Skip to main content
Erschienen in: Soft Computing 12/2017

14.01.2016 | Methodologies and Application

Fast projections of spatial rich model feature for digital image steganalysis

verfasst von: Pengfei Wang, Zhihui Wei, Liang Xiao

Erschienen in: Soft Computing | Ausgabe 12/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Spatial rich model (SRM) is a classic steganalysis method, which collects high-order co-occurrences from truncated noise residuals as feature to capture the local-range dependencies of an image. Increasing the truncation threshold and the co-occurrence order will lead to a higher-dimensional feature, which can exploit more statistical bins and capture dependencies across larger-range neighborhood, but this will suffer from the curse of dimensionality. In this paper, we propose a fast projection method to increase the statistical robustness of the higher-dimensional SRM feature while decreasing its dimensionality. The proposed projection method is applicable to co-occurrence-based steganalysis features. The detection performance and the computational complexity of the proposed method are investigated on three content-adaptive steganographic algorithms in spatial domain.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Avcibas I, Memon ND, Sankur B (2001) Steganalysis using image quality metrics. In: Delp EJ, Wong PW (eds) SPIE, electronic imaging, security and watermarking of multimedia contents III, San Jose, vol 4341, pp 523–531 Avcibas I, Memon ND, Sankur B (2001) Steganalysis using image quality metrics. In: Delp EJ, Wong PW (eds) SPIE, electronic imaging, security and watermarking of multimedia contents III, San Jose, vol 4341, pp 523–531
Zurück zum Zitat Bas P, Filler T, Pevný T (2011) Break our steganographic system—the ins and outs of organizing boss. In: Filler T, Pevný T, Ker A, Craver S (eds) 13th international conference of information hiding. Lecture notes in computer science, Prague, vol 6958, pp 59–70 Bas P, Filler T, Pevný T (2011) Break our steganographic system—the ins and outs of organizing boss. In: Filler T, Pevný T, Ker A, Craver S (eds) 13th international conference of information hiding. Lecture notes in computer science, Prague, vol 6958, pp 59–70
Zurück zum Zitat Bingham E, Mannila H (2001) Random projection in dimensionality reduction: applications to image and text data. In: Knowledge discovery and data mining. ACM Press, New York. pp 245–250 Bingham E, Mannila H (2001) Random projection in dimensionality reduction: applications to image and text data. In: Knowledge discovery and data mining. ACM Press, New York. pp 245–250
Zurück zum Zitat Botta M, Cavagnino D, Pomponiu V (2015) Fragile watermarking using Karhunen–Loéve transform: the KLT-F approach. Soft Comput 19(7):1905–1919CrossRef Botta M, Cavagnino D, Pomponiu V (2015) Fragile watermarking using Karhunen–Loéve transform: the KLT-F approach. Soft Comput 19(7):1905–1919CrossRef
Zurück zum Zitat Breiman L (1996) Bagging predictors. Mach Learn 24:123–140MATH Breiman L (1996) Bagging predictors. Mach Learn 24:123–140MATH
Zurück zum Zitat Castiglione A, Bonaventura D, DeSantis A (2011a) Steganography and secure communication on online social networks and online photo sharing. In: 2011 international conference on broadband, wireless computing, communication and applications, pp 363–368. doi:10.1109/BWCCA.2011.60 Castiglione A, Bonaventura D, DeSantis A (2011a) Steganography and secure communication on online social networks and online photo sharing. In: 2011 international conference on broadband, wireless computing, communication and applications, pp 363–368. doi:10.​1109/​BWCCA.​2011.​60
Zurück zum Zitat Castiglione A, Bonaventura D, DeSantis A, Palmieri F (2011b) New steganographic techniques for the OOXML file format. In: IFIP international federation for information processing 2011 (ARES’11). LNCS 6908, vol 4. Springer, Berlin, pp 344–358. doi:10.1007/978-3-642-23300-5_27 Castiglione A, Bonaventura D, DeSantis A, Palmieri F (2011b) New steganographic techniques for the OOXML file format. In: IFIP international federation for information processing 2011 (ARES’11). LNCS 6908, vol 4. Springer, Berlin, pp 344–358. doi:10.​1007/​978-3-642-23300-5_​27
Zurück zum Zitat Castiglione A, DeSantis A, Fiore U, Palmieri F (2011c) E-mail-based covert channels for asynchronous message steganography. In: International conference on innovative mobile and internet services in ubiquitous computing. IEEE, pp 503–508. doi:10.1109/IMIS.2011.133 Castiglione A, DeSantis A, Fiore U, Palmieri F (2011c) E-mail-based covert channels for asynchronous message steganography. In: International conference on innovative mobile and internet services in ubiquitous computing. IEEE, pp 503–508. doi:10.​1109/​IMIS.​2011.​133
Zurück zum Zitat Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687CrossRef Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687CrossRef
Zurück zum Zitat Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufmann Publisher, San Francisco Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufmann Publisher, San Francisco
Zurück zum Zitat Denemark T, Fridrich J, Holub V (2014a) Further study on the security of s-uniward. In: Proceedings of SPIE—the international society for optical engineering, vol 9028. doi:10.1117/12.2044803 Denemark T, Fridrich J, Holub V (2014a) Further study on the security of s-uniward. In: Proceedings of SPIE—the international society for optical engineering, vol 9028. doi:10.​1117/​12.​2044803
Zurück zum Zitat Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J (2014b) Selection-channel-aware rich model for steganalysis of digital images. In: Proc. of IEEE international workshop on information forensics and security, pp 48–53 Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J (2014b) Selection-channel-aware rich model for steganalysis of digital images. In: Proc. of IEEE international workshop on information forensics and security, pp 48–53
Zurück zum Zitat Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrometrellis codes. IEEE Trans Inf Forensics Secur 6(3):920–935CrossRef Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrometrellis codes. IEEE Trans Inf Forensics Secur 6(3):920–935CrossRef
Zurück zum Zitat Fu Z, Sun X, Liu Y, Liu B (2012) Text split-based steganography in OOXML format documents for covert communication. Secur Commun Netw 5(9):957–968CrossRef Fu Z, Sun X, Liu Y, Liu B (2012) Text split-based steganography in OOXML format documents for covert communication. Secur Commun Netw 5(9):957–968CrossRef
Zurück zum Zitat Goljan M, Fridrich J (2015) Cfa-aware features for steganalysis of color images. In: SPIE 9409, media watermarking, security, and forensics 2015 SPIE electronic imaging international society for optics and photonics, vol 94090V. doi:10.1117/12.2078399 Goljan M, Fridrich J (2015) Cfa-aware features for steganalysis of color images. In: SPIE 9409, media watermarking, security, and forensics 2015 SPIE electronic imaging international society for optics and photonics, vol 94090V. doi:10.​1117/​12.​2078399
Zurück zum Zitat Goljan M, Fridrich J, Cogranne R (2014) Rich model for steganalysis of color images. In: IEEE workshop on information forensic and security, Atlanta Goljan M, Fridrich J, Cogranne R (2014) Rich model for steganalysis of color images. In: IEEE workshop on information forensic and security, Atlanta
Zurück zum Zitat Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Fourth IEEE international workshop on information forensics and security, Tenerife, pp 234–239 Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Fourth IEEE international workshop on information forensics and security, Tenerife, pp 234–239
Zurück zum Zitat Holub V, Fridrich J (2013a) Digital image steganography using universal distortion. In: Puech W, Chaumont M, Dittmann J, Campisi P (eds) Proceedings of the first ACM workshop on information hiding and multimedia security. France, Montpellier, pp 59–68CrossRef Holub V, Fridrich J (2013a) Digital image steganography using universal distortion. In: Puech W, Chaumont M, Dittmann J, Campisi P (eds) Proceedings of the first ACM workshop on information hiding and multimedia security. France, Montpellier, pp 59–68CrossRef
Zurück zum Zitat Holub V, Fridrich J (2013b) Random projections of residuals for digital image steganalysis. IEEE Trans Inf Forensics Secur 8(12):1996–2006CrossRef Holub V, Fridrich J (2013b) Random projections of residuals for digital image steganalysis. IEEE Trans Inf Forensics Secur 8(12):1996–2006CrossRef
Zurück zum Zitat Holub V, Fridrich J (2015) Low complexity features for jpeg steganalysis using undecimated DCT. IEEE Trans Inf Forensics Secur 10(2):219–228CrossRef Holub V, Fridrich J (2015) Low complexity features for jpeg steganalysis using undecimated DCT. IEEE Trans Inf Forensics Secur 10(2):219–228CrossRef
Zurück zum Zitat Huang F, Huang J, Shi YQ (2012) New channel selection rule for jpeg steganography. IEEE Trans Inf Forensics Secur 7(4):1181–1191CrossRef Huang F, Huang J, Shi YQ (2012) New channel selection rule for jpeg steganography. IEEE Trans Inf Forensics Secur 7(4):1181–1191CrossRef
Zurück zum Zitat Ker AD (2014) Implementing the projected spatial rich features on a GPU. Media Watermarking Secur Forensics 9028(2):96–101 Ker AD (2014) Implementing the projected spatial rich features on a GPU. Media Watermarking Secur Forensics 9028(2):96–101
Zurück zum Zitat Kodovský J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432–444CrossRef Kodovský J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432–444CrossRef
Zurück zum Zitat Lyu S, Farid H (2002) Detecting hidden messages using higher order statistics and support vector machines. In: 5th international workshop on information hiding. Lecture notes in computer science, vol 2578, pp 340–354 Lyu S, Farid H (2002) Detecting hidden messages using higher order statistics and support vector machines. In: 5th international workshop on information hiding. Lecture notes in computer science, vol 2578, pp 340–354
Zurück zum Zitat Mansoori EG (2013) GACH: a grid-based algorithm for hierarchical clustering of high-dimensional data. Soft Comput 18(5):1–18MathSciNet Mansoori EG (2013) GACH: a grid-based algorithm for hierarchical clustering of high-dimensional data. Soft Comput 18(5):1–18MathSciNet
Zurück zum Zitat Matsui K, Tanaka K (1994) Video-steganography: how to secretly embed a signature in a picture. In: IMA intellectual property project proceedings Matsui K, Tanaka K (1994) Video-steganography: how to secretly embed a signature in a picture. In: IMA intellectual property project proceedings
Zurück zum Zitat Pevný T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215–224CrossRef Pevný T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215–224CrossRef
Zurück zum Zitat Zamani M, Abdul MAB, Abdullah SM (2012) An overview on audio steganography techniques. Int J Digit Content Technol Appl 6:107–122 Zamani M, Abdul MAB, Abdullah SM (2012) An overview on audio steganography techniques. Int J Digit Content Technol Appl 6:107–122
Zurück zum Zitat Zhu X, He C, Li K, Qin X (2012) Adaptive energy-efficient scheduling for real-time tasks on DVS-enabled heterogeneous clusters. J Parallel Distrib Comput 72(6):751–763CrossRef Zhu X, He C, Li K, Qin X (2012) Adaptive energy-efficient scheduling for real-time tasks on DVS-enabled heterogeneous clusters. J Parallel Distrib Comput 72(6):751–763CrossRef
Zurück zum Zitat Zou D, Shi YQ, Su W, Xuan G (2006) Steganalysis based on markov model of thresholded prediction-error image. In: Proceedings IEEE, international conference on multimedia and expo, Toronto, pp 1365–1368 Zou D, Shi YQ, Su W, Xuan G (2006) Steganalysis based on markov model of thresholded prediction-error image. In: Proceedings IEEE, international conference on multimedia and expo, Toronto, pp 1365–1368
Metadaten
Titel
Fast projections of spatial rich model feature for digital image steganalysis
verfasst von
Pengfei Wang
Zhihui Wei
Liang Xiao
Publikationsdatum
14.01.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 12/2017
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-015-2011-z

Weitere Artikel der Ausgabe 12/2017

Soft Computing 12/2017 Zur Ausgabe