Open Access Open Access  Restricted Access Subscription or Fee Access

Performance Analysis of Universal Steganalysis Based on Higher Order Statistics for Neighbourhood Pixels

Swagota Bera, Dr. Monisha Sharma, Dr. Bikesh Singh

Abstract


Universal steganalysis of grey level JPEG images is addressed by modelling the neighbourhood relationship of the image coefficients using the higher order statistical method developed by two-step Markov Transition Probability Matrix (TPM). The implementation of TPM together with the neighbouring pixel relationship provides a better detection results as justified with the help of experimental results. The detection accuracy and execution time has been evaluated on the image sets taken from Green spun library and Google website. Performance analysis has been done using SVM, J48 and Random Forest. It is practically applicable steganalysis scheme with suitable feature dimension and with appreciable detection results with low execution time.


Keywords


Steganography, Universal Steganalysis; DCT; DWT; TPM; RF; J48; Neighbour Pixel; WEKA; SVM

Full Text:

PDF

References


J. Kelly. (September 2007). Terror Groups Hide Behind Web Encryption. USA Today. Available: http://www.Usatoday. Com/life/cyber/tech/.

Anonymus. (November 2011). What is Steganography?. Available: www.tech-faq.com/steganography.html.

https://www.deepdotweb.com/2017/01/02/steganalysis-finding-hidden-data-images/.

V. Holub and J. Fridrich,” Digital Image Steganography using Universal Distortion,” ACM Workshop on Information Hiding and Multimedia Security, France, 2013, pp.59–68.

J. Fridrich, T. Pevný and J. Kodovský,” Statistically Undetectable JPEG Steganography: Dead ends, Challenges, and Opportunities,” International Workshop on Multimedia & Security, Germany, 2007, pp.3–14.

S. Bera and M. Sharma,” Frequency Domain Steganography System using Modified Quantization Table,” International Journal of Advanced 1and Innovative Research, vol. 1, issue. 7, 2012, pp.193-196.

J. Fridrich, M. Goljan and D. Hogea,” Attacking the Outguess,” ACM Workshop on Multimedia and Security, Dec. 6, 2002.

A.Westfeld, “F5—A Steganographic Algorithm:High Capacity Despite Better Steganalysis,” Information Hiding, 2001, pp. 289–302.

U. Dewangan, M. Sharma and S. Bera. S,” Development and analysis of stego image using discretewavelet transform,” International Journal of Science and Research, vol. 2, issue. 1, 2013, pp.142–148.

S. Lyu and H. Farid, “Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines,” Information Hiding, 2003, pp. 340–354.

G. T. Kumar, R. Jithin and D. Deepa,” Feature Based Steganalysis Using Wavelet Decomposition and Magnitude Statistics,” International Conference on Advances in Computer Engineering, 2010, pp.298 - 300.

Y. Q. Shi, C. Chen, W. Chen and G. Xuan, “Statistical Moments Based Universal Steganalysis usingJPEG2-d Array and 2-D Characteristic Function,” IEEE International Conference on Image Processing, 2006, 105-108.

J. Fridrich, “Feature-Based Steganalysis for JPEG Images and its Implication for Future Design of Steganographic Schemes, “Information Hiding, 2005, pp. 67–81.

T. Pevny and J. Fridrich, “Merging Markov and DCT features for Multiclass JPEG Steganalysis,” Electronic Imaging, Security, Steganography and Watermarking of Multimedia Contents,SPIE, CA, vol.6505,pp.1–13.

Y. Q. Shi, C. Chen and W. Chen, “A Markov Process Based Approach to Effective Attacking JPEG Steganography, “Information Hiding, Springer, 2006, pp. 249–264.

M. Kumar, “Steganography and Steganalysis of Joint Picture Expert Group (JPEG) Images, Doctoral Dissertation, Florida University, 2012.

H. Farid, “Detecting Hidden Messages Using Higher-Order Statistical Models, “IEEE International Conference on Image Processing, 2002, pp. 905–908.

Z. M. He, W. Ng and P.P.K. Chan, “. Steganography Detection using Localized Generalization Error Model,” IEEE International Conference on Systems Man and Cybernetics, 2010, pp. 1544 - 1549.

J. Fridrich and J. Kodovsky, “Ensemble Classifiers for Steganalysis of Digital Media, “IEEE Transactions Forensic and Security, vol. 7, issue. 2, 2012, pp.432-444.

F. Li, X. Zhang, B. Chen and G. Feng, “ JPEG Steganalysis with High- Dimensional Features and Bayesian Ensemble Classifier,” IEEE Signal processing Letters, vol. 20, issue.3, 2013,pp. 233 - 236.

K. Sullivan and B.S. Manjunath, “Steganalysis for Markov Cover Data with Applications to Images, “ IEEE Transaction on Information Forensic and Security, vol.1, issue.2, 2006,pp. 275-287.

D. Fu, Y. Shi and D. Zou, “JPEG Steganalysis using Empirical Transition Matrix in Block DCT Domain,” IEEE Workshop on Multimedia Signal Processing, 2007, pp. 310–313.

C. Chen and Y.Q.Shi, “JPEG Image Steganalysis Utilizing Both Intrablock and Inter-block Correlations,” IEEE International Symposium on Circuits and Systems, 2008, pp.3029 –3032.

Z. Zhou and M. Hui, “Steganalysis for Markov feature of Difference Array in DCT Domain, “International Conference on Fuzzy Systems and Knowledge Discovery, 2009, pp.581–584.

S. Cho, B. Cha, J.Wang and J. Kuo, “Block-Based Image Steganalysis: Algorithm and Performance Evaluation,” IEEE International Symposium on Circuits and Systems Proceedings, 2010, pp.1679 - 1682.

J. Fridrich, “Rich Model for Steganalysis of Digital Images,” IEEE Transaction on Information Forensics and Security, vol. 7, issue. 3, 2012, pp.868-882.

S. Jinyang, Z. Xianting and W. Lei, “Steganalysis using Regional Correlation and Second - Order Markov Features,” International Journal of Security and its Applications, vol.9, issue. 1, 2015, pp.69-76.

Machine Learning Project at the University of Waikato in New Zealand.( February 2016). Avalable: http://www.cs.waikato.ac.nz/ml/index.html. [Accessed: 14-Feb-2016].

P. Greenspun. (November 2011). JPEG Images. Available: www.philip.greenspun.com.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.