[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2909827.2930799acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
short-paper

Color Image Steganalysis Based On Steerable Gaussian Filters Bank

Published: 20 June 2016 Publication History

Abstract

This article deals with color images steganalysis based on machine learning. The proposed approach enriches the features from the Color Rich Model by adding new features obtained by applying steerable Gaussian filters and then computing the co-occurrence of pixel pairs. Adding these new features to those obtained from Color-Rich Models allows us to increase the detectability of hidden messages in color images. The Gaussian filters are angled in different directions to precisely compute the tangent of the gradient vector. Then, the gradient magnitude and the derivative of this tangent direction are estimated. This refined method of estimation enables us to unearth the minor changes that have occurred in the image when a message is embedded. The efficiency of the proposed framework is demonstrated on three stenographic algorithms designed to hide messages in images: S-UNIWARD, WOW, and Synch-HILL. Each algorithm is tested using different payload sizes. The proposed approach is compared to three color image steganalysis methods based on computation features and Ensemble Classifier classification: the Spatial Color Rich Model, the CFA-aware Rich Model and the RGB Geometric Color Rich Model.

References

[1]
H. Abdulrahman, M. Chaumont, P. Montesinos, and B. Magnier. Color image steganalysis using correlations between rgb channels. In Proc. 10th Int. Conf. on Availability, Reliability and Security (ARES), 4th Int. Workshop on Cyber Crime (IWCC), Toulouse, France, pages 448--454. IEEE, Aug. 24-28, 2015.
[2]
H. Abdulrahman, M. Chaumont, P. Montesinos, and B. Magnier. Color images steganalysis using rgb channelgeometric transformation measures.Wiley J. on Security and Communication Networks, ( pages, Feb. 2016.
[3]
P. Bas, T. Filler, and T. Pevny. "Break our steganographic system": The ins and outs of organizing boss. Inf. Hiding, 13th Int. Workshop, Lecture Notes in Computer Science, Prague, Czech, pages 59--70, May 2011.
[4]
T. Denemark and J. Fridrich. Improving steganographic security by synchronizing the selection channel. In Proc. of the 3rd ACM Workshop on Inf. Hiding and Multimedia Security (IH&MMSec), Portland, Oregon, pages 5--14, June 2015.
[5]
W. T. Freeman and E. H. Adelson. The design and use of steerable filters. IEEE Trans. on Pattern Analysis & Machine Intelligence, Vol.13(9):pp.891--906, 1991.
[6]
J. Fridrich and J. Kodovskỳ. Rich models for steganalysis of digital images. IEEE Trans. on Inf. Forensics and Security, vol.7(no.3):pp.868--882, Jun. 2012.
[7]
J. Fridrich and M. Long. Steganalysis of lsb encoding in color images. In IEEE Int. Conf. on Multimedia and Expo (ICME) 2000, New York, NY, USA, volume Vol.3, pages 1279--1282, July 2000.
[8]
T. Gloe and R. Böhme. "The dresden image database" for benchmarking digital image forensics. In Proc. ACM Symp. on Applied Computing, Sierre, Switzerland, Vol.2:pp.1584--1590, Mar. 2010.
[9]
M. Goljan and J. Fridrich. CFA-aware features for steganalysis of color images. In Proc. IS&T/SPIE Electronic Imaging, Int. Society for Optics and Photonics (SPIE), San Francisco, CA, USA, volume 94090V, page (13), Feb. 2015.
[10]
M. Goljan, J. Fridrich, and R. Cogranne. Rich model for steganalysis of color images. In Proc. IEEE Int. Workshop on Inf. Forensics Security, Atlanta, GA, USA, pages 185--190, Dec. 2014.
[11]
J. J. Harmsen and W. A. Pearlman. Steganalysis of additive-noise modelable information hiding. In Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, CA, USA, pages 131--142, Jan. 2003.
[12]
V. Holub and J. Fridrich. Designing steganographic distortion using directional filters. In Proc. IEEE Int. Workshop on Inf. Forensics and Security (WIFS), Tenerife, Spain, pages 234--239, Dec. 2012.
[13]
V. Holub, J. Fridrich, and T. Denemark. Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Inf. Security, Vol.2014(no.1):pp.1--13, 2014.
[14]
A. D. Ker, P. Bas, R. Böhme, R. Cogranne, S. Craver, T. Filler, J. Fridrich, and T. Pevny. Moving steganography and steganalysis from the laboratory into the real world. In Proc. 1st ACM workshop on Inf. hiding and multimedia security (IH&MMSec), Montpellier, France, pages 45--58, June 17-19, 2013.
[15]
M. Kirchner and R. Bohme. "Steganalysis in technicolor" boosting ws detection of stego images from CFA-interpolated covers. In Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy, pages 3982--3986, May 2014.
[16]
J. Kodovskỳ, J. Fridrich, and V. Holub. Ensemble classifiers for steganalysis of digital media. IEEE Trans. on Inf. Forensics and Security, Vol.7(no.2):432--444, Apr. 2012.
[17]
B. Li, J. He, J. Huang, and Y. Q. Shi. A survey on image steganography and steganalysis. J. of Inf. Hiding and Multimedia Signal Process., Vol.2:pp.142--172, Apr. 2011.
[18]
B. Li, M. Wang, J. Huang, and X. Li. A new cost function for spatial image steganography. In Proc. IEEE, Int. Conf. Image Processing (ICIP), Paris, France, pages 4206--4210, Oct. 2014.
[19]
Q. Liu, A. H. Sung, B. Ribeiro, M. Wei, Z. Chen, and J. Xu. Image complexity and feature mining for steganalysis of least significant bit matching steganography. J. of Information Sciences, Vol.178(1):21--36, Jan. 2008.
[20]
Y. Miche, P. Bas, A. Lendasse, C. Jutten, and O. Simula. Reliable steganalysis using a minimum set of samples and features. EURASIP J. on Inf. Security, vol.2009, article ID 901381:(13), 2009.
[21]
T. Pevny, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. on Inf. Forensics and Security ( TIFS), Vol.5(no.2):215--224, June 2010.
[22]
T. Pevny, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In Proc. 12th Int. Workshop Inf. hiding, Calgary, AB, Canada, vol.6387:161--177, Jun. 2010.
[23]
W. Tang, B. Li, W. Luo, and J. Huang. Clustering steganographic modification directions for color components. Signal Processing Letters,IEEE, Vol.23(No.2):197--201, Feb. 2016.
[24]
P. Thiyagarajan, G. Aghila, and V. P. Venkatesan. Steganalysis using color model conversion. Int. J. of Signal and Image Processing (SIPIJ), Vol.2(No.4), Dec. 2011.
[25]
A. Westfeld and A. Pfitzmann. Attacks on steganographic systems. In Proc. on Information Hiding, In: Pfitzmann A. (eds.): 3rd Int. Workshop Lecture Notes in Computer Science, Springer-Verlag, Berlin Heidelberg, volume 1768, pages 61--76, 2000.

Cited By

View all
  • (2024)From Cover to Immucover: Adversarial Steganography via Immunized Cover ConstructionIEEE Transactions on Fuzzy Systems10.1109/TFUZZ.2023.332174032:3(1233-1247)Online publication date: 1-Mar-2024
  • (2023)Color image steganalysis based on quaternion discrete cosine transformElectronic Research Archive10.3934/era.202320931:7(4102-4118)Online publication date: 2023
  • (2023)Detecting Images in Two-Operator Series Manipulation: A Novel Approach Using Transposed Convolution and Information FusionSymmetry10.3390/sym1510189815:10(1898)Online publication date: 10-Oct-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
IH&MMSec '16: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security
June 2016
200 pages
ISBN:9781450342902
DOI:10.1145/2909827
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 June 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. steerable gaussian filters
  2. steganalysis
  3. steganography

Qualifiers

  • Short-paper

Conference

IH&MMSec '16
Sponsor:

Acceptance Rates

IH&MMSec '16 Paper Acceptance Rate 21 of 61 submissions, 34%;
Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)2
Reflects downloads up to 10 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)From Cover to Immucover: Adversarial Steganography via Immunized Cover ConstructionIEEE Transactions on Fuzzy Systems10.1109/TFUZZ.2023.332174032:3(1233-1247)Online publication date: 1-Mar-2024
  • (2023)Color image steganalysis based on quaternion discrete cosine transformElectronic Research Archive10.3934/era.202320931:7(4102-4118)Online publication date: 2023
  • (2023)Detecting Images in Two-Operator Series Manipulation: A Novel Approach Using Transposed Convolution and Information FusionSymmetry10.3390/sym1510189815:10(1898)Online publication date: 10-Oct-2023
  • (2023)Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)Signal Processing10.1016/j.sigpro.2022.108908206:COnline publication date: 1-May-2023
  • (2023)Image operator forensics and sequence estimation using robust deep neural networkMultimedia Tools and Applications10.1007/s11042-023-17389-083:16(47431-47454)Online publication date: 27-Oct-2023
  • (2022)Image Forensics Using Non-Reducing Convolutional Neural Network for Consecutive Dual OperatorsApplied Sciences10.3390/app1214715212:14(7152)Online publication date: 15-Jul-2022
  • (2022)Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image SteganographyIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2022.314840632:8(5110-5123)Online publication date: Aug-2022
  • (2022)HLTD-CSAJournal of Visual Communication and Image Representation10.1016/j.jvcir.2022.10364689:COnline publication date: 1-Nov-2022
  • (2022)Feature selection method for color image steganalysis based on fuzzy neighborhood conditional entropyApplied Intelligence10.1007/s10489-021-02923-052:8(9388-9405)Online publication date: 5-Jan-2022
  • (2022)Novel color image steganalysis method based on RGB channel empirical modes to expose stego images with diverse payloadsPattern Analysis and Applications10.1007/s10044-022-01102-226:1(239-253)Online publication date: 9-Sep-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media