Skip to main content

Steganalysis Using Partially Ordered Markov Models

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6387))

Abstract

The field of steganalysis has blossomed prolifically in the past few years, providing the community with a number of very good blind steganalyzers. Features for blind steganalysis are generated in many different ways, typically using statistical measures. This paper presents a new image modeling technique for steganalysis that uses as features the conditional probabilities described by a stochastic model called a partially ordered Markov model (POMM). The POMM allows concise modeling of pixel dependencies among quantized discrete cosine transform coefficients. We develop a steganalyzer based on support vector machines that distinguishes between cover and stego JPEG images using 98 POMM features. We show that the proposed steganalyzer outperforms two comparative Markov-based steganalyzers [25,6] and outperforms a third steganalyzer [23] on half of the tested classes, by testing our approach with many different image databases on five embedding algorithms, with a total of 20,000 images.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Natural resources conservation service photo gallery, http://photogallery.nrcs.usda.gov

  2. Abend, K., Harley, T., Kanal, L.: Classification of binary random patterns. IEEE Transactions on Information Theory 11(4), 538–544 (1965)

    Article  MathSciNet  MATH  Google Scholar 

  3. Birkhoff, G.: Lattice Theory, vol. 25. American Mathematical Society, Providence (1940)

    MATH  Google Scholar 

  4. Burges, C.J.: A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery 2, 121–167 (1998)

    Article  Google Scholar 

  5. Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001), software available at, http://www.csie.ntu.edu.tw/~cjlin/libsvm

  6. Chen, C., Shi, Y.Q.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: IEEE International Symposium on Circuits and Systems, pp. 3029–3032 (May 2008)

    Google Scholar 

  7. Corporation, C.: Corel stock photo library 3, Ontario, Canada

    Google Scholar 

  8. Cressie, N., Davidson, J.: Image analysis with partially ordered Markov models. Computational Statistics and Data Analysis 29, 1–26 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  9. Davidson, J.L., Cressie, N., Hua, X.: Texture synthesis and pattern recognition for partially ordered Markov models. Pattern Recognition 32(9), 1475–1505 (1999)

    Article  Google Scholar 

  10. Davidson, J., Jalan, J.: Canvass: A steganographic forensic tool for JPEG images. Submitted to the ADFSL 2010 Conference on Digital Forensics, Security and Law (2010)

    Google Scholar 

  11. Doerr, G.: Image database for steganalysis studies (2007), http://www.cs.ucl.ac.uk/staff/ingemar/Content/Downloads.html

  12. Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2010)

    MATH  Google Scholar 

  14. Goljan, M., Fridrich, J., Holotyak, T.: New blind steganalysis and its implications. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, p. 607201. SPIE, Bellingham (2006)

    Chapter  Google Scholar 

  15. Helterbrand, J., Cressie, M., Davidson, J.: Optimal closed boundary identification in gray-scale imagery. Journal of Mathematical Imaging and Vision 5(3), 179–206 (1995)

    Article  MATH  Google Scholar 

  16. JPHide&Seek, http://linux01.gwdg.de/~alatham/stego.html

  17. JSteg, http://zooid.org/paul/crypto/jsteg/

  18. Ker, A.: Quantitive evaluation of pairs and RS steganalysis. In: Security, Steganography, and Watermarking of Multimedia Contents III, vol. 3677, pp. 273–274. SPIE, Bellingham (2004)

    Google Scholar 

  19. Ker, A.: Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters 12(6), 441–444 (2005)

    Article  Google Scholar 

  20. Ker, A.D., Lubenko, I.: Feature reduction and payload location with WAM steganalysis. In: Media Forensics and Security, vol. 7254, p. 72540A. SPIE, Bellingham (2009)

    Google Scholar 

  21. Kodovský, J., Fridrich, J.: Calibration revisited. In: Proceedings of the 11th ACM workshop on Multimedia and security, pp. 63–74. ACM, New York (2009)

    Chapter  Google Scholar 

  22. Pevný, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. In: Proceedings of ACM Multimedia and Security Workshop, pp. 75–84 (September 2009)

    Google Scholar 

  23. Pevný, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505. SPIE, Bellingham (2007)

    Chapter  Google Scholar 

  24. Provos, N.: Defending against statistical steganalysis. In: Proceedings of the 10th conference on USENIX Security Symposium, pp. 24–24. USENIX Association, Berkeley (2001)

    Google Scholar 

  25. Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  26. Steghide, http://steghide.sourceforge.net/

  27. StegoArchive, http://www.stegoarchive.com/

  28. Sullivan, K., Madhow, U., Manjunath, B., Chandrasekaran, S.: Steganalysis for Markov cover data with applications to images. IEEE Transactions on Information Security and Forensics 1(2), 275–287 (2006)

    Article  Google Scholar 

  29. Westfeld, A.: F5: A steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  30. Zhang, J., Cox, I., Doerr, G.: Steganalysis for LSB matching in images with high-frequency noise. In: IEEE 9th Workshop on Multimedia Signal Processing, pp. 385–388 (October 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Davidson, J., Jalan, J. (2010). Steganalysis Using Partially Ordered Markov Models. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds) Information Hiding. IH 2010. Lecture Notes in Computer Science, vol 6387. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16435-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16435-4_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16434-7

  • Online ISBN: 978-3-642-16435-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics