Reliable Detection of Histogram Shift-Based Steganography Using Payload Invariant Features

Article Preview

Abstract:

Reversible data hiding techniques can completely recover the cover images after extracting the secret message from the stego images and become a hot research topic recently. The histogram shift-based steganography, which is a kind of reversible data hiding technique, has good performance on imperceptibility. However, it also produces obvious features in the histograms of stego images. In this paper, we propose a steganalysis method based on the payload invariant features to detect the histogram shift-based steganography proposed by Ni et al. In the proposed steganalysis method, the minimum of the sum of the proposed features is first obtained, which is then compared with a predefined threshold to determine an image is a stego or a cover one. Experimental results show that the proposed steganalysis method can provide very high detection accuracy (about 98%) in various payload cases. Compared with the other steganalysis method, the proposed method can provide better detection performance under different embedding ratios and, therefore, is more reliable for detection of the histogram sift-based steganography.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3517-3521

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] V. Sabeti, S. Samavi, M. Mahdavi and S. Shirani, Steganalysis and payload estimation of embedding in pixel differences using neural networks, Pattern Recognit. 43 (2010) 405-415.

DOI: 10.1016/j.patcog.2009.06.006

Google Scholar

[2] N. Zaker and A. Hamzeh, A novel steganalysis for TPVD steganographic method based on differences of pixel difference histogram, Multimed. Tools and Applic. 58 (2012) 147-166.

DOI: 10.1007/s11042-010-0714-9

Google Scholar

[3] S. Lyu and H. Farid, Steganalysis using higher-order image statistics, IEEE Trans. on Inf. Forensics and Secur. 1 (2006) 111-119.

DOI: 10.1109/tifs.2005.863485

Google Scholar

[4] T. Pevny, P. Bas and J. Fridrich, Steganalysis by subtractive pixel adjacency matrix, IEEE Trans. on Inf. Forensics and Secur. 5 (2010) 215-224.

DOI: 10.1109/tifs.2010.2045842

Google Scholar

[5] Z. Ni, Y.Q. Shi, N. Ansari and W. Su, Reversible data hiding, IEEE Trans. on Circuits and Syst. for Video Technol. 16 (2006) 354-362.

DOI: 10.1109/tcsvt.2006.869964

Google Scholar

[6] W.C. Kuo, Y.H. Lin, Y.Z. Huang and Y.C. Lee, On the security of histogram-based reversible data hiding, The 7th Conference on Information Technology and Applications in Outlying Islands, 2008, pp.205-208.

Google Scholar

[7] C.L. Liu and H.H. Liu, Performance analysis of histogram shift-based steganalysis, The 23rd IPPR Conference on Computer Vision, Graphics and Image Processing, 2010, pp.1176-1180.

Google Scholar

[8] G. Schaefer and M. Stich, UCID - An uncompressed colour image database, SPIE Storage and Retrieval Methods and Applications for Multimedia, 2004, pp.472-480.

DOI: 10.1117/12.525375

Google Scholar