Skip to main content
Top
Published in: Pattern Analysis and Applications 1/2023

09-09-2022 | Theoretical Advances

Novel color image steganalysis method based on RGB channel empirical modes to expose stego images with diverse payloads

Authors: E. Amrutha, S. Arivazhagan, W. Sylvia Lilly Jebarani

Published in: Pattern Analysis and Applications | Issue 1/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the rapid development of technology in the modern digital world, covert communication of secret information as a payload without instigating visible attention by using steganography emerged as a possible threat. Steganographic methods select either image contents like edges or random regions of image for hiding payload. Steganalysis methods generally concentrate on content-adaptive algorithms of grayscale images but only few works concentrate on color image steganalysis. To address this issue, a generalized steganalyzer that can identify suspicious content created using steganography methods in digital color images is a need of the hour. In this paper, a novel FroFeat feature extracted from decomposed components of three color channels using empirical mode decomposition process is proposed to augment the existing color rich model features to detect stego images created using five content—adaptive and eight non-content—adaptive steganography methods. These empirical mode decomposed components eliminate the image content including edges and pave way to model the subtle stego noise hidden inside stego images. The proposed method is validated by comparing the performance metrics with existing state-of-the-art steganalysis models. Based on the experimental results, the proposed method achieves an average of 0.484 decrease in detection error for low-volume payload detection compared to the existing methods. Also in this paper, mixed generic color image steganalysis is performed to showcase the generalization ability of the proposed steganalysis method.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Fridrich J (2010) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, CambridgeMATH Fridrich J (2010) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, CambridgeMATH
3.
go back to reference Johnson NF, Jajodia S (1998) Steganalysis of images created using current steganography software. In: Aucsmith D (ed) Information hiding. Springer, Berlin, pp 273–289CrossRef Johnson NF, Jajodia S (1998) Steganalysis of images created using current steganography software. In: Aucsmith D (ed) Information hiding. Springer, Berlin, pp 273–289CrossRef
4.
go back to reference Doshi R, Jain P, Gupta L (2012) Steganography and its applications in security. Int J Mod Eng Res 2:4634–4638 Doshi R, Jain P, Gupta L (2012) Steganography and its applications in security. Int J Mod Eng Res 2:4634–4638
5.
go back to reference Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security new challenges—MM&Sec ’01. ACM Press, Ottawa, Ontario, Canada, p 27 Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security new challenges—MM&Sec ’01. ACM Press, Ottawa, Ontario, Canada, p 27
6.
go back to reference Lyu S, Farid H (2004) Steganalysis using color wavelet statistics and one-class support vector machines. In: Proceedings of security, steganography, and watermarking of multimedia contents VI, California, pp 35-45. https://doi.org/10.1117/12.526012 Lyu S, Farid H (2004) Steganalysis using color wavelet statistics and one-class support vector machines. In: Proceedings of security, steganography, and watermarking of multimedia contents VI, California, pp 35-45. https://​doi.​org/​10.​1117/​12.​526012
8.
go back to reference Goljan M, Fridrich J, Cogranne R (2014) Rich model for Steganalysis of color images. In: 2014 IEEE International workshop on information forensics and security (WIFS). IEEE, Atlanta, GA, USA, pp 185–190 Goljan M, Fridrich J, Cogranne R (2014) Rich model for Steganalysis of color images. In: 2014 IEEE International workshop on information forensics and security (WIFS). IEEE, Atlanta, GA, USA, pp 185–190
9.
go back to reference Abdulrahman H, Chaumont M, Montesinos P, Magnier B (2015) Color Image stegananalysis using correlations between RGB channels. In: 2015 10th International conference on availability, reliability and security. IEEE, Toulouse, pp 448–454 Abdulrahman H, Chaumont M, Montesinos P, Magnier B (2015) Color Image stegananalysis using correlations between RGB channels. In: 2015 10th International conference on availability, reliability and security. IEEE, Toulouse, pp 448–454
10.
go back to reference Goljan M, Fridrich J (2015) CFA-aware features for steganalysis of color images. In: Alattar AM, Memon ND, Heitzenrater CD (eds) San Francisco, California, United States, p 94090V Goljan M, Fridrich J (2015) CFA-aware features for steganalysis of color images. In: Alattar AM, Memon ND, Heitzenrater CD (eds) San Francisco, California, United States, p 94090V
11.
go back to reference Abdulrahman H, Chaumont M, Montesinos P, Magnier B (2016) Color image steganalysis based on steerable Gaussian filters bank. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security—IH&MMSec ’16. ACM Press, Vigo, Galicia, Spain, pp 109–114 Abdulrahman H, Chaumont M, Montesinos P, Magnier B (2016) Color image steganalysis based on steerable Gaussian filters bank. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security—IH&MMSec ’16. ACM Press, Vigo, Galicia, Spain, pp 109–114
14.
go back to reference Arivazhagan S, Jebarani WSL, Veena ST (2016) Enormity of low volume blind steganalysis in clean and uncompressed image formats. In: 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT). IEEE, Nagercoil, India, pp 1–7 Arivazhagan S, Jebarani WSL, Veena ST (2016) Enormity of low volume blind steganalysis in clean and uncompressed image formats. In: 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT). IEEE, Nagercoil, India, pp 1–7
28.
go back to reference Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on Information hiding and multimedia security - IH&MMSec ’13. ACM Press, Montpellier, France, p 59 Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on Information hiding and multimedia security - IH&MMSec ’13. ACM Press, Montpellier, France, p 59
29.
go back to reference Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP). IEEE, Paris, France, pp 4206–4210 Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP). IEEE, Paris, France, pp 4206–4210
32.
go back to reference Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Costa Adeje—Tenerife, Spain, pp 234–239 Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Costa Adeje—Tenerife, Spain, pp 234–239
33.
go back to reference Ker AD, Pevný T, Kodovský J, Fridrich J (2008) The square root law of steganographic capacity. In: Proceedings of the 10th ACM workshop on Multimedia and security - MM&Sec ’08. ACM Press, Oxford, p 107 Ker AD, Pevný T, Kodovský J, Fridrich J (2008) The square root law of steganographic capacity. In: Proceedings of the 10th ACM workshop on Multimedia and security - MM&Sec ’08. ACM Press, Oxford, p 107
35.
go back to reference Arivazhagan S, Jebarani WSL, Veena ST (2016) Low volume generic steganalysis with improved generalization. In: 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT). IEEE, Nagercoil, India, pp 1–6 Arivazhagan S, Jebarani WSL, Veena ST (2016) Low volume generic steganalysis with improved generalization. In: 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT). IEEE, Nagercoil, India, pp 1–6
Metadata
Title
Novel color image steganalysis method based on RGB channel empirical modes to expose stego images with diverse payloads
Authors
E. Amrutha
S. Arivazhagan
W. Sylvia Lilly Jebarani
Publication date
09-09-2022
Publisher
Springer London
Published in
Pattern Analysis and Applications / Issue 1/2023
Print ISSN: 1433-7541
Electronic ISSN: 1433-755X
DOI
https://doi.org/10.1007/s10044-022-01102-2

Other articles of this Issue 1/2023

Pattern Analysis and Applications 1/2023 Go to the issue

Premium Partner