Skip to main content
Erschienen in: Cluster Computing 5/2019

08.01.2018

Improving image steganalyser performance through curvelet transform denoising

verfasst von: J. Hemalatha, M. K. Kavitha Devi, S. Geetha

Erschienen in: Cluster Computing | Sonderheft 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The major challenge of feature based blind steganalysers lies in designing effective image features which give true evidence of the stego noise rather than the natural noise present in the images. Hence they report low detection accuracy in real time implementation in spite of employing 100s of features in the process. In this paper, we coin a new paradigm for detecting steganography by examining the task as a three-steps process with the following repercussions: (a) employing curvelet transform denoising as a pre-processing step that produces better stego noise residuals suppressing the natural noise residual rather than a general denoising step before feature extraction, (b) extracting various steganalytic features, both in spatial domain as well transform domain and (c) implementing the system based on an efficient classifier, multi-surface proximal support vector machine ensemble oblique random rotation forest, that provides detection rate superior to other existing classifiers. Extensive experimentation with huge database of clean and steganogram images produced from seven steganographic schemes with varying embedding rates, and using five steganalysers, shows that the proposed paradigm improves the detection accuracy substantially and proves to be a high performance strategy even at low embedding rates. This model can be employed as a preprocessing component for any image steganalyser and high performance accuracy can be obtained.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Pevny, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Bohme, R., SafaviNaini, R. (eds.) 12th International Workshop on Information Hiding. Lecture Notes in Computer Science, Calgary, Canada, 28–30 June, pp. 161–177. Springer, New York (2010) Pevny, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Bohme, R., SafaviNaini, R. (eds.) 12th International Workshop on Information Hiding. Lecture Notes in Computer Science, Calgary, Canada, 28–30 June, pp. 161–177. Springer, New York (2010)
2.
Zurück zum Zitat Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: IEEE Workshop on Information Forensic and Security, Tenerife, Canary Islands, 2–5 December, pp. 234–239 (2012) Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: IEEE Workshop on Information Forensic and Security, Tenerife, Canary Islands, 2–5 December, pp. 234–239 (2012)
5.
Zurück zum Zitat Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)CrossRef Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)CrossRef
6.
Zurück zum Zitat Fridrich, J., Kodovsk, J.: Multivariate Gaussian model for designing additive distortion for steganography. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2949–2953 (2013) Fridrich, J., Kodovsk, J.: Multivariate Gaussian model for designing additive distortion for steganography. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2949–2953 (2013)
7.
Zurück zum Zitat Ker, A.D., Bas, P., Bohme, R., Cogranne, R., Craver, S., Filler, T., Fridrich, J., Pevny, T.: Moving steganography and steganalysis from the laboratory into the real world. In: Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, IH and MMSec’2013, Montpellier, France, June 2013, pp. 45–58. ACM (2013) Ker, A.D., Bas, P., Bohme, R., Cogranne, R., Craver, S., Filler, T., Fridrich, J., Pevny, T.: Moving steganography and steganalysis from the laboratory into the real world. In: Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, IH and MMSec’2013, Montpellier, France, June 2013, pp. 45–58. ACM (2013)
8.
Zurück zum Zitat Pevny, T.: Detecting messages of unknown length. In: Proceedings of SPIE Media Watermarking, Security, and Forensics, Part of IS and T/SPIE 21st Annual Symposium on Electronic Imaging, SPIE’2011, San Francisco, California, USA, vol. 7880 (2011) Pevny, T.: Detecting messages of unknown length. In: Proceedings of SPIE Media Watermarking, Security, and Forensics, Part of IS and T/SPIE 21st Annual Symposium on Electronic Imaging, SPIE’2011, San Francisco, California, USA, vol. 7880 (2011)
9.
Zurück zum Zitat Fridrich, J., Kodovsky, J., Holub, V., Goljan, M.: Breaking HUGO—the process discovery. In: Proceedings of the 13th International Conference on Information Hiding, IH’2011, Prague, Czech Republic. Lecture Notes in Computer Science, vol. 6958, pp. 85–101. Springer (2011) Fridrich, J., Kodovsky, J., Holub, V., Goljan, M.: Breaking HUGO—the process discovery. In: Proceedings of the 13th International Conference on Information Hiding, IH’2011, Prague, Czech Republic. Lecture Notes in Computer Science, vol. 6958, pp. 85–101. Springer (2011)
10.
Zurück zum Zitat Kodovsky, J., Fridrich, J.: On completeness of feature spaces in blind steganalysis. In: Proceedings of the 10th ACM Workshop on Multimedia and Security, MM and Sec’2008, Oxford, UK, September 2008, pp. 123–132 (2008) Kodovsky, J., Fridrich, J.: On completeness of feature spaces in blind steganalysis. In: Proceedings of the 10th ACM Workshop on Multimedia and Security, MM and Sec’2008, Oxford, UK, September 2008, pp. 123–132 (2008)
11.
Zurück zum Zitat Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)CrossRef Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)CrossRef
12.
Zurück zum Zitat Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2, 27:1–27:27 (2011)CrossRef Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2, 27:1–27:27 (2011)CrossRef
13.
Zurück zum Zitat Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2012)CrossRef Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2012)CrossRef
14.
Zurück zum Zitat Lubenko, I., Ker, A.D.: Steganalysis with mismatched covers: do simple classifiers help? In: Proceedings of the 14th ACM multimedia and Security Workshop, MM and Sec’2012, Coventry, UK, September 2012, pp. 11–18 (2012) Lubenko, I., Ker, A.D.: Steganalysis with mismatched covers: do simple classifiers help? In: Proceedings of the 14th ACM multimedia and Security Workshop, MM and Sec’2012, Coventry, UK, September 2012, pp. 11–18 (2012)
15.
Zurück zum Zitat Denemark, T., Sedighi, V., Holub, V., Cogranne, R., Fridrich, J.: Selection-channel-aware rich model for steganalysis of digital images. In: Proceedings of the IEEE International Workshop on Information Forensics and Security, WIFS’2014, Atlanta, GA, December 2014, pp. 48–53(2014) Denemark, T., Sedighi, V., Holub, V., Cogranne, R., Fridrich, J.: Selection-channel-aware rich model for steganalysis of digital images. In: Proceedings of the IEEE International Workshop on Information Forensics and Security, WIFS’2014, Atlanta, GA, December 2014, pp. 48–53(2014)
16.
Zurück zum Zitat Cogranne, R., Denemark, T., Fridrich, J.: Theoretical model of the FLD ensemble classifier based on hypothesis testing theory. In: Proceedings of IEEE International Workshop on Information Forensics and Security, WIFS’2014, Atlanta, GA, December 2014, pp. 167–172 (2014) Cogranne, R., Denemark, T., Fridrich, J.: Theoretical model of the FLD ensemble classifier based on hypothesis testing theory. In: Proceedings of IEEE International Workshop on Information Forensics and Security, WIFS’2014, Atlanta, GA, December 2014, pp. 167–172 (2014)
17.
Zurück zum Zitat Chaumont, M., Kouider, S.: Steganalysis by ensemble classifiers with boosting by regression, and post-selection of features. In: Proceedings of IEEE International Conference on Image Processing, ICIP’2012, Lake Buena Vista (suburb of Orlando), Florida, USA, September 2012, pp. 1133–1136 (2012) Chaumont, M., Kouider, S.: Steganalysis by ensemble classifiers with boosting by regression, and post-selection of features. In: Proceedings of IEEE International Conference on Image Processing, ICIP’2012, Lake Buena Vista (suburb of Orlando), Florida, USA, September 2012, pp. 1133–1136 (2012)
18.
Zurück zum Zitat Pasquet, J., Bringay, S., Chaumont, M.: Steganalysis with cover-source mismatch and a small learning database. In: Proceedings of the 22nd European Signal Processing Conference 2014, EUSIPCO’2014, Lisbon, Portugal, September 2014, pp. 2425–2429 (2014) Pasquet, J., Bringay, S., Chaumont, M.: Steganalysis with cover-source mismatch and a small learning database. In: Proceedings of the 22nd European Signal Processing Conference 2014, EUSIPCO’2014, Lisbon, Portugal, September 2014, pp. 2425–2429 (2014)
19.
Zurück zum Zitat Avcibas, I., Kharrazi, M., Memon, N., Sankur, B.: Image steganalysis with binary similarity measures. EURASIP J. Appl. Signal Process. 17, 2749–2757 (2005)MATH Avcibas, I., Kharrazi, M., Memon, N., Sankur, B.: Image steganalysis with binary similarity measures. EURASIP J. Appl. Signal Process. 17, 2749–2757 (2005)MATH
20.
Zurück zum Zitat Gul, G., Kurugollu, F.: SVD-based universal spatial image steganalysis. IEEE Trans. Inf. Forensics Secur. 5(2), 349–353 (2010)CrossRef Gul, G., Kurugollu, F.: SVD-based universal spatial image steganalysis. IEEE Trans. Inf. Forensics Secur. 5(2), 349–353 (2010)CrossRef
22.
Zurück zum Zitat Chen, X., Wang, Y., Tan, T., Guo, L.: Blind image steganalysis based on statistical analysis of empirical matrix. In: Proceedings of the 18th International Conference on Pattern Recognition (ICPR), Hong Kong, China, pp. 11–7–10 (2006) Chen, X., Wang, Y., Tan, T., Guo, L.: Blind image steganalysis based on statistical analysis of empirical matrix. In: Proceedings of the 18th International Conference on Pattern Recognition (ICPR), Hong Kong, China, pp. 11–7–10 (2006)
23.
Zurück zum Zitat Fridrich, J., Kodovsky, J., Holub, V., Goljan, M.: Steganalysis of content-adaptive steganography in spatial domain. In: Proceedings of the 13th International Workshop on Information Hidings, Prague, Czech Republic. LNCS, vol. 6958, pp. 102–112 (2011) Fridrich, J., Kodovsky, J., Holub, V., Goljan, M.: Steganalysis of content-adaptive steganography in spatial domain. In: Proceedings of the 13th International Workshop on Information Hidings, Prague, Czech Republic. LNCS, vol. 6958, pp. 102–112 (2011)
24.
Zurück zum Zitat Xuan, G., Shi, Y.Q., Huang, C., Fu, D., Zhu, X., Chai, P.: Steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non principal components analysis (CNPCA). In: Proceedings of the 5th International workshop on Digital Watermarking, vol. 4283, pp. 49–60 (2006) Xuan, G., Shi, Y.Q., Huang, C., Fu, D., Zhu, X., Chai, P.: Steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non principal components analysis (CNPCA). In: Proceedings of the 5th International workshop on Digital Watermarking, vol. 4283, pp. 49–60 (2006)
26.
Zurück zum Zitat Wang, P., Wei, Z., Xiao, L.: Pure spatial rich model features for digital image steganalysis. Multimed. Tools Appl. 75(5), 2897–2912 (2016b)CrossRef Wang, P., Wei, Z., Xiao, L.: Pure spatial rich model features for digital image steganalysis. Multimed. Tools Appl. 75(5), 2897–2912 (2016b)CrossRef
27.
Zurück zum Zitat Zhang, Y., Luo, X., Yang, C., Liu, F.: Joint JPEG compression and detection-resistant performance enhancement for adaptive steganography using feature regions selection. Multimed. Tools Appl. 76(3), 3649–3668 (2017)CrossRef Zhang, Y., Luo, X., Yang, C., Liu, F.: Joint JPEG compression and detection-resistant performance enhancement for adaptive steganography using feature regions selection. Multimed. Tools Appl. 76(3), 3649–3668 (2017)CrossRef
28.
Zurück zum Zitat Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Proceedings of the International Workshop on Information Hiding IH, pp. 249–264 (2006) Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Proceedings of the International Workshop on Information Hiding IH, pp. 249–264 (2006)
29.
Zurück zum Zitat Feng, B., Lu, W., Sun, W.: Binary image steganalysis based on pixel mesh Markov transition matrix. J. Vis. Image Represent. 26, 284–295 (2015)CrossRef Feng, B., Lu, W., Sun, W.: Binary image steganalysis based on pixel mesh Markov transition matrix. J. Vis. Image Represent. 26, 284–295 (2015)CrossRef
34.
Zurück zum Zitat Pathak, P., Selvakumar, S.: Blind image steganalysis of JPEG images using feature extraction through the process of dilation. Digit. Investig. 11, 67–77 (2014)CrossRef Pathak, P., Selvakumar, S.: Blind image steganalysis of JPEG images using feature extraction through the process of dilation. Digit. Investig. 11, 67–77 (2014)CrossRef
35.
Zurück zum Zitat Yu, J., Zhang, X., Li, F.: Spatial steganalysis using redistributed residuals and diverse ensemble classifier. Multimed. Tools Appl. 75, 13613–13625 (2016)CrossRef Yu, J., Zhang, X., Li, F.: Spatial steganalysis using redistributed residuals and diverse ensemble classifier. Multimed. Tools Appl. 75, 13613–13625 (2016)CrossRef
36.
Zurück zum Zitat Li, F., Wu, K., Lei, J., Wen, M., Bi, Z., Gu, C.: Steganalysis over large-scale social networks with high-order joint features and clustering ensembles. IEEE Trans. Inf. Forensics Secur. 11(2), 344–357 (2016) Li, F., Wu, K., Lei, J., Wen, M., Bi, Z., Gu, C.: Steganalysis over large-scale social networks with high-order joint features and clustering ensembles. IEEE Trans. Inf. Forensics Secur. 11(2), 344–357 (2016)
37.
Zurück zum Zitat Gireesh Kumar, T., Jithin, R., Shankar, D.D.: Feature based steganalysis using wavelet decomposition and magnitude statistics. In: Proceedings of International Conference on Advances in Computer Engineering, pp. 298–300 (2010) Gireesh Kumar, T., Jithin, R., Shankar, D.D.: Feature based steganalysis using wavelet decomposition and magnitude statistics. In: Proceedings of International Conference on Advances in Computer Engineering, pp. 298–300 (2010)
40.
Zurück zum Zitat Zong, H., Liu, F-l, Luo, X-y: Blind image steganalysis based on wavelet coefficient correlation. Digit. Investig. 9(1), 58–68 (2012)CrossRef Zong, H., Liu, F-l, Luo, X-y: Blind image steganalysis based on wavelet coefficient correlation. Digit. Investig. 9(1), 58–68 (2012)CrossRef
41.
Zurück zum Zitat Geetha, S., Sivatha Sindhu, S.S., Kamaraj, N.: Passive steganalysis based on higher order image statistics of curvelet transform. Int. J. Autom. Comput. 10(4), 531–542 (2010)CrossRef Geetha, S., Sivatha Sindhu, S.S., Kamaraj, N.: Passive steganalysis based on higher order image statistics of curvelet transform. Int. J. Autom. Comput. 10(4), 531–542 (2010)CrossRef
42.
Zurück zum Zitat Muthuramalingam, S., Karthikeyan, N., Geetha, S., Sindhu, S.S.: Sindhu, Siva S.: Stego anomaly detection in images exploiting the curvelet higher order statistics using evolutionary support vector machine. Multimed. Tools Appl. 75(21), 13627–13661 (2016)CrossRef Muthuramalingam, S., Karthikeyan, N., Geetha, S., Sindhu, S.S.: Sindhu, Siva S.: Stego anomaly detection in images exploiting the curvelet higher order statistics using evolutionary support vector machine. Multimed. Tools Appl. 75(21), 13627–13661 (2016)CrossRef
45.
Zurück zum Zitat PictureMarc, Embed Watermark, v 1.00.45. Digimarc Corp PictureMarc, Embed Watermark, v 1.00.45. Digimarc Corp
46.
Zurück zum Zitat Kutterand, M., Jordan, F.: JK-PGS (Pretty Good Signature). Signal Processing Laboratory, Swiss Federal Institute of Technology (EPFL), Lausanne. http://ltswww.epfl.ch/ kutter/watermarking/JK PGS.html (1998) Kutterand, M., Jordan, F.: JK-PGS (Pretty Good Signature). Signal Processing Laboratory, Swiss Federal Institute of Technology (EPFL), Lausanne. http://​ltswww.​epfl.​ch/​ kutter/watermarking/JK PGS.html (1998)
47.
Zurück zum Zitat Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)CrossRef Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)CrossRef
49.
Zurück zum Zitat Steganos Security Suite. http://www.steganos.com/english/steganos/download.htm Steganos Security Suite. http://​www.​steganos.​com/​english/​steganos/​download.​htm
51.
Zurück zum Zitat Kim, Y.S., Kwon, O.H., Park, R.H.: Wavelet based watermarking method for digital images using the human visual system. Electron. Lett. 35(6), 466–468 (1999)CrossRef Kim, Y.S., Kwon, O.H., Park, R.H.: Wavelet based watermarking method for digital images using the human visual system. Electron. Lett. 35(6), 466–468 (1999)CrossRef
52.
Zurück zum Zitat Kaushal, S., Anindya, S., Manjunath, B.S.: YASS: yet another steganographic scheme that resists blind steganalysis. In: 9th International Workshop on Information Hiding, Saint Malo, Brittany, France, June (2007) Kaushal, S., Anindya, S., Manjunath, B.S.: YASS: yet another steganographic scheme that resists blind steganalysis. In: 9th International Workshop on Information Hiding, Saint Malo, Brittany, France, June (2007)
54.
Zurück zum Zitat Feng, L., Lin, L.: Image denoising methods based on wavelet transform and threshold functions. J. Multimed. Process. Technol. 8(1), 1–10 (2017) Feng, L., Lin, L.: Image denoising methods based on wavelet transform and threshold functions. J. Multimed. Process. Technol. 8(1), 1–10 (2017)
56.
Zurück zum Zitat Sajedi, H.: Image steganalysis using Artificial Bee Colony algorithm. J. Exp. Theor. Artif. Intell. 29(5), 949–966 (2017)MathSciNetCrossRef Sajedi, H.: Image steganalysis using Artificial Bee Colony algorithm. J. Exp. Theor. Artif. Intell. 29(5), 949–966 (2017)MathSciNetCrossRef
57.
Zurück zum Zitat Sedighi, V., Fridrich, J.: Histogram layer, moving convolutional neural networks towards feature-based steganalysis. Electron. Imaging 2017(7), 50–55 (2017)CrossRef Sedighi, V., Fridrich, J.: Histogram layer, moving convolutional neural networks towards feature-based steganalysis. Electron. Imaging 2017(7), 50–55 (2017)CrossRef
Metadaten
Titel
Improving image steganalyser performance through curvelet transform denoising
verfasst von
J. Hemalatha
M. K. Kavitha Devi
S. Geetha
Publikationsdatum
08.01.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 5/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1500-5

Weitere Artikel der Sonderheft 5/2019

Cluster Computing 5/2019 Zur Ausgabe