Skip to main content

Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines

  • Conference paper
  • First Online:
Information Hiding (IH 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2578))

Included in the following conference series:

Abstract

Techniques for information hiding have become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting hidden messages has become considerably more difficult. This paper describes an approach to detecting hidden messages in images that uses a wavelet-like decomposition to build higher-order statistical models of natural images. Support vector machines are then used to discriminate between untouched and adulterated images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. J. Anderson and F.A.P. Petitcolas. On the limits of steganography. IEEE Journal on Selected Areas in Communications, 16(4):474–481, 1998. 340

    Article  Google Scholar 

  2. R.W. Buccigrossi and E.P. Simoncelli. Image compression via joint statistical characterization in the wavelet domain. IEEE Transactions on Image Processing, 8(12):1688–1701, 1999. 341, 342

    Article  Google Scholar 

  3. C. J.C. Burges. A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 2:121–167, 1998. 343

    Article  Google Scholar 

  4. Chih-Chung Chang and Chih-Jen Lin. LIBSVM: a library for support vector machines, 2001. Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm. 349, 350

  5. R. Duda and P. Hart. Pattern Classification and Scene Analysis. John Wiley and Sons, 1973. 343

    Google Scholar 

  6. H. Farid. Detecting hidden messages using higher-order statistical models. In International Conference on Image Processing, page (to appear), Rochester, New York, 2002. 343, 349, 350

    Google Scholar 

  7. R. Fisher. The use of multiple measures in taxonomic problems. Annals of Eugenics, 7:179–188, 1936. 343

    Google Scholar 

  8. R. Fletcher. Practical Methods of Optimization. JohnWiley and Sons, 2nd edition, 1987. 345

    Google Scholar 

  9. J. Fridrich and M. Goljan. Practical steganalysis: State of the art. In SPIE Photonics West, Electronic Imaging, San Jose, CA, 2002. 340

    Google Scholar 

  10. N. Johnson and S. Jajodia. Exploring steganography: seeing the unseen. IEEE Computer, pages 26–34, 1998. 340

    Google Scholar 

  11. N. Johnson and S. Jajodia. Steganalysis of images created using current steganography software. Lecture notes in Computer Science, pages 273–289, 1998. 340

    Google Scholar 

  12. D. Kahn. The history of steganography. In Proceedings of Information Hiding, First International Workshop, Cambridge, UK, 1996. 340

    Google Scholar 

  13. D. Kersten. Predictability and redundancy of natural images. Journal of the Optical Society of America A, 4(12):2395–2400, 1987. 340

    Article  Google Scholar 

  14. G. Krieger, C. Zetzsche, and E. Barth. Higher-order statistics of natural images and their exploitation by operators selective to intrinsic dimensionality. In Proceedings of the IEEE Signal Processing Workshop on Higher-Order Statistics, pages 147–151, Banff, Alta., Canada, 1997. 340

    Google Scholar 

  15. E.A.P. Petitcolas, R. J. Anderson, and M.G. Kuhn. Information hiding-a survey. Proceedings of the IEEE, 87(7):1062–1078, 1999. 340

    Article  Google Scholar 

  16. N. Provos. Defending against statistical steganalysis. In 10th USENIX Security Symposium, Washington, DC, 2001. 348

    Google Scholar 

  17. N. Provos and P. Honeyman. Detecting steganographic content on the internet. Technical Report CITI 01-1a, University of Michigan, 2001. 340

    Google Scholar 

  18. R. Rinaldo and G. Calvagno. Image coding by block prediction of multiresolution subimages. IEEE Transactions on Image Processing, 4(7):909–920, 1995. 341

    Article  Google Scholar 

  19. D.L. Ruderman and W. Bialek. Statistics of natural image: Scaling in the woods. Phys. Rev. Letters, 73(6):814–817, 1994. 340

    Article  Google Scholar 

  20. J. Shapiro. Embedded image coding using zerotrees of wavelet coefficients. IEEE Transactions on Signal Processing, 41(12):3445–3462, 1993. 341

    Article  MATH  Google Scholar 

  21. E.P. Simoncelli. Modeling the joint statistics of images in the wavelet domain. In Proceedings of the 44th Annual Meeting, volume 3813, Denver, CO, USA, 1999. 340

    Google Scholar 

  22. E.P. Simoncelli and E.H. Adelson. Subband image coding, chapter Subband transforms, pages 143–192. Kluwer Academic Publishers, 1990. 341

    Google Scholar 

  23. P.P. Vaidyanathan. Quadrature mirror filter banks, M-band extensions and perfect reconstruction techniques. IEEE ASSP Magazine, pages 4–20, 1987. 341

    Google Scholar 

  24. V. Vapnik. The nature of statistical learning theory. Spring Verlag, 1995. 343

    Google Scholar 

  25. V. Vapnik. Statistical learning theory. John Wiley and Sons, 1998. 343

    Google Scholar 

  26. M. Vetterli. A theory of multirate filter banks. IEEE Transactions on ASSP, 35(3):356–372, 1987. 341

    Google Scholar 

  27. A. Westfeld. High capacity depsite better steganalysis: F5-a steganographic algorithm. In Fourth Information Hiding Workshop, pages 301–315, Pittsburgh, PA, USA, 2001. 350

    Google Scholar 

  28. A. Westfeld and A. Pfitzmann. Attacks on steganographic systems. In Proceedings of Information Hiding, Third International Workshop, Dresden, Germany, 1999. 340

    Google Scholar 

  29. S.C. Zhu, Y. Wu, and D. Mumford. Filters, random fields and maximum entropy (frame)-towards the unified theory for texture modeling. In IEEE Conference Computer Vision and Pattern Recognition, pages 686–693, 1996. 340

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lyu, S., Farid, H. (2003). Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In: Petitcolas, F.A.P. (eds) Information Hiding. IH 2002. Lecture Notes in Computer Science, vol 2578. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36415-3_22

Download citation

  • DOI: https://doi.org/10.1007/3-540-36415-3_22

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00421-9

  • Online ISBN: 978-3-540-36415-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics