题名

UNIVERSAL STEGANALYSIS METHOD FOR SPATIAL DOMAIN STEGANOGRAPHY TECHNIQUE BASED ON PREDICTION-ERROR HISTOGRAM FEATURE

作者

Hsing-Han Liu;Chiang-Lung Liu

关键词

universal steganalysis ; steganography ; prediction-error histogram ; probabilistic neural network

期刊名称

技術學刊

卷期/出版年月

34卷1期(2019 / 03 / 01)

页次

37 - 53

内容语文

英文

中文摘要

In this paper, a universal steganalysis method for spatial domain steganography technique in which features are extracted from prediction-error histogram is proposed. To find the relative features that alter due to embedding, the prediction-error histogram of images were used for analytic models. The current 12 spatial steganography methods with 100% embedding rate were used for testing. Through experimental analysis, it was discovered that the prediction-error histogram of cover images before and after embedding showed obvious differences. Therefore, the 8-D features extracted from prediction-error histogram made up the feature vector of the proposed steganalysis scheme. These features were further used for probabilistic neural network (PNN) classifier training and testing. The accuracy of the proposed steganalysis scheme was examined by using the NRCS image database. The experimental results showed the detection accuracy of the proposed universal steganalysis scheme for the 12 steganography methods reaches 98.2% at best. The comparison with prior technology shows that the proposed universal steganalysis scheme offers superior accuracy in detecting the 12 spatial domain steganography methods. Therefore, the proposed blind steganalysis scheme is very reliable for the detection of a spatial domain steganography method.

主题分类 工程學 > 工程學綜合
参考文献
  1. Anderson, R. J.,Petitcolas, F. A. P.(2006).On the limits of steganography.proceedings of IEEE Journal on Selected Areas in Communications,16(4),474-481.
  2. Avcibas, I.,Memon, N.,Sankur, B.(2003).Steganalysis using image quality metrics.Proceedings of IEEE Transactions on Image,12(2),221-229.
  3. Bender, W.,Gruhl, D.,Morimoto, N.,Lu, A.(1996).Techniques for data hiding.IBM System Journal,35(3&4),313-336.
  4. Bui, C. N.,Lee, H. Y.,Jog, J. C.,Lee, H. K.(2010).Steganalysis Method Defeating the Modified PixelValue Defferencing Steganography.International Journal of Innovative Computing, Information and Control,6(7),3193-3203.
  5. Cancelli, G.,Doërr, G.,Cox, I.,Barni, M.(2008).Detection of ±1 LSB steganography based on the amplitude of histogram local extrema.Proceedings of 2008 15th IEEE International Conference on Image Processing, San Diego, CA, USA, 12-15 Oct 2008,Washington, DC:
  6. Chang, K. C.,Chang, C. P.,Huang, P. S.,Tu, T. M.(2008).A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing.Journal of Multimedia,3(2),37-44.
  7. Chen, Y. T.(2017).National Chung Hsing University.
  8. DDE Lab at Binghamton University. 2009. “SPAM Feature extractor.” Accessed July 25. http://dde.binghamton.edu/download/feature_extractors/.
  9. Dumitrescu, S.,Wu, X.,Wang, Z.(2003).Detection of LSB steganography via sample pair analysis.IEEE Transactions on Signal Processing,51(7),1995-2007.
  10. Fallahpour, M.,Sedaaghi, M. H.(2007).High Capacity Lossless Data Hiding Based on Histogram Modification.IEICE Electronics Express,4(7),205-210.
  11. Farid, H.(2002).Detecting Hidden Messages Using Higher-Order Statistical Models.IEEE Proceedings of International Conference on Image processing, Rochester, NY, USA, 22-25 Sept 2002,Washington, DC:
  12. Fridrich, J.,Goljan, M.(2002).Practical steganalysis of digital images-state of the art.Proceedings of the SPIE, Security and Watermarking of Multimedia Contents,IV(4675),1-13.
  13. Fridrich, J.,Goljan, M.,Du, R.(2001).Detecting LSB steganography in color and gray-scale images.IEEE Multimedia,8(4),22-28.
  14. Fridrich, J.,Kodovsky, J.(2012).Rich Models for Steganalysis of Digital Images.IEEE Transactions on Information Forensics and Security,7(3),868-882.
  15. Fridrich, J.,Long, M.(2000).Steganalysis of LSB encoding in color images.IEEE Proceedings of International Conference on Multimedia and Expo, New York, YK, USA, 30 July-2 Aug 2000,Washington, DC:
  16. Geetha, S.,Sindhu, S. Sivatha,Kamaraj, N.(2009).Blind Image Steganalysis Based on Content Independent Statistical Measures Maximizing the Specificity and Sensitivity of the System.Computers & Security,28(7),683-697.
  17. Goljan, M.,Fridrich, J.,Holotyak, T.(2006).New Blind Steganalysis and Its Implications.Proceedings of SPIE,6072,1-13.
  18. Gul, G.,Kurugollu, F.(2010).SVD Based Universal Spatial Domain Image Steganalysis.IEEE Transactions on Information Forensics and Security,5(2),349-353.
  19. Hong, W.,Chen, T. S.,Shiu, C. W.(2009).Reversible Data Hiding for High Quality Images Using Modification of Prediction Errors.Journal of Systems and Software,82(11),1833-1842.
  20. Hwang, J. H.,Kim, J. W.,Choi, J. U.(2006).A Reversible Watermarking Based on Histogram Shifting.Proceedings of 5th International Workshop, IWDW 2006, Jeju Island, Korea, 8-1 Nov 2006,Berlin, Heidelberg:
  21. Ingemar, J. Cox. 2009. “Extract the amplitude of local extrema in histograms.” Accessed July 5. http://www.cs.ucl.ac.uk/staff/ingemar/Content/Downloads.html.
  22. Johnson, N.,Jajodia, S.(1998).Exploring steganography: Seeing the unseen.proceedings of computer,31(2),26-34.
  23. Joo, J. C.,Kim, K. S.,Lee, H. K.(2010).Histogram Estimation-Scheme-based Steganalysis Defeating the Steganography using Pixel-Value Defferencing and Modulus Function.Optical Enginnering,49(7),1-13.
  24. Ker, A. D.(2007).Steganalysis of Embedding in Two Least-Significant Bits.IEEE Transactions on Information Forensics and Security,2(1),46-54.
  25. Kim, K. S.,Lee, M. J.,Lee, H. Y.,Lee, H. K.(2009).Reversible Data Hiding Exploiting Spatial Correlation between Sub-sampled Images.Pattern Recognition,42(11),3083-3096.
  26. Kuo, W. C.,Lin, Y. H.(2008).On the security of reversible data hiding based-on histogram shift.IEEE Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control, Dalian, Liaoning, China, 18-20 June 2008,Washington, DC:
  27. Kuo, W. C.,Lin, Y. H.,Huang, Y. Z.,Lee, Y. C.(2008).On the security of histogram-based reversible data hiding.Proceedings of the 7th Conference on Information Technology and Applications in Outlying Islands
  28. Lee, C. F.,Chang, C. C.,Li, J. J.,Wu, Y. H.(2016).A Survey of Reversible Data Hiding Schemes Based on Pixel Value Ordering.Proceedings of 2016 Nicograph International (NicoInt), Hanzhou, China, 6-8 July 2016,Washington, DC:
  29. Li, X. L.,Li, J.,Li, B.,Yang, B.(2013).High- Fidelity Reversible Data Hiding Scheme Based on PixelValue-Ordering and Prediction–Error Expansion.Signal Processing,93(1),198-205.
  30. Liu, C. L.,Liu, H. H.(2012).Reliable Detection of Histogram Shift-based Steganography Using Payload Invariant Features.Applied Mechanics and Materials,284-287,3517-3521.
  31. Liu, C. L.,Liu, H. H.(2010).Performance Analysis of Histogram Shift-based Steganalysis.Proceedings of The 23rd IPPR Conference on Computer Vision, Graphics and Image Processing
  32. Luo, X. Y.,Wang, D. S.,Wang, P.,Liu, F. L.(2008).A Review on Blind Detection for Image Steganography.Signal Processing,88(9),2138-2157.
  33. Lyu, S.,Farid, H.(2006).Steganalysis using higherorder Image Statistics.IEEE Transactions on Information Forensics and Security,1(1),111-119.
  34. Ni, Z.,Shi, Y. Q.,Ansari, N.,Su, W.(2006).Reversible Data Hiding.IEEE Transactions on Circuits and Systems for Video Technology,16(3),354-362.
  35. Nissar, A.,Mir, A. H.(2010).Classification of Steganalysis Techniques: A Study.Digital Signal Processing,20(6),1758-1770.
  36. Peng, F.,Li, X. L.,Yang, B.(2014).Improved PVO- based Reversible Data Hiding.Digital Signal Processing,25,255-265.
  37. Petitcolas, F. A. P.,Anderson, R. J.,Kuhn, M. G.(1999).Information hiding-a survey.Proceedings of the IEEE,87(7),1062-1078.
  38. Pevný, T.,Bas, P.,Fridrich, J.(2010).Steganalysis by Subtractive Pixel Adjacency Matrix.IEEE Transactions on Information Forensics and Security,5(2),215-224.
  39. Qu, X.,Kim, H. J.(2015).Pixel-Based Pixel Value Ordering Predictor for High-Fidelity Reversible data Hiding.Signal Processing,111,249-260.
  40. Rao, P. V. N.,Devi, T. U.,Sridhar, G.,Kaladhar, D.,Rao, A.(2005).A probabilistic neural network approach for protein superfamilt classification.Journal of Theoretical and Applied Information Technology,6(1),101-105.
  41. Sabeti, V.,Samavi, S.,Mahdavi, M.,Shirani, S.(2007).Steganalysis of Pixel-Value Differencing Steganographic Method.IEEE Proceedings of 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processin, Victoria, BC, Canada, 22-24 Aug 2007,Washington, DC:
  42. Sabeti, V.,Samavi, S.,Mahdavi, M.,Shirani, S.(2010).Steganalysis and payload estimation of embedding in pixel differences using neural networks.Pattern Recognition,43(1),405-415.
  43. Sachnev, V.,Kim, H. J.,Nam, J.,Suresh, S.,Shi, Y. Q.(2009).Reversible Watermarking Algorithm Using Sorting and Prediction.IEEE Transactions on Circuits and Systems for Video Technology,19(7),989-999.
  44. Specht, D. F.(1990).Probabilistic Neural Networks.Neural Network,3(1),109-118.
  45. Tsai, P.,Hu, Y. C.,Yeh, H. L.(2009).Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting.Signal Processing,89(6),1129-1143.
  46. United States Department of Agriculture. 2015. “NRCS photo Gallery.” Accessed May 10. http://photogallery.nrcs.usda.gov/.
  47. Wang, C. M.,Wu, N. I,Tsai, C. S.,Hwang, M. S.(2008).A High Quality Steganographic Method with Pixel-Value Differencing and Modulus Function.Journal of Systems and Software,81(1),150-158.
  48. Weinberger, M. J.,Seroussi, G.,Sapiro, G.(2000).The LOCO-I Lossless Image Compression Algorithm: Principles and Standardization into JPEG-LS.IEEE Transactions on Image Processing,9(8),1309-1324.
  49. Westfeld, A.,Pfitzmann, A.(1999).Attacks on steganographic systems.Proceedings of the 3rd International Workshop on Information Hiding, Dresden, Germany, 29 Sep.-1 Oct 1999,Berlin, Heidelberg:
  50. Wu, D. C.,Tsai, W. H.(2003).A Steganographic Method for Images by Pixel-Value Differencing.Pattern Recognition Letters,24(9-10),1613-1626.
  51. Wu, H. C.,Wu, N. I,Tsai, C. S.,Hwang, M. S.(2005).Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods.IEE Proceedings on Vision, Image and Signal Processing,152(5),611-615.
  52. Wu, X.,Memon, N.(1997).Context-Based, Adaptive, Lossless Image Coding.IEEE Transactions on Communications,45(4),437-444.
  53. Yang, C. H.,Weng, C. Y.,Wang, S. J.,Sun, H. M.(2008).Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems.IEEE Transactions on Information Forensics and Security,3(3),488-497.
  54. Zaker, N.,Hamzeh, A.(2012).A Novel Steganalysis for TPVD Steganographic Method Based on Differences of Pixel Difference Histogram.Multimedia Tools and Applications,58(1),147-166.
  55. Zhang, J.,Cox, I. J.,Doerr, G.(2007).Steganalysis for LSB Matching in Images with High-frequency Noise.IEEE Processing 2007 IEEE 9th Workshop on Multimedia Signal Processing Crete, Greece, 1-3 Oct. 2007,Washington, DC:
  56. Zhang, X.,Wang, S.(2004).Vulnerability of Pixel Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security.Pattern Recognition Letters,25(3),331-339.