Skip to main content

Steganalysis of Perturbed Quantization Using HBCL Statistics and FR Index

  • Conference paper
Information Intelligence, Systems, Technology and Management (ICISTM 2011)

Abstract

Targeted steganalysis aims at detecting hidden data embedded by a particular algorithm without any knowledge of the ‘cover’ image. In this paper we propose a novel approach for detecting Perturbed Quantization Steganography (PQ) by HFS (Huffman FR index Steganalysis) algorithm using a combination of Huffman Bit Code Length (HBCL) Statistics and File size to Resolution ratio (FR Index) which is not yet explored by steganalysts. JPEG images spanning a wide range of sizes, resolutions, textures and quality are used to test the performance of the model. In this work we evaluate the model against several classifiers like Artificial Neural Networks (ANN), k-Nearest Neighbors (k-NN), Random Forests (RF) and Support Vector Machines (SVM) for steganalysis. Experiments conducted prove that the proposed HFS algorithm can detect PQ of several embedding rates with a better accuracy compared to the existing attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Birgit, P.: Information hiding terminology-results of an informal plenary meeting and additional proposals. In: The Proceedings of the First International Workshop on Information Hiding, pp. 347–350 (1996)

    Google Scholar 

  2. Miche, Y., Bas, P., Lendasse, A., Jutten, C., Simula, O.: Reliable steganalysis using a minimum set of samples and features. EURASIP Journal of Information Security, 350–354 (2009)

    Google Scholar 

  3. Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography. ACM Multimedia and Security Journal 11(2), 98–107 (2005)

    Article  Google Scholar 

  4. Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography using wet paper codes. In: The Proceedings of ACM MM&S Workshop, Germany, pp. 4–15 (2004)

    Google Scholar 

  5. Fridrich, J., Pevny, T., Kodovsky, J.: Statistically undetectable JPEG steganography: dead ends. Challenges, and Opportunities. In: The Proceedings of ACM MM&S Workshop, Dallas, TX, pp. 3–14 (2007)

    Google Scholar 

  6. Hedieh, S., Mansour, J.: CBS: contourlet-based steganalysis method. Journal of Signal Processing Systems (2010)

    Google Scholar 

  7. Kharrazi, M., Sencar, H.T., Memon, N.: Benchmarking steganographic and steganalysis techniques. Journal of Electronic Imaging 15(4) (2006)

    Google Scholar 

  8. Zuzana, O., Jiri, H., Ivan, Z., Roman, S.: Steganography detection by means of neural network. In: The Ninteenth International Conference on Database and Expert Systems Application, pp. 571–574. IEEE Computer Society, Los Alamitos (2008)

    Google Scholar 

  9. Joachims, T.: Text categorization with support vector machines: learning with many relevant features. In: Nédellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, vol. 1398, pp. 137–142. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  10. Chiew, K.L., Pieprzyk, J.: Blind steganalysis: a countermeasure for binary image steganography. In: The Proceedings of the International Conference on Availability, Reliability and Security, pp. 653–658 (2010)

    Google Scholar 

  11. Dautrich, J.: Multi-class steganalysis. Machine Learning Course Research Project Distinguishing Images Embedded using Reversible Steganographic Schemes (2009)

    Google Scholar 

  12. Yoan, M., Benoit, R., Amaury, L., Patrick, B.: A feature selection methodology for steganalysis. In: Gunsel, B., Jain, A.K., Tekalp, A.M., Sankur, B. (eds.) MRCS 2006. LNCS, vol. 4105, pp. 49–56. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Bosch, A., Zisserman, A., Munoz, X.: Image classification using random forests and ferns. In: The IEEE Eleventh International Conference on Computer Vision, pp. 1–8 (2007)

    Google Scholar 

  14. Bhat, V.H., Krishna, S., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: HUBFIRE - A multi-class SVM based JPEG steganalysis using HBCL statistics and FR index. In: SECRYPT (in press, 2010)

    Google Scholar 

  15. Kharrazi., M., Sencar., H.T., Memon, N.: A performance study of common image steganography and steganalysis techniques. Journal of Electronic Imaging 15(4) (2006)

    Google Scholar 

  16. Fawcett, T.: ROC graphs: notes and practical considerations for data mining researchers. Technical Report HPL-2003–4. HP Laboratories, Palo Alto (2003)

    Google Scholar 

  17. Bishop, C.: Neural networks for pattern recognition. Oxford, Oxford University, UK (1995)

    MATH  Google Scholar 

  18. Ho, T.: Random decision forest. In: The Third International Conference on Document Analysis and Recognition, pp. 278–282 (1995)

    Google Scholar 

  19. http://debian.mc.vanderbilt.edu/R/CRAN/web/packages/randomForest/randomForest.pdf

  20. Burges, C.: A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery 2, 121–167 (1998)

    Article  Google Scholar 

  21. Gül, G., Dirik, A.E., Avcıbas, I.: Steganalytic features for JPEG compression-based perturbed quantization. IEEE Signal Processing Letters 14(3), 205–208 (2007)

    Article  Google Scholar 

  22. Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  23. Avcibas, I., Kharrazi, M., Memon, N., Sankur, B.: Image steganalysis with binary similarity measures. EURASIP Journal on Applied Signal Processing, 2749–2757 (2005)

    Google Scholar 

  24. Lyu., S., Farid, H.: Steganalysis using color wavelet statistics and one-class support vector machines. In: SPIE Symposium on Electronic Imagining, San Jose, CA (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bhat, V.H., Krishna, S., Deepa Shenoy, P., Venugopal, K.R., Patnaik, L.M. (2011). Steganalysis of Perturbed Quantization Using HBCL Statistics and FR Index. In: Dua, S., Sahni, S., Goyal, D.P. (eds) Information Intelligence, Systems, Technology and Management. ICISTM 2011. Communications in Computer and Information Science, vol 141. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19423-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19423-8_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19422-1

  • Online ISBN: 978-3-642-19423-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics