Multimedia Tools and Applications

, Volume 74, Issue 24, pp 11045–11071 | Cite as

Steganalysis of perturbed quantization steganography based on the enhanced histogram features

  • Xiaofeng Song
  • Fenlin Liu
  • Xiangyang Luo
  • Jicang Lu
  • Yi Zhang


In this paper, the enhanced histogram features are proposed for detecting perturbed quantization (PQ) steganography applied to double-compression JPEG image. Firstly, the principle of PQ steganography is analyzed and the special positions for feature extraction are determined. Secondly, the changes of the global, local and dual histogram features are analyzed for PQ embedding, and then these histogram features are extracted from the DCT coefficients at the special positions. Thirdly, to improve the effectiveness and diversity of steganalysis feature, the three kinds of histogram features are also extracted from DCT coefficients difference. Lastly, all the histogram features are calibrated and combined as the enhanced histogram features, and the ensemble classifier is employed to obtain detection results. The experimental results show the proposed feature can improve the detection accuracy for PQ and PQt; for PQe, it can obtain approximate detection accuracy with Cartesian-calibrated JPEG rich model (CC-JRM), but the feature dimensionality is far below CC-JRM.


perturbed quantization steganography steganalysis histogram feature detection accuracy 



This work was supported by the National Natural Science Foundation of China (No. 61379151, 61274189, and 61302159), and the Excellent Youth Foundation of Henan Province of China (No.144100510001).


  1. 1.
    Avcibas I, Kharrazi M, Memon N, Sankur B (2005) Image Steganalysis with Binary Similarity Measures. EURASIP Journal on Applied Signal Processing 17:2749–2757CrossRefGoogle Scholar
  2. 2.
    Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90(3):727–752MATHCrossRefGoogle Scholar
  3. 3.
    Chen C, Shi Y Q (2008) JPEG image steganalysis utilizing both intrablock and interblock correlations. Proceedings of IEEE International Symposium Circuits and Systems, Seattle, WA. 18–21 May, pp. 3029–3032Google Scholar
  4. 4.
    Fridrich J (2004) Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Proceedings of 6th International Workshop Information Hiding, Toronto, ON, Canada. 23–25 May, pp. 67–81Google Scholar
  5. 5.
    Fridrich J, Goljan M, and Soukal D (2004). Perturbed quantization steganography using wet paper codes. Proceedings of the 6th ACM Multimedia and Security Workshop. Magdeburg, Germany, 20-21 September, pp 4-15Google Scholar
  6. 6.
    Fridrich J, GoljanM SD (2005) Perturbed quantization steganography. ACM Multimedia Security Journal 11(2):98–107CrossRefGoogle Scholar
  7. 7.
    Fridrich J, Pevný T, Kodovský J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. Proceedings of 9th ACM Multimedia and Security Workshop, Dallas, TX, 20-21 September, pp. 3–14Google Scholar
  8. 8.
    Gül G, Dirik AE, Avcıbas I (2007) Steganalytic Features for JPEG Compression-Based Perturbed Quantization. IEEE Signal Processing Letters 14(3):205–208CrossRefGoogle Scholar
  9. 9.
  10. 10.
    Kharrazi M, Sencar HT, Memon N (2006) Performance study of common image steganography and steganalysis techniques. Journal of Electronic Imaging 15(4):041104.1–16Google Scholar
  11. 11.
    Kim Y, Duric Z, Richards D (2006) Modified matrix encoding technique for minimal distortion steganography. Proceedings of 8th International. Workshop Information Hiding, Alexandria VA. 10–12 July, pp. 314–327Google Scholar
  12. 12.
    Kodovský J, Fridrich J (2009) Calibration revisited. Proceedings of 11th ACM Workshop Multimedia and Security, Princeton, NJ, 7–8 September, pp. 63–74Google Scholar
  13. 13.
    Kodovský J, Fridrich J (2012) Steganalysis of JPEG images using rich models. Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, vol. 8303, San Francisco, CA. 23-25 January, pp. 0A 1–13Google Scholar
  14. 14.
    Kodovský J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2):432–444CrossRefGoogle Scholar
  15. 15.
    Liu Q Z (2011). Steganalysis of DCT-embedding based adaptive steganography and YASS. Proceedings of the 13th ACM Multimedia and Security Workshop. Buffalo, NY, 29-30 September, pp. 77–86Google Scholar
  16. 16.
    Luo X Y, Wang D S, Wang P, Liu F L(2008). A review on blind detection for image steganography. Signal Processing, 88(9):2138–2157Google Scholar
  17. 17.
    Lyu S, Farid H (2006) Steganalysis using higher order image statistics. IEEE Transactions on Information Forensics and Security 1(1):111–119CrossRefGoogle Scholar
  18. 18.
    Pevný T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security 5(2):215–224CrossRefGoogle Scholar
  19. 19.
    Pevný T, Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis. Proceedings of Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA. January 28, pp. 1–13Google Scholar
  20. 20.
    Provos N (2001) Defending against statistical steganalysis. Proceedings of 10th Usenix Security Symposium, Washington DC. 13–17 August, pp. 323–335Google Scholar
  21. 21.
    Sallee P (2003) Model-based steganography. Proceedings of 2nd Int. Workshop Digital Watermarking, Seoul, Korea. 20–22 October, pp. 154–167Google Scholar
  22. 22.
    Sallee P (2005) Model-based methods for steganography and steganalysis. International Journal of Image Graphics 5(1):167–190CrossRefGoogle Scholar
  23. 23.
    Shi Y Q, Chen C, Chen W (2006) A Markov process based approach to effective attacking JPEG steganography. Proceedings of 8th International Workshop Information Hiding Workshop, Old Town Alexandria, VA. 10–12 July, pp. 249–264Google Scholar
  24. 24.
    Westfeld A (2001) High capacity despite better steganalysis (F5–A steganographic algorithm). Proceedings of 4th International Workshop on Information Hiding, Pittsburgh, PA. 25–27 April, pp. 289–302Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  • Xiaofeng Song
    • 1
    • 2
  • Fenlin Liu
    • 1
    • 2
  • Xiangyang Luo
    • 1
    • 2
  • Jicang Lu
    • 1
    • 2
  • Yi Zhang
    • 1
    • 2
  1. 1.Zhengzhou Information Science and Technology InstituteZhengzhouPeople’s Republic of China
  2. 2.State Key Laboratory of Mathematical Engineering and Advanced ComputingZhengzhouPeople’s Republic of China

Personalised recommendations