Abstract
In this paper, the enhanced histogram features are proposed for detecting perturbed quantization (PQ) steganography applied to double-compression JPEG image. Firstly, the principle of PQ steganography is analyzed and the special positions for feature extraction are determined. Secondly, the changes of the global, local and dual histogram features are analyzed for PQ embedding, and then these histogram features are extracted from the DCT coefficients at the special positions. Thirdly, to improve the effectiveness and diversity of steganalysis feature, the three kinds of histogram features are also extracted from DCT coefficients difference. Lastly, all the histogram features are calibrated and combined as the enhanced histogram features, and the ensemble classifier is employed to obtain detection results. The experimental results show the proposed feature can improve the detection accuracy for PQ and PQt; for PQe, it can obtain approximate detection accuracy with Cartesian-calibrated JPEG rich model (CC-JRM), but the feature dimensionality is far below CC-JRM.
Similar content being viewed by others
Notes
The stego image is decompressed to the spatial domain, cropped by 4 pixels in each direction, and recompressed with the same quantization table to obtain reference image, then the same features extracted from the stego image and the reference image are combined to form the final Cartesian calibrated features [12].
References
Avcibas I, Kharrazi M, Memon N, Sankur B (2005) Image Steganalysis with Binary Similarity Measures. EURASIP Journal on Applied Signal Processing 17:2749–2757
Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90(3):727–752
Chen C, Shi Y Q (2008) JPEG image steganalysis utilizing both intrablock and interblock correlations. Proceedings of IEEE International Symposium Circuits and Systems, Seattle, WA. 18–21 May, pp. 3029–3032
Fridrich J (2004) Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Proceedings of 6th International Workshop Information Hiding, Toronto, ON, Canada. 23–25 May, pp. 67–81
Fridrich J, Goljan M, and Soukal D (2004). Perturbed quantization steganography using wet paper codes. Proceedings of the 6th ACM Multimedia and Security Workshop. Magdeburg, Germany, 20-21 September, pp 4-15
Fridrich J, GoljanM SD (2005) Perturbed quantization steganography. ACM Multimedia Security Journal 11(2):98–107
Fridrich J, Pevný T, Kodovský J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. Proceedings of 9th ACM Multimedia and Security Workshop, Dallas, TX, 20-21 September, pp. 3–14
Gül G, Dirik AE, Avcıbas I (2007) Steganalytic Features for JPEG Compression-Based Perturbed Quantization. IEEE Signal Processing Letters 14(3):205–208
Kharrazi M, Sencar HT, Memon N (2006) Performance study of common image steganography and steganalysis techniques. Journal of Electronic Imaging 15(4):041104.1–16
Kim Y, Duric Z, Richards D (2006) Modified matrix encoding technique for minimal distortion steganography. Proceedings of 8th International. Workshop Information Hiding, Alexandria VA. 10–12 July, pp. 314–327
Kodovský J, Fridrich J (2009) Calibration revisited. Proceedings of 11th ACM Workshop Multimedia and Security, Princeton, NJ, 7–8 September, pp. 63–74
Kodovský J, Fridrich J (2012) Steganalysis of JPEG images using rich models. Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, vol. 8303, San Francisco, CA. 23-25 January, pp. 0A 1–13
Kodovský J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2):432–444
Liu Q Z (2011). Steganalysis of DCT-embedding based adaptive steganography and YASS. Proceedings of the 13th ACM Multimedia and Security Workshop. Buffalo, NY, 29-30 September, pp. 77–86
Luo X Y, Wang D S, Wang P, Liu F L(2008). A review on blind detection for image steganography. Signal Processing, 88(9):2138–2157
Lyu S, Farid H (2006) Steganalysis using higher order image statistics. IEEE Transactions on Information Forensics and Security 1(1):111–119
Pevný T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security 5(2):215–224
Pevný T, Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis. Proceedings of Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA. January 28, pp. 1–13
Provos N (2001) Defending against statistical steganalysis. Proceedings of 10th Usenix Security Symposium, Washington DC. 13–17 August, pp. 323–335
Sallee P (2003) Model-based steganography. Proceedings of 2nd Int. Workshop Digital Watermarking, Seoul, Korea. 20–22 October, pp. 154–167
Sallee P (2005) Model-based methods for steganography and steganalysis. International Journal of Image Graphics 5(1):167–190
Shi Y Q, Chen C, Chen W (2006) A Markov process based approach to effective attacking JPEG steganography. Proceedings of 8th International Workshop Information Hiding Workshop, Old Town Alexandria, VA. 10–12 July, pp. 249–264
Westfeld A (2001) High capacity despite better steganalysis (F5–A steganographic algorithm). Proceedings of 4th International Workshop on Information Hiding, Pittsburgh, PA. 25–27 April, pp. 289–302
Acknowledgments
This work was supported by the National Natural Science Foundation of China (No. 61379151, 61274189, and 61302159), and the Excellent Youth Foundation of Henan Province of China (No.144100510001).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Song, X., Liu, F., Luo, X. et al. Steganalysis of perturbed quantization steganography based on the enhanced histogram features. Multimed Tools Appl 74, 11045–11071 (2015). https://doi.org/10.1007/s11042-014-2217-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-2217-6