[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Study on the interaction between the cover source mismatch and texture complexity in steganalysis

Published: 01 March 2019 Publication History

Abstract

Cover source mismatch (CSM) occurs when a detection classifier for steganalysis trained on objects from one cover source is tested on another source. However, it is very hard to find the same sources as suspicious images in real-world applications. Therefore, the CSM is one of the biggest stumbling blocks to hinder current classifier based steganalysis methods from becoming practical. Meanwhile, the texture complexity (of digital images) also plays an important role in affecting the detection accuracy of steganalysis. Previous work seldom conduct research on the interaction between the two factors of the CSM and the texture complexity (TC). This paper studies the interaction between the two factors and explore certain factor related to cover source mismatch, aiming to improve the steganalysis accuracy in the case of CSM. We propose an effective method to measure the TC via image filtering, and use the two-way analysis of variance to study the interaction between the two factors. Both non-adaptive and adaptive steganography experiments are carried out with different levels of TC and CSM. The experimental results have shown that the interaction between the two factors affects the detection accuracy significantly.

References

[1]
Bas P, Filler T, Pevny? T (2011) Break our steganographic system: the ins and outs of organizing boss. In: Information hiding. Springer, pp 59---70
[2]
Cancelli G, Doërr G, Barni M, Cox IJ (2008) A comparative study of±steganalyzers. In: 2008 IEEE 10th Workshop on multimedia signal processing. IEEE, pp 791---796
[3]
Cui J, Ye L, Xu Y, Zhao H, Zha H (2013) Tracking generic human motion via fusion of low- and high-dimensional approaches. IEEE Trans Syst Man Cybern Part B 43(4):996---1002
[4]
Farhat F, Ghaemmaghami S (2014) Towards blind detection of low-rate spatial embedding in image steganalysis. IET Image Process 9(1):31---42
[5]
Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forens Secur 7(3):868---882
[6]
Goljan M, Fridrich J, Holotyak T (2006) New blind steganalysis and its implications. InL Electronic imaging 2006. International Society for Optics and Photonics, pp 607201---607201
[7]
Hou X, Zhang T, Ji L, Wu Y (2017) Combating highly imbalanced steganalysis with small training samples using feature selection. J Vis Commun Image Represent 49:243---256
[8]
Hu D, Ma Z, Fan Y, Wang L (2016) A study of the two-way effects of cover source mismatch and texture complexity in steganalysis. In: International Workshop on digital watermarking. Springer, pp 601---615
[9]
Huang F, Zhong Y, Huang J (2013) Improved algorithm of edge adaptive image steganography based on lsb matching revisited algorithm. In: Digital-Forensics and watermarking. Springer, pp 19---31
[10]
Iversen GR, Gergen M (2012) Statistics: the conceptual approach. Springer Science & Business Media
[11]
Ker AD, Pevny? T (2014) A mishmash of methods for mitigating the model mismatch mess. In: IS&T/SPIE Electronic imaging. International Society for Optics and Photonics, pp 90280I---90280I
[12]
Ker AD, Bas P, Böhme R, Cogranne R, Craver S, Filler T, Fridrich J, Pevny? T (2013) Moving steganography and steganalysis from the laboratory into the real world. In: Proceedings of the first ACM workshop on information hiding and multimedia security. ACM, pp 45---58
[13]
Kodovsky? J, Sedighi V, Fridrich J (2014) Study of cover source mismatch in steganalysis and ways to mitigate its impact. In: IS&T/SPIE Electronic imaging. International Society for Optics and Photonics, pp 90280J---90280J
[14]
Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2015) Action2activity: recognizing complex activities from sensor data. In: International conference on artificial intelligence, pp 1617---1623
[15]
Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108---115
[16]
Lubenko I, Ker AD (2012) Going from small to large data in steganalysis. Proc Spie 8303:16
[17]
Luo X, Song X, Li X, Zhang W, Lu J, Yang C, Liu F (2016) Steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75(21):13557---13583
[18]
Ng WWY, He ZM, Yeung DS, Chan PPK (2014) Steganalysis classifier training via minimizing sensitivity for different imaging sources. Inform Sci 281:211---224
[19]
Ojala T, Pietikainen M, Harwood D (1996) A comparative study of texture measures with classification based on featured distributions. Pattern Recogn 29(1):51---59
[20]
Pasquet J, Bringay S, Chaumont M (2014) Steganalysis with cover-source mismatch and a small learning database. In: Eusipco 2014, European signal processing Conference, pp 2425---2429
[21]
Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062---1078
[22]
Petrou M, Sevilla PG (2006) Image processing: dealing with texture DBLP
[23]
Pevny? T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forens Secur 5(2):215---224
[24]
Pevny? T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: International Workshop on information hiding. Springer, pp 161---177
[25]
Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. In: IS&T/SPIE Electronic imaging. International Society for Optics and Photonics, pp 94090J---94090J
[26]
Rice J (2006) Mathematical statistics and data analysis. Nelson Education
[27]
Sharp T (2001) An implementation of key-based digital signal steganography. In: Information hiding. Springer, pp 13---26
[28]
Shi YQ, Sutthiwan P, Chen L (2012) Textural features for steganalysis. In: International Workshop on information hiding. Springer, pp 63---77
[29]
Walpole RE, Myers R, Myers SL, Keying EY (2012) Essentials of probabilty & statistics for engineers & scientists. Pearson Higher Ed
[30]
Wang C, Yang H, Meinel C (Nov 2015) Deep semantic mapping for cross-modal retrieval. In: 2015 IEEE 27th International conference on tools with artificial intelligence (ICTAI), pp 234---241
[31]
Wang C, Yang H, Bartz C, Meinel C (2016) Image captioning with deep bidirectional lstms. In: Proceedings of the 2016 ACM on multimedia conference, MM '16. ACM, New York, pp 988---997
[32]
Wang C, Yang H, Meinel C (2016) A deep semantic framework for multimodal representation learning. Multimed Tools Appl 75(15):9255---9276
[33]
Wang C, Yang H, Meinel C (2018) Image captioning with deep bidirectional lstms and multi-task learning. ACM Trans Multimed Comput Commun Appl 14(2s):40,1---40,20
[34]
Xiong G, Ping X, Zhang T, Hou X (2012) Image textural features for steganalysis of spatial domain steganography. J Electron Imag 21(3):3015

Cited By

View all
  • (2024)Linking Intrinsic Difficulty and Regret to Properties of Multivariate Gaussians in Image SteganalysisProceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security10.1145/3658664.3659643(31-39)Online publication date: 24-Jun-2024
  • (2022)Dataset mismatched steganalysis using subdomain adaptation with guiding featureTelecommunications Systems10.1007/s11235-022-00901-680:2(263-276)Online publication date: 1-Jun-2022
  • (2019)A review of forensic approaches to digital image SteganalysisMultimedia Tools and Applications10.1007/s11042-019-7217-078:13(18169-18204)Online publication date: 1-Jul-2019

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Multimedia Tools and Applications
Multimedia Tools and Applications  Volume 78, Issue 6
March 2019
1453 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 March 2019

Author Tags

  1. Analysis of variance
  2. Cover source mismatch
  3. Steganalysis
  4. Texture complexity

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Linking Intrinsic Difficulty and Regret to Properties of Multivariate Gaussians in Image SteganalysisProceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security10.1145/3658664.3659643(31-39)Online publication date: 24-Jun-2024
  • (2022)Dataset mismatched steganalysis using subdomain adaptation with guiding featureTelecommunications Systems10.1007/s11235-022-00901-680:2(263-276)Online publication date: 1-Jun-2022
  • (2019)A review of forensic approaches to digital image SteganalysisMultimedia Tools and Applications10.1007/s11042-019-7217-078:13(18169-18204)Online publication date: 1-Jul-2019

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media