Document Type : Research Article

Authors

Abstract

The aim of image steganalysis is to detect the presence of hidden messages in stego images. We propose a blind image steganalysis method in Contourlet domain and then show that the embedding process changes statistics of Contourlet coefficients. The suspicious image is transformed into Contourlet space, and then the statistics of Contourlet subbands coefficients are extracted as features. We use absolute Zernike moments and characteristic function moments of Contourlet subbands coefficients of the image to distinguish between the stego and non-stego images. Absolute Zernike moments are used to examine the randomness in the test image and characteristic function moments of Contourlet coefficients is used to form our feature set that can catch the changes made to the histogram of Contourlet coefficients. These features are fed to a nonlinear SVM classifier with an RBF kernel to distinguish between cover and stego images. We show that the embedding process distorts statistics of Contourlet coefficients, leading to detection of stego images. Experimental results confirm that the proposed features are highly sensitive to the change made by the embedding process. These results also reveal advantage of the proposed method over its counterpart steganalyzers, in cases of five popular JPEG steganography techniques.

Keywords

[1] S. Katzenbeisser and F. A. P. Petitcolas, "Defining Security in Steganographic Systems," in Proc. of the SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 50-56, 2002.
[2] M. Kharrazi, H. T. Sencar and N. Memon, "Image Steganography and Steganalysis: Concepts and Practice," Lecture Notes Series, Institute for Mathematical Sciences, National University of Singapore, 2004.
[3] N. Provos, "Defending against statistical steganalysis," in 10th USENIX Security Symposium, 2001.
[4] P. Sallee, "Model-based steganography," in Proc. of International Workshop on Digital Watermarking, Seoul, Korea, 2003.
[5] P. Sallee, "Model-based methods for steganography and steganalysis," International Journal of Images and Graphics, vol. 5, pp. 167-190, 2005.
[6] A. Westfeld, "F5: a steganographic algorithm: High capacity despite better steganalysis," presented at the 4th International Workshop on Information Hiding, 2001.
[7] J. Fridrich, M. Goljan and D. Soukal, "Perturbed quantization steganography with wet paper codes," in Proc. ACM Multimedia Security Workshop, pp. 4-15, 2004.
[8] J. Kodovsky, J. Fridrich and T. Pevny, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities," in Proc. Of the 9th ACM Multimedia Security Workshop, pp. 3-14, 2007.
[9] K. Solanki, A. Sarkar and B. S. Manjunath, "YASS: yet another steganographic scheme that resists blind steganalysis," in 9th International Workshop on Information Hiding, 2007.
[10] T. Pevny, T. Filler and P. Bas, "Using high dimensional image models to perform highly undetectable steganography," in 12th International Workshop on Information Hiding, 2010.
[11] A. Sarkar, K. Solanki and B. S. Manjunath, "Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis," in Proc. of SPIE Security, Steganography and Watermarking of Multimedia Contents, 2008.
[12] J. Fridrich, J. Kodovsky, V. Holub and M. Goljan, "Steganalysis of Content-Adaptive Steganography in Spatial Domain," in 13th International Conference on Information Hiding, Vol. 6958, pp. 102-117, 2011.
[13] I. Avcibas, N. Memon and B. Sankur, "Steganalysis of watermarking techniques using image quality metrics," in Proc. of the SPIE, Security and Watermarking of Multimedia Contents II, vol. 4314, pp. 523531, 2000.
[14] H. Farid, "Detecting steganographic messages in digital images," Technical Report TR2001-412, Dartmouth College, Hanover, NH, 2001.
[15] R. Machado, EZStego. [Online]. Available: http://www.ezstego.com.
[16] H. Farid, "Detecting hidden messages using higher-order statistical models," in: Proc. Of IEEE International Conference on Image processing, vol. 2, pp. 905908, 2002.
[17] H. Farid and S. Lyu, "Detecting hidden messages using higher-order statistics and support vector machines," in Proc. of fifth International Information Hiding Workshop, Lecture Notes in Computer Science, vol. 2578, Springer, Berlin, pp. 340354, 2002.
[18] S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Trans. Inf. Forensics Secur, vol.1, no.1, pp.111-119, 2006.
[19] J. Fridrich, "Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes," Information Hiding, vol. 3200, ed.: Springer Berlin / Heidelberg, pp. 67-81, 2005.
[20] Y. Shi, C. Chen and W. Chen, "A Markov process based approach to effective attacking JPEG steganography," in J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, editors, Information Hiding, 8th International Workshop, vol. 4437, pp. 249264, 2006.
[21] T. Pevny and J. Fridrich, "Merging Markov and DCT Features for Multi-Class JPEG Steganalysis," in SPIE, Electronic Imaging, Security, Steganography and Watermarking of Multimedia contents, vol. 6505, 2007.
[22] J. Kodovsky and J. Fridrich, "Calibration revisited," in Proc. of the 11th ACM workshop on Multimedia and security, pp. 6374, 2009.
[23] C. Chen and Y.Q. Shi, "JPEG image steganalysis utilizing both intra-block and interblock correlations," in Circuits and Systems, IEEE International Symposium on, pp. 30293032, 2008.
[24] J. Kodovsky, J. Fridrich and V. Holub, "Ensemble classifiers for steganalysis of digital media," Information Forensics and Security, IEEE Transactions on, vol. 7, pp. 432444, 2012.
[25] J. Harmsen and W. Pearlman, "Steganalysis of additive noise model able information hiding," in Proc. of Security Steganography and Watermarking of Multimedia Contents V, SPIE, vol. 5020, pp. 131-142, 2003.
[26] G. Xuan, Y. Shi and J. Gao, "Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions," in Proc. of 7th international Information Hiding Workshop, Lecture Notes in Computer Science. Berlin, Germany: Springer, vol. 3727, pp. 262- 277, 2005.
[27] Y. Shi, G. Xuan and J. Gao, "Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network," Multimedia and Expo, IEEE International Conference on, pp. 4-8, 2005.
[28] C. Chen, Y. Shi, W. Chen and G. Xuan, "Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function," Image Processing, IEEE International Conference on, pp. 105-108, 2006.
[29] G. Gul, A. Dirik and E. Avcibas, "Steganalytic Features for JPEG Compression-Based Perturbed Quantization," Signal Processing Letters, IEEE, vol. 14, pp. 205-208, 2007.
[30] G. Gul and F. Kurugollu, "SVD-Based Universal Spatial Domain Image Steganalysis," Information Forensics and Security, IEEE Transactions on, vol. 5, pp. 349-353, 2010.
[31] T. Pevny, P. Bas and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," Information Forensics and Security, IEEE Transactions on, vol. 5, pp. 215-224, 2010.
[32] M. A. L. Vijilious and V. S. Bharathi, "Texture Feature Extraction Approach to Palm print using No subsampled Contourlet Transform and Orthogonal Moments," in International Journal of Future Computer and Communication, vol. 1, no. 3, 2012.
[33] T. W. Lin and Y. F. Chou, "A Comparative Study of Zernike Moments for Image Retrieval," 16th IPPR Conference on Computer Vision, Graphics and Image Processing, 2003.
[34] G. Chen and Y. Xie, "Rotation invariant feature extraction by combining denoising with Zernike moments," Wavelet Analysis and Pattern Recognition (ICWAPR), pp. 186-189, 2010.
[35] C. H. Teh and R. T. Chin, "On image analysis by the methods of moments," Pattern Analysis and Machine Intelligence, vol. 10, no. 4, pp. 496-513, 1988.
[36] M. Abolghasemi, H. Aghaeinia and K. Faez, "Data Hiding Detection Based on DWT and Zernike Moments," in 4th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, 2007.
[37] H. Sajedi and M. Jamzad, "CBS: Contourlet-based steganalysis method," Journal of Signal Processing Systems, vol. 61, pp. 367-373, 2010.
[38] M. Sheikhan, M. Pezhmanpour and M. Moin, "Improved contourlet-based steganalysis using binary particle swarm optimization and radial basis neural networks," Neural Computing and Applications, vol. 21, pp. 1717-1728, 2012.
[39] M. N. Do and M. Vetterli, "The Contourlet transform: an efficient directional multi-resolution image representation," IEEE Trans. Image Processing, vol. 14, no. 12, pp. 2091-2106, 2005.
[40] D. D. Y. Po and M. N. Do, "Directional multi-scale modeling of images using the contourlet transform," IEEE Trans. Image Processing, vol. 15, no. 6, pp. 1610-1620, 2006.
[41] F. Zernike, Physica, vol. 1, p. 689, 1934.
[42] A. Khotanzad and Y. H. Hong, "Invariant Image Recognition by Zernike Moments," IEEE Trans. on Pattern Analysis and Machine Intelligence, pp. 489-497, 1990.
[43] Y. Wang and P. Moulin, "Optimized feature extraction for learning based image steganalysis," IEEE Trans. Inf. Forensics Secur, vol. 2, no. 1, pp. 31-45, 2007.
[44] L. Xiangyang, L. Fenlin and L. Shiguo, "On the Typical Statistic Features for Image Blind Steganalysis," Selected Areas in Communications, IEEE Journal on, vol. 29, pp. 1404-1422, 2011.
[45] H. Qu, Y. Peng and W. Sun, "Texture Image Retrieval Based on Contourlet Coefficient Modeling with Generalized Gaussian Distribution," ISICA 2007, Springer, Heidelberg, vol. 4683, pp. 493-502, 2007.
[46] M. Kharrazi, H. T. Sencar, and N. Memon, "Performance Study of Common Image Steganography and Steganalysis Technique," Journal of Electronic Imaging, 15(4):041104-1-041104-16, 2006.
[47] C.-C. Chang and C.-J. Lin, "LIBSVM: A Library for Support Vector Machines," [Online]. Available: http://www.csie.ntu.edu.tw/~cjlin/libsvm.
[48] CorelDraw Software, www.corel.com.