Skip to main content
Log in

Steganalysis of perturbed quantization steganography based on the enhanced histogram features

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, the enhanced histogram features are proposed for detecting perturbed quantization (PQ) steganography applied to double-compression JPEG image. Firstly, the principle of PQ steganography is analyzed and the special positions for feature extraction are determined. Secondly, the changes of the global, local and dual histogram features are analyzed for PQ embedding, and then these histogram features are extracted from the DCT coefficients at the special positions. Thirdly, to improve the effectiveness and diversity of steganalysis feature, the three kinds of histogram features are also extracted from DCT coefficients difference. Lastly, all the histogram features are calibrated and combined as the enhanced histogram features, and the ensemble classifier is employed to obtain detection results. The experimental results show the proposed feature can improve the detection accuracy for PQ and PQt; for PQe, it can obtain approximate detection accuracy with Cartesian-calibrated JPEG rich model (CC-JRM), but the feature dimensionality is far below CC-JRM.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Notes

  1. The stego image is decompressed to the spatial domain, cropped by 4 pixels in each direction, and recompressed with the same quantization table to obtain reference image, then the same features extracted from the stego image and the reference image are combined to form the final Cartesian calibrated features [12].

References

  1. Avcibas I, Kharrazi M, Memon N, Sankur B (2005) Image Steganalysis with Binary Similarity Measures. EURASIP Journal on Applied Signal Processing 17:2749–2757

    Article  Google Scholar 

  2. Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90(3):727–752

    Article  MATH  Google Scholar 

  3. Chen C, Shi Y Q (2008) JPEG image steganalysis utilizing both intrablock and interblock correlations. Proceedings of IEEE International Symposium Circuits and Systems, Seattle, WA. 18–21 May, pp. 3029–3032

  4. Fridrich J (2004) Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Proceedings of 6th International Workshop Information Hiding, Toronto, ON, Canada. 23–25 May, pp. 67–81

  5. Fridrich J, Goljan M, and Soukal D (2004). Perturbed quantization steganography using wet paper codes. Proceedings of the 6th ACM Multimedia and Security Workshop. Magdeburg, Germany, 20-21 September, pp 4-15

  6. Fridrich J, GoljanM SD (2005) Perturbed quantization steganography. ACM Multimedia Security Journal 11(2):98–107

    Article  Google Scholar 

  7. Fridrich J, Pevný T, Kodovský J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. Proceedings of 9th ACM Multimedia and Security Workshop, Dallas, TX, 20-21 September, pp. 3–14

  8. Gül G, Dirik AE, Avcıbas I (2007) Steganalytic Features for JPEG Compression-Based Perturbed Quantization. IEEE Signal Processing Letters 14(3):205–208

    Article  Google Scholar 

  9. Jsteg, http://zooid.org/paul/crypto/jsteg/

  10. Kharrazi M, Sencar HT, Memon N (2006) Performance study of common image steganography and steganalysis techniques. Journal of Electronic Imaging 15(4):041104.1–16

    Google Scholar 

  11. Kim Y, Duric Z, Richards D (2006) Modified matrix encoding technique for minimal distortion steganography. Proceedings of 8th International. Workshop Information Hiding, Alexandria VA. 10–12 July, pp. 314–327

  12. Kodovský J, Fridrich J (2009) Calibration revisited. Proceedings of 11th ACM Workshop Multimedia and Security, Princeton, NJ, 7–8 September, pp. 63–74

  13. Kodovský J, Fridrich J (2012) Steganalysis of JPEG images using rich models. Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, vol. 8303, San Francisco, CA. 23-25 January, pp. 0A 1–13

  14. Kodovský J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2):432–444

    Article  Google Scholar 

  15. Liu Q Z (2011). Steganalysis of DCT-embedding based adaptive steganography and YASS. Proceedings of the 13th ACM Multimedia and Security Workshop. Buffalo, NY, 29-30 September, pp. 77–86

  16. Luo X Y, Wang D S, Wang P, Liu F L(2008). A review on blind detection for image steganography. Signal Processing, 88(9):2138–2157

  17. Lyu S, Farid H (2006) Steganalysis using higher order image statistics. IEEE Transactions on Information Forensics and Security 1(1):111–119

    Article  Google Scholar 

  18. Pevný T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security 5(2):215–224

    Article  Google Scholar 

  19. Pevný T, Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis. Proceedings of Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA. January 28, pp. 1–13

  20. Provos N (2001) Defending against statistical steganalysis. Proceedings of 10th Usenix Security Symposium, Washington DC. 13–17 August, pp. 323–335

  21. Sallee P (2003) Model-based steganography. Proceedings of 2nd Int. Workshop Digital Watermarking, Seoul, Korea. 20–22 October, pp. 154–167

  22. Sallee P (2005) Model-based methods for steganography and steganalysis. International Journal of Image Graphics 5(1):167–190

    Article  Google Scholar 

  23. Shi Y Q, Chen C, Chen W (2006) A Markov process based approach to effective attacking JPEG steganography. Proceedings of 8th International Workshop Information Hiding Workshop, Old Town Alexandria, VA. 10–12 July, pp. 249–264

  24. Westfeld A (2001) High capacity despite better steganalysis (F5–A steganographic algorithm). Proceedings of 4th International Workshop on Information Hiding, Pittsburgh, PA. 25–27 April, pp. 289–302

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (No. 61379151, 61274189, and 61302159), and the Excellent Youth Foundation of Henan Province of China (No.144100510001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangyang Luo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Song, X., Liu, F., Luo, X. et al. Steganalysis of perturbed quantization steganography based on the enhanced histogram features. Multimed Tools Appl 74, 11045–11071 (2015). https://doi.org/10.1007/s11042-014-2217-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2217-6

Keywords

Navigation