transactions on Information Forensics and Security 2(1) (2007)
Po, D.-Y., Do, M.N.: Directional Multiscale Modeling of Images Using the Contourlet Transform. IEEE Transactions on Image Processing 15(6), 1610–1620 (2006)
Schaefer, G., Stich, M.: UCID - An Uncompressed Colour Image Database. In: Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia, San Jose, USA, pp. 472–480 (2004)
UCID – Uncompressed Colour Image Database, http://vision.cs.aston.ac.uk/datasets/UCID/ucid.html (visited on 02/08/08)
Steganography Software F5, http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html (visited on 02/08/08)
Westfeld, A.: F5 – A Steganographic Algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Model Based JPEG Steganography Demo, http://www.philsallee.com/mbsteg/index.html (visited on 02/08/08)
Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)
Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. John Wiley & Sons, New York (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Khan, Z., Mansoor, A.B. (2009). A New Hybrid DCT and Contourlet Transform Based JPEG Image Steganalysis Technique. In: Salberg, AB., Hardeberg, J.Y., Jenssen, R. (eds) Image Analysis. SCIA 2009. Lecture Notes in Computer Science, vol 5575. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02230-2_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-02230-2_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02229-6
Online ISBN: 978-3-642-02230-2
eBook Packages: Computer ScienceComputer Science (R0)