JPEG Steganalysis Based on Feature Fusion by Principal Component Analysis

Article Preview

Abstract:

Aiming to the problems in the existing JPEG steganalysis schemes, such as high redundancy in features and failure to make good use of the complementarities among them, this study proposed a JPEG steganalysis approach based on feature fusion by the principal component analysis (PCA) and analysis of the complementarities among features. The study fused complementary features and isolated redundant components by PCA, and finally used RBaggSVM classifier for classification. Experimental results show that this scheme effectively improves the detection rate of steganalysis in JPEG images and achieves faster speed of image classification.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2933-2938

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Pevny T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis. Security, Steganography, and Watermarking of Multimedia Contents IX, Proc of the SPIE Electronic Imaging, Photonics West, San Jose, CA, United states, 2007,Vol.6505:28-40

DOI: 10.1117/12.696774

Google Scholar

[2] Lie W N, Lin G S.A feature-based classification technique for blind image steganalysis[J].IEEE Transactions on Multimedia,2005,7(6):1007-1020.

DOI: 10.1109/tmm.2005.858377

Google Scholar

[3] Lin G S, Yeh C H, Kuo C J. Data hiding domain classification for blind image steganalysis[C]// Lee D T.Proceedings of 2004 IEEE International Conference on Multimedia and Expo. 2004,1(3):907-910.

DOI: 10.1109/icme.2004.1394348

Google Scholar

[4] Chiew K L, Pieprzyk J. Binary image steganographic classification based on multi- class Steganalysis[C]// Kwak J. Proceedings of 2010 Information Security, Practice and Experience, LNCS 6047. Berlin: Springer-Verlag,2010:341-358.

DOI: 10.1007/978-3-642-12827-1_25

Google Scholar

[5] Quansen Sun,Shenggen Zeng, Maolon Yang. Journal of computer research and development,2005,42(4): 614-621.In Chinese.

Google Scholar

[6] Turk M, Pent L A. Eigenfaces for Recognition[J]. Journal of Cognitive Neuro Science, 1991, 3(1): 71-86.

Google Scholar

[7] Shi YQ, Chen CH, Chen W. A Markov process based approach to effective attacking JPEG steganography. In: Camenisch J, et al., eds. Proc. of the 8th Int'l Workshop on Information Hiding (IH 2006).LNCS 6387, Berlin: Springer-Verlag, 2007. 249−264.

DOI: 10.1007/978-3-540-74124-4_17

Google Scholar

[8] Kodovský J, Fridrich J. Calibration revisited. In: Felten E, et al., eds. Proc. of the 11th ACM Workshop on Multimedia and Security (MM&Sec 2009). New York: ACM Press, 2009. 63−73.

DOI: 10.1145/1597817.1597830

Google Scholar

[9] Wei Huang,Xianfeng Zhao,Dengguo Feng. Journal of software, 2012,23(7):1869−1879.In Chinese.

Google Scholar

[10] Lingming He. Integration of SVM and applications in remote sensing classification [D]. Hang Zhou: Zhejiang University, 2006.In Chinese.

Google Scholar

[11] Bing luo, Wei Gu, Wangli Lv.Computer Engineering, 2010, 36(2): 167-169.In Chinese.

Google Scholar

[12] The USC-SIPI Image Database.http://sipi.usc.edu/database/database.php

Google Scholar

[13] YFreund R.E.schapire.experiments with a New Boosting algorithrn. In Proeeedings of the 13th Iniemational Conference on Machine Leaming ,1996:148-156.

Google Scholar