Advertisement

Single Actor Pooled Steganalysis

  • Zichi Wang
  • Zhenxing QianEmail author
  • Xinpeng Zhang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 834)

Abstract

This paper considers a more practical situation for pooled steganalysis that only a single actor is observed, so that the steganalyst needed to analyze the actor independently without comparing with other actors. We propose a pooled steganalysis method for this situation. For a given actor that has emitted a number of images, feature sets are extracted from each image, respectively, and then feed to a binary classifier popularly used in single object steganalysis. Combining all the results output by the classifier, a final decision is made ensemble to label the given actor as “guilty” or “innocent” with the minimal detection error. Experimental results show that the proposed method is effective for single actor pooled steganalysis.

Keywords

Image Pooled steganalysis Steganography 

Notes

Acknowledgements

This work was supported by the Natural Science Foundation of China (U1736213, U1536108, 61572308, 61103181, U1636206, 61373151, and 61525203), the Natural Science Foundation of Shanghai (18ZR1427500), the Shanghai Dawn Scholar Plan (14SG36), and the Shanghai Excellent Academic Leader Plan (16XD1401200).

References

  1. 1.
    Wang, Z., Zhang, X., Yin, Z.: Joint cover-selection and payload-allocation by steganographic distortion optimization. IEEE Signal Process. Lett. 25(10), 1530–1534 (2018)CrossRefGoogle Scholar
  2. 2.
    Böhme, R.: Advanced Statistical Steganalysis. Springer Science & Business Media (2010)Google Scholar
  3. 3.
    Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545–2557 (2017)CrossRefGoogle Scholar
  4. 4.
    Li, B., Li, Z., Zhou, S., Tan, S., Zhang, X.: New steganalytic features for spatial image steganography based on derivative filters and threshold LBP operator. IEEE Trans. Inf. Forensics Secur. 13(5), 1242–1257 (2018)CrossRefGoogle Scholar
  5. 5.
    Ker, A., Pevný, T.: A new paradigm for steganalysis via clustering, media watermarking, security, and forensics III. Int. Soc. Opt. Photonics 7880 (2011)Google Scholar
  6. 6.
    Ker, A., Pevný, T.: Identifying a steganographer in realistic and heterogeneous data sets, media watermarking, security, and forensics. Int. Soc. Opt. Photonics 8303 (2012)Google Scholar
  7. 7.
    Ker, A., Pevny, T.: The steganographer is the outlier: realistic large-scale steganalysis. IEEE Trans. Inf. Forensics Secur. 9(9), 1424–1435 (2014)CrossRefGoogle Scholar
  8. 8.
    Pevny, T., Nikolaev, I.: Optimizing pooling function for pooled steganalysis. In: Proceedings of the IEEE International Workshop on Information Forensics and Security, Binghamton, Rome, Italy, Nov 2015Google Scholar
  9. 9.
    Li, F., Wu, K., Lei, J., Wen, M., Bi, Z., Gu, C.: Steganalysis over large-scale social networks with high-order joint features and clustering ensembles. IEEE Trans. Inf. Forensics Secur. 11(2), 344–357 (2016)CrossRefGoogle Scholar
  10. 10.
    Ker, A.: Batch steganography and pooled steganalysis. In: International Workshop on Information Hiding. Springer, Berlin, Heidelberg (2006)Google Scholar
  11. 11.
    Schaefer, G., Stich, M.: UCID—An uncompressed colour image database. In: Proceedings Conference on Storage and Retrieval Methods and Applications for Multimedia, San Jose, CA, USA, Jan, pp. 472–480 (2004)Google Scholar
  12. 12.
    Bas, P., Filler, T., Pevný, T.: Break our steganographic system: the ins and outs of organizing boss. In: Proceedings of the 13th International Conference on Information Hiding, Prague, Czech Republic, May, pp. 59–70 (2011)Google Scholar
  13. 13.
    Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, New York, NY, USA, June, pp. 59–68 (2013)Google Scholar
  14. 14.
    Holub, V., Fridrich, J.: Designing Steganographic Distortion Using Directional Filters. In: Proceedings of the IEEE International Workshop on Information Forensics and Security, Binghamton, NY, USA, pp. 234–239, Dec 2012Google Scholar
  15. 15.
    Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: Proceedings IEEE International Conference on Image Processing, Paris, France, Oct, pp. 4206–4210 (2014)Google Scholar
  16. 16.
    Guo, L.J., Ni, J.Q., Shi, Y.Q.: Uniform embedding for efficient jpeg steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814–825 (2014)CrossRefGoogle Scholar
  17. 17.
    Guo, L.J., Ni, J.Q., Su, W.K., Tang, C.P., Shi, Y.Q.: Using statistical image model for JPEG steganography: uniform embedding revisited. IEEE Trans. Inf. Forensics Secur. 10(12), 2669–2680 (2015)CrossRefGoogle Scholar
  18. 18.
    Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)CrossRefGoogle Scholar
  19. 19.
    Holub, V., Fridrich, J.: Low complexity features for jpeg steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10(2), 219–228 (2014)CrossRefGoogle Scholar
  20. 20.
    Song, X.F., Liu, F.L., Yang, C.F., Luo, X.Y., Zhang, Y.: Steganalysis of adaptive jpeg steganography using 2D gabor filters. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, New York, USA, June, pp. 15–23 (2015)Google Scholar
  21. 21.
    Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.School of Communication and Information EngineeringShanghai UniversityShanghaiChina

Personalised recommendations