Abstract
The field of steganalysis has blossomed prolifically in the past few years, providing the community with a number of very good blind steganalyzers. Features for blind steganalysis are generated in many different ways, typically using statistical measures. This paper presents a new image modeling technique for steganalysis that uses as features the conditional probabilities described by a stochastic model called a partially ordered Markov model (POMM). The POMM allows concise modeling of pixel dependencies among quantized discrete cosine transform coefficients. We develop a steganalyzer based on support vector machines that distinguishes between cover and stego JPEG images using 98 POMM features. We show that the proposed steganalyzer outperforms two comparative Markov-based steganalyzers [25,6] and outperforms a third steganalyzer [23] on half of the tested classes, by testing our approach with many different image databases on five embedding algorithms, with a total of 20,000 images.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Natural resources conservation service photo gallery, http://photogallery.nrcs.usda.gov
Abend, K., Harley, T., Kanal, L.: Classification of binary random patterns. IEEE Transactions on Information Theory 11(4), 538–544 (1965)
Birkhoff, G.: Lattice Theory, vol. 25. American Mathematical Society, Providence (1940)
Burges, C.J.: A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery 2, 121–167 (1998)
Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001), software available at, http://www.csie.ntu.edu.tw/~cjlin/libsvm
Chen, C., Shi, Y.Q.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: IEEE International Symposium on Circuits and Systems, pp. 3029–3032 (May 2008)
Corporation, C.: Corel stock photo library 3, Ontario, Canada
Cressie, N., Davidson, J.: Image analysis with partially ordered Markov models. Computational Statistics and Data Analysis 29, 1–26 (1998)
Davidson, J.L., Cressie, N., Hua, X.: Texture synthesis and pattern recognition for partially ordered Markov models. Pattern Recognition 32(9), 1475–1505 (1999)
Davidson, J., Jalan, J.: Canvass: A steganographic forensic tool for JPEG images. Submitted to the ADFSL 2010 Conference on Digital Forensics, Security and Law (2010)
Doerr, G.: Image database for steganalysis studies (2007), http://www.cs.ucl.ac.uk/staff/ingemar/Content/Downloads.html
Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2005)
Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2010)
Goljan, M., Fridrich, J., Holotyak, T.: New blind steganalysis and its implications. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, p. 607201. SPIE, Bellingham (2006)
Helterbrand, J., Cressie, M., Davidson, J.: Optimal closed boundary identification in gray-scale imagery. Journal of Mathematical Imaging and Vision 5(3), 179–206 (1995)
JPHide&Seek, http://linux01.gwdg.de/~alatham/stego.html
Ker, A.: Quantitive evaluation of pairs and RS steganalysis. In: Security, Steganography, and Watermarking of Multimedia Contents III, vol. 3677, pp. 273–274. SPIE, Bellingham (2004)
Ker, A.: Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters 12(6), 441–444 (2005)
Ker, A.D., Lubenko, I.: Feature reduction and payload location with WAM steganalysis. In: Media Forensics and Security, vol. 7254, p. 72540A. SPIE, Bellingham (2009)
Kodovský, J., Fridrich, J.: Calibration revisited. In: Proceedings of the 11th ACM workshop on Multimedia and security, pp. 63–74. ACM, New York (2009)
Pevný, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. In: Proceedings of ACM Multimedia and Security Workshop, pp. 75–84 (September 2009)
Pevný, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505. SPIE, Bellingham (2007)
Provos, N.: Defending against statistical steganalysis. In: Proceedings of the 10th conference on USENIX Security Symposium, pp. 24–24. USENIX Association, Berkeley (2001)
Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)
Steghide, http://steghide.sourceforge.net/
StegoArchive, http://www.stegoarchive.com/
Sullivan, K., Madhow, U., Manjunath, B., Chandrasekaran, S.: Steganalysis for Markov cover data with applications to images. IEEE Transactions on Information Security and Forensics 1(2), 275–287 (2006)
Westfeld, A.: F5: A steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Zhang, J., Cox, I., Doerr, G.: Steganalysis for LSB matching in images with high-frequency noise. In: IEEE 9th Workshop on Multimedia Signal Processing, pp. 385–388 (October 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Davidson, J., Jalan, J. (2010). Steganalysis Using Partially Ordered Markov Models. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds) Information Hiding. IH 2010. Lecture Notes in Computer Science, vol 6387. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16435-4_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-16435-4_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16434-7
Online ISBN: 978-3-642-16435-4
eBook Packages: Computer ScienceComputer Science (R0)