Skip to main content
Log in

Steganalysis of JPEG images by block texture based segmentation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The current JPEG steganalysis systems have attained outstanding achievements. A considerable variety of strategies for feature extraction are developed. However, a common shortcoming in the traditional image steganalysis techniques is that they are conducted on the entire image and do not take advantage of the content diversity. In this paper, a new steganalysis algorithm based on image segmentation is proposed to enable us to utilize the content characteristics of JPEG images. The images are segmented into several sub-images according to the texture complexity. The steganalysis features of each type of sub-images with the same or close texture complexity are extracted separately to build a classifier. The steganalysis results of the entire image are determined through a weighted fusing process. Experimental results demonstrate that the proposed method exhibits excellent performance and significantly improves the detection accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Amirkhani H, Rahmati M (2011) New framework for using image contents in blind steganalysis systems. J Electron Imaging 20(1):013016-1–013016-14

    Article  Google Scholar 

  2. Bas P, Furon T, Bows-2. http://bows2.gipsa-lab.inpg.fr/BOWS2OrigEp3.tgz

  3. Bohme R, Westfeld A (2004) Breaking Cauchy model-based JPEG steganography with first order statistics. Proceedings of 9th Eur. Symp. Research Computer Security (ESORICS), Sophia Antipolis, France. 13–15 September, pp. 125–140

  4. Cancelli G, Doërr G, Barni M, Cox I J (2008) A comparative study of ±1 steganalyzers. Proceedings of IEEE Int. Workshop Multimedia Signal Processing, Cairns, Australia. 8–10 October, pp. 791–796

  5. Chang CC, Lin CJ (2001) LIBSVM: a library for support vector machines. Available: http://www.csie.ntu.edu.tw/cjlin/libsvm

  6. Chen C, Shi Y Q (2008) JPEG image steganalysis utilizing both intrablock and interblock correlations. Proceedings of IEEE Int. Symp. Circuits and Systems, Seattle, WA. 18–21 May, pp. 3029–3032

  7. Cho S, Cha B, Wang J (2010) Block-based image steganalysis: algorithm and performance evaluation. Proceedings of IEEE Int. Symp. Circuits and Systems. Piscataway, NJ. May 30- June 2, pp. 1679–1682

  8. Davidson J, Jalan J (2010) Steganalysis using partially ordered Markov models. Proceedings of 12nd Int. Workshop Information Hiding Workshop, Calgary, AB, Canada. 28–30 June, pp. 118–132

  9. Filler T, Pevný T, Bas P (2007) BOSS. http://boss.gipsa-lab.grenobleinp.fr/BOSSRank/

  10. Fridrich J (2004) Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Proceedings of 6th Int. Workshop Information Hiding, Toronto, ON, Canada. 23–25 May, pp. 67–81

  11. Fridrich J, Goljan M, Hogea D (2002) Steganalysis of JPEG images: breaking the F5 algorithm. Proceedings of 5th Int. Workshop Information Hiding. Noordwijkerhout, The Netherlands, 7–9 October, pp. 310–323

  12. Fridrich J, Goljan M, Hogea D (2002) Attacking the outguess. Proceedings of ACM Workshop Multimedia and Security, Juan-les-Pins, France. December 6, pp. 3–6

  13. Fridrich J, Goljan M, Soukal D (2005) Perturbed quantization steganography. ACM Multimed Secur J 11(2):98–107

    Article  Google Scholar 

  14. Fridrich J, Pevný T, Kodovský J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. Proceedings of 9th ACM Multimedia & Security Workshop, Dallas, TX, Sep, pp. 3–14

  15. Fu D, Shi Y Q, Zou D, Xuan G (2006) JPEG steganalysis using empirical transition matrix in block DCT domain. Proceedings of IEEE 8th Workshop Multimedia Signal Processing, BC, Canada. 3–6 October, pp. 310–313

  16. Goljan M, Fridrich J, Holotyak T (2006) New blind steganalysis and its implications. Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072. January 15, pp. 1–13

  17. JP Hide & Seek, http://linux01.gwdg.de/alatham/stego. html

  18. Jsteg, http://zooid.org/paul/crypto/jsteg/

  19. Kim Y, Duric Z, Richards D (2006) Modified matrix encoding technique for minimal distortion steganography. Proceedings of 8th Int. Workshop Information Hiding, Alexandria VA. 10–12 July, pp. 314–327

  20. Kodovský J, Fridrich J (2009) Calibration revisited. Proceedings of 11th ACM Workshop Multimedia and Security, Princeton, NJ, 7–8 September, pp. 63–74

  21. Kodovský J, Fridrich J (2011) Steganalysis in high dimensions: fusing classifiers built on random subspaces. Proceedings of SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII, San Francisco, CA, January 23, pp. 1–13

  22. Kodovský J, Fridrich J (2012) Steganalysis of JPEG images using rich models. Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, vol. 8303, San Francisco, CA. Januay 22, pp. 0A 1–13

  23. Kodovský J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432–444

    Article  Google Scholar 

  24. Lafferty P., Ahmed F. (2004) Texture-based steganalysis: results for color images. Proceedings of SPIE, Mathematics of Data/Image Coding, Compression, and Encryption VII, with Applications, Denver, CO. August 2, pp. 145–151

  25. Li B, Huang J, Shi YQ (2009) Steganalysis of YASS. IEEE Trans Inf Forensic Secur 4(3):369–382

    Article  Google Scholar 

  26. Liu Q, Sung AH, Chen Z, Xu J (2008) Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recogn 41:56–66

    Article  MATH  Google Scholar 

  27. Pevný T, Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis. Proceedings of Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA. January 28, pp. 1–13

  28. Provos N (2001) Defending against statistical steganalysis. Proceedings of 10th Usenix Security Symp., Washington DC. 13–17 August, pp. 323–335

  29. Sachnev V, Kim H J, Zhang R (2009) Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. Proceedings of 11th ACM Multimedia & Security Workshop, Princeton, NJ. 7–8 September, pp. 131–140

  30. Sallee P (2003) Model-based steganography. Proceedings of 2nd Int. Workshop Digital Watermarking, Seoul, Korea. 20–22 October, pp. 154–167

  31. Schaefer G, Stich M (2003) UCID - an uncompressed colour image database. School of computing and mathematics. Nottingham Trent University, UK

    Google Scholar 

  32. Shi Y Q, Chen C, Chen W (2006) A Markov process based approach to effective attacking JPEG steganography. Proceedings of 8th Int. Workshop Information Hiding Workshop, Old Town Alexandria, VA. 10–12 July, pp. 249–264

  33. Solanki K, Sarkar A, Manjunath B S (2007) YASS: yet another steganographic scheme that resists blind steganalysis. Proceedings of 9th Int. Workshop Digital Watermarking, Saint Malo, France. 11–13 June, pp. 16–31

  34. Steghide, http://steghide.sourceforge.net/

  35. Westfeld A (2001) High capacity despite better steganalysis (F5–A steganographic algorithm). Proceedings of 4th Int. Workshop on Information Hiding, Pittsburgh, PA. 25–27 April, pp. 289–302

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ran Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, R., Xu, M., Ping, X. et al. Steganalysis of JPEG images by block texture based segmentation. Multimed Tools Appl 74, 5725–5746 (2015). https://doi.org/10.1007/s11042-014-1880-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-1880-y

Keywords

Navigation