Advertisement

A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO)

  • Gokhan Gul
  • Fatih Kurugollu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6958)

Abstract

This paper presents a new methodology for the steganalysis of digital images. In principle, the proposed method is applicable to any kind of steganography at any domain. Special interest is put on the steganalysis of Highly Undetectable Steganography (HUGO). The proposed method first extracts features via applying a function to the image, constructing the k variate probability density function (PDF) estimates, and downsampling it by a suitable downsampling algorithm. The extracted feature vectors are then further optimized in order to increase the detection performance and reduce the computational time. Finally using a supervised classification algorithm such as SVM, steganalysis is performed. The proposed method is capable of detecting BOSSRank image set with an accuracy of 85%.

Keywords

Feature Vector Feature Selection Discrete Cosine Transform Detection Performance Cover Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications, 1st edn. Cambridge University Press, Cambridge (2009)CrossRefzbMATHGoogle Scholar
  2. 2.
    Fridrich, J., Holotyak, T., Voloshynovskiy, S.: Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. In: Proc. of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Salzburg, Austria, September 19-21 (2005)Google Scholar
  3. 3.
    Fridrich, J., Goljan, M.: Practical Steganalysis-State of the Art. In: Proc. SPIE Photonics West Electronic Imaging Security and Watermarking of Multimedia Contents, San Jose, California, vol. 4675, pp. 1–13 (January 2002)Google Scholar
  4. 4.
    Fridrich, J., Goljan, M., Du, R.: Detecting LSB Steganography in Color and Gray-Scale Images. IEEE Multimedia 8(4), 22–28 (2001)CrossRefGoogle Scholar
  5. 5.
    Gul, G., Kurugollu, F.: SVD-Based Universal Spatial Domain Image Steganalysis. IEEE Transactions on Information Forensics and Security 5(2), 349–353 (2010)CrossRefGoogle Scholar
  6. 6.
    Pevny, T., Bas, P., Fridrich, J.: Steganalysis by Subtractive Pixel Adjacency Matrix. IEEE Transaction on Information Forensics and Security 5(2), 215–224 (2010)CrossRefGoogle Scholar
  7. 7.
    Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  8. 8.
    Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  9. 9.
    Gul, G., Avcibas, I.: Source Cell Phone Camera Identification Based on Singular Value Decomposition. In: First IEEE International Workshop on Information Forensics and Security, pp. 171–175 (December 2009)Google Scholar
  10. 10.
    Pudil, P., Novovicova, J., Kittler, J.: Floating Search Methods in Feature Selection. Pattern Recognition Letters 15(2), 1119–1125 (1994)CrossRefGoogle Scholar
  11. 11.
    Gul, G., Dirik, A.E., Avcibas, I.: Steganalytic Features for JPEG Compression-Based Perturbed Quantization. IEEE Signal Processing Letters 14(3), 204–208 (2007)CrossRefGoogle Scholar
  12. 12.
    http://boss.gipsa-lab.grenoble-inp.fr/ (accessed Januray 31, 2011)
  13. 13.
    http://www.csie.ntu.edu.tw/~cjlin/libsvm/ (accessed Januray 31, 2011)

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Gokhan Gul
    • 1
  • Fatih Kurugollu
    • 2
  1. 1.Signal Processing Group, Institute of TelecommunicationsTechnische Universität DarmstadtDarmstadtGermany
  2. 2.School of Electronics, Electrical Engineering and Computer ScienceQueen’s UniversityBelfastUK

Personalised recommendations