DOI QR코드

DOI QR Code

Optimal Gabor Filters for Steganalysis of Content-Adaptive JPEG Steganography

  • Received : 2016.07.20
  • Accepted : 2016.11.28
  • Published : 2017.01.31

Abstract

The existing steganalysis method based on 2D Gabor filters can achieve a competitive detection performance for content-adaptive JPEG steganography. However, the feature dimensionality is still high and the time-consuming of feature extraction is relatively large because the optimal selection is not performed for 2D Gabor filters. To solve this problem, a new steganalysis method is proposed for content-adaptive JPEG steganography by selecting the optimal 2D Gabor filters. For the proposed method, the 2D Gabor filters with different parameter settings are generated first. Then, the feature is extracted by each 2D Gabor filter and the corresponding detection accuracy is used as the measure for filter selection. Next, some 2D Gabor filters are selected by a greedy strategy and the steganalysis feature is extracted by the selected filters. Last, the ensemble classifier is used to assemble the proposed steganalysis feature as well as the final steganalyzer. The experimental results show that the steganalysis feature extracted by the selected optimal 2D Gabor filters also can achieve a competitive detection performance while the feature dimensionality is reduced greatly.

Keywords

References

  1. D. Upham. Steganographic algorithm JSteg. Software available at http://zooid.org/paul/crypto/jsteg/.
  2. P. Sallee, "Model-based methods for steganography and steganalysis," International Journal of Image Graphics, vol. 5, no. 1, pp. 167-190, January, 2005. https://doi.org/10.1142/S0219467805001719
  3. N. Provos, "Defending against statistical steganalysis," in Proc. of 10th Usenix Security Symposium, pp. 323-335, August 13-17, 2001.
  4. A. Westfeld, "High capacity despite better steganalysis (F5-A steganographic algorithm)," in Proc. of 4th International. Workshop on Information Hiding, pp. 289-302, April 25-27, 2001.
  5. J. Fridrich, T. Pevny, J. Kodovsky, "Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities," in Proc. of 9th ACM Multimedia and Security Workshop, pp. 3-14, September 20-21, 2007.
  6. J. Fridrich, M. Goljan, and D. Soukal, "Perturbed Quantization Steganography," ACM Multimedia System Journal, vol.11, no.2, pp.98-107, February, 2005. https://doi.org/10.1007/s00530-005-0194-3
  7. Y. Kim, Z. Duric, D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Proc. of 8th International Workshop Information Hiding, pp. 314-327, July 10-12, 2006.
  8. J. Fridrich, T. Filler, "Design of adaptive steganographic schemes for digital images," in Proc. of SPIE, Electronic Imaging, Media Watermarking, Security and Forensics of Multimedia XIII," pp. OF 1-14, January 23-26, 2011.
  9. F. J. Huang, J. W. Huang, Y. Q. Shi, "New Channel Selection Rule for JPEG Steganography," IEEE Transactions on Information Forensics and Security, vol. 7, no. 4, pp. 1181-1191, August, 2012. https://doi.org/10.1109/TIFS.2012.2198213
  10. C. Wang, J. Q. Ni, "An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficients," in Proc. of IEEE ICASSP, pp.1785-1788, March 25-30, 2012.
  11. L. J. Guo, J. Q. Ni, Y. Q. Shi, "An efficient JPEG steganographic scheme using uniform embedding," in Proc. of Fourth IEEE International Workshop on Information Forensics and Security, pp.169-174, December 2-5, 2012.
  12. V. Holub and J. Fridrich, "Digital image steganography using universal distortion," in Proc. of 1st ACM IH&MMSec. Workshop, pp.59-68, June 20-22, 2013.
  13. T. Filler, J. Judas, and J. Fridrich, "Minimizing additive distortion in steganography using syndrome-trellis codes," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 920-935, September, 2011. https://doi.org/10.1109/TIFS.2011.2134094
  14. S. Lyu, H. Farid, "Steganalysis using higher-order image statistics," IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 111-119, March, 2006. https://doi.org/10.1109/TIFS.2005.863485
  15. X.Y. Luo, D.S. Wang, P. Wang and F.L. Liu, "A review on blind detection for image steganography," Signal Processing, vol. 6, no. 3, pp. 2138-2157, September, 2008.
  16. H. Zong, F. L. Liu and X. Y. Luo, "Blind Image Steganalysis Based on Wavelet Coefficient Correlation," Digital Investigation, vol. 9, no. 1, pp. 58-68, June, 2012. https://doi.org/10.1016/j.diin.2012.02.003
  17. J. Kodovsky, J. Fridrich, and V. Holub, "On dangers of overtraining steganography to incomplete cover model," in Proc. of the 13th ACM Multimedia & Security Workshop, pp. 69-76, September 29-30, 2011.
  18. X. F. Song, F. L. Liu, X. Y. Luo and J. C. Lu, "Steganalysis of perturbed quantization steganography based on the enhanced histogram features," Multimedia Tools and Applications, vol. 74, no. 24, pp. 11045-11071, December, 2015. https://doi.org/10.1007/s11042-014-2217-6
  19. J. Kodovsky and J. Fridrich, "Steganalysis of JPEG images using rich models," in Proc. of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, pp. 0A 1-13, January 22-26, 2012.
  20. V. Holub and J. Fridrich, "Random projections of residuals for digital image steganalysis," IEEE Transactions on Information Forensics and Security, 8(12):1996-2006, 2013. https://doi.org/10.1109/TIFS.2013.2286682
  21. V. Holub and J. Fridrich, "Low Complexity Features for JPEG Steganalysis Using Undecimated DCT," IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, pp. 219-228, February, 2015. https://doi.org/10.1109/TIFS.2014.2364918
  22. V. Holub, J. Fridrich, "Phase-Aware Projection Model for Steganalysis of JPEG Images," in Proc. of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, pp. 94090T-94090T-11, February 8-12, 2015.
  23. X. F. Song, F. L. Liu, C. F. Yang, X. Y. Luo and Y. Zhang, "Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters," in Proc. of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 15-23, June 17-19, 2015.
  24. J. Kodovsky, J. Fridrich and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Transactions on Information Forensics and Security, vol.7, no. 2, pp. 432-444, April, 2012. https://doi.org/10.1109/TIFS.2011.2175919
  25. J. G. Daugman, "Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters," Journal of the Optical Society of America A Optics and Image Science, vol. 2, no. 7, pp. 1160-1169, July, 1985. https://doi.org/10.1364/JOSAA.2.001160
  26. M. Idrissa, M. Acheroy, "Texture classification using Gabor filters," Pattern Recognition Letters, vol. 23, no. 9, pp. 1095-1102, July, 2002. https://doi.org/10.1016/S0167-8655(02)00056-9
  27. M. Li, R.C. Staunton, "Optimum Gabor filter design and local binary patterns for texture segmentation," Pattern Recognition Letters, vol. 29, no. 5, pp. 664-672, April, 2008. https://doi.org/10.1016/j.patrec.2007.12.001
  28. Z. N. Sun, T. N. Tan, "Ordinal Measures for Iris Recognition," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, no. 12, pp. 2211-2226, December, 2009. https://doi.org/10.1109/TPAMI.2008.240
  29. Z. H. Chai, Z. N Sun, H. M. Vazquez, R. He and T. N. Tan, "Gabor Ordinal Measures for Face Recognition," IEEE Transactions on Information Forensics and Security, vol. 9, no. 1, pp. 14-26, January, 2014. https://doi.org/10.1109/TIFS.2013.2290064
  30. T. Denemark, V. Sedighi, V. Holub and R. Cogranne, "Selection-Channel-Aware Rich Model for Steganalysis of Digital Images," in Proc. of the 5th IEEE International Workshop on Information Forensics and Security, pp. 48-53, December 3-5, 2014.
  31. S. E. Grigorescu, N. Petkov and P. Kruizinga, "Comparison of Texture Features Based on Gabor Filters," IEEE Transactions on Image Processing, vol. 11, no. 10, pp. 1160-1167, October, 2002. https://doi.org/10.1109/TIP.2002.804262
  32. P. Bas, T. Filler and T. Pevny, "Break our steganographic system-The ins and outs of organizing BOSS," in Proc. of the 13th International workshop on Information Hiding, pp. 59-70, May 18-20, 2011.

Cited by

  1. J-UNIWARD Steganoanalysis vol.57, pp.3, 2021, https://doi.org/10.1007/s10559-021-00374-6