Advertisement

Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis

  • Shunquan Tan
  • Jiwu Huang
  • Yun Q. Shi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5041)

Abstract

In this paper, we present a steganalytic method to attack the enhanced BPCS steganography (for short EBPCS) proposed by Niimi et al. The key element of the method is analysis of the bitplane-block complexity difference sequences between stego images and cover images based on Hilbert-Huang transform. The Hilbert transform based characteristic vectors are constructed via empirical mode decomposition of the sequences and the support vector machine classifier is used for classification. Experimental results have demonstrated effectiveness of the proposed steganalytic method in spatial domain images and JPEG2000 format images. According to our best knowledge, this method is the first successful attack of EBPCS and can be effectively used in spatial domain and frequency domain (especially DWT/JPEG2000) images.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Niimi, M., Ei, T., Noda, H., et al.: An attack to BPCS-steganography using complexity histogram and countermeasure. In: Proceedings - International Conference on Image Processing, ICIP, vol. 5, pp. 733–736 (2004)Google Scholar
  2. 2.
    Kawaguchi, E., Eason, R.O.: Principle and applications of BPCS-steganography. In: Proceedings of SPIE - The International Society for Optical Engineering, vol. 3528, pp. 464–473 (1999)Google Scholar
  3. 3.
    Niimi, M., Eason, R.O., Noda, H., Kawaguchi, E.: A method to apply BPCS-steganography to palette-based images using luminance quasi-preserving color quantization. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E85-A, 2141–2148 (2002)Google Scholar
  4. 4.
    Ouellette, R., Noda, H., Niimi, M., et al.: Topological ordered color table for BPCS-steganography using indexed color images. In: roceedings of SPIE - The International Society for Optical Engineering, vol. 3971, pp. 502–509 (2000)Google Scholar
  5. 5.
    Spaulding, J., Noda, H., Shirazi, M.N., et al.: BPCS steganography using EZW lossy compressed images. Pattern Recognition Letters 23(13), 1579–1587 (2002)CrossRefzbMATHGoogle Scholar
  6. 6.
    Torres-Maya, S., Nakano-Miyatake, M., Perez-Meana, H.: An image steganography systems based on bpcs and iwt. In: Proceedings of the 16th IEEE International Conference on Electronics, Communications and Computers, CONIELECOMP 2006, p. 51 (2006)Google Scholar
  7. 7.
    Noda, H., Spaulding, J., et al.: Bit-plane decomposition steganography combined with JPEG2000 compression. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 295–309. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    Noda, H., Furuta, T., Niimi, M., Kawaguchi, E.: Application of BPCS steganography to wavelet compressed video. In: 2004 International Conference on Image Processing, ICIP 2004, pp. 2147–2150 (2004)Google Scholar
  9. 9.
    Zhang, X., Wang, S.: Statistical analysis against spatial BPCS steganography.  17, 1625–1629 (2005)Google Scholar
  10. 10.
    Yu, X., Tan, T., Wang, Y.: Reliable detection of BPCS-steganography in natural images. In: Third International Conference on Image and Graphics, pp. 333–336 (2004)Google Scholar
  11. 11.
    Tan, S., Jiwu Huang, Z.Y.: Steganalysis of JPEG2000 lazy-mode steganography using the hilbert-huang transform based sequential analysis. In: Proceedings - International Conference on Image Processing (ICIP 2006), Atlanta, October 8-11 (2006)Google Scholar
  12. 12.
    Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/cjlin/libsvm

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Shunquan Tan
    • 1
    • 2
  • Jiwu Huang
    • 2
  • Yun Q. Shi
    • 3
  1. 1.College of Information EngineeringShenzhen UniversityShenzhenChina
  2. 2.School of Information Science and TechnologySun Yat-sen UniversityGuangzhouChina
  3. 3.New Jersey Institute of TechnologyNewarkUSA

Personalised recommendations