ABSTRACT
The GFR (Gabor Filter Residual) features, built as histograms of quantized residuals obtained with 2D Gabor filters, can achieve competitive detection performance against adaptive JPEG steganography. In this paper, an improved version of the GFR is proposed. First, a novel histogram merging method is proposed according to the symmetries between different Gabor filters, thus making the features more compact and robust. Second, a new weighted histogram method is proposed by considering the position of the residual value in a quantization interval, making the features more sensitive to the slight changes in residual values. The experiments are given to demonstrate the effectiveness of our proposed methods.
- T. Denemark, M. Boroumand, and J. Fridrich. 2016. Steganal- ysis features for content-adaptive JPEG steganography. IEEE Transactions on Information Forensics and Security 11, 8 (Au- gust 2016), 1736--1746.Google ScholarCross Ref
- T. Filler, J. Judas, and J. Fridrich. 2011. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security 6, 3 (Sep- tember 2011), 920--935. Google ScholarDigital Library
- L. Guo, J. Ni, and Y. Q. Shi. 2014. Uniform embedding for efficient JPEG steganography. IEEE Transactions on Information Forensics and Security 9, 5 (May 2014), 814--825. Google ScholarDigital Library
- V. Holub and J. Fridrich. 2013. Random projections of residuals for digital image steganalysis. IEEE Transactions on Information Forensics and Security 8, 12 (December 2013), 1996--2006. Google ScholarDigital Library
- V. Holub and J. Fridrich. 2014. Challenging the doctrines of JPEG steganography. Proc. SPIE 9028 (2014), 902802-902802-8.Google Scholar
- V. Holub and J. Fridrich. 2015. Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Transactions on Information Forensics and Security 10, 2 (February 2015), 219--228.Google ScholarDigital Library
- V. Holub and J. Fridrich. 2015. Phase-aware projection model for steganalysis of JPEG images. Proc. SPIE 9409 (2015), 94090T-94090T-11.Google Scholar
- V. Holub, J. Fridrich, and T. Denemark. 2014. Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security 2014, 1 (2014), 1-- 13.Google ScholarCross Ref
- A. D. Ker. 2014. Implementing the projected spatial rich features on a GPU. Proc. SPIE 9028 (2014), 90280K-90280K-10.Google Scholar
- J. Kodovsky and J. Fridrich. 2012. Steganalysis of JPEG images using rich models. Proc. SPIE 8303 (2012), 83030A-83030A-13.Google Scholar
- J. Kodovsky, J. Fridrich, and V. Holub. 2012. Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7, 2 (April 2012), 432--444. Google ScholarDigital Library
- H. B. Mitchell and P. A. Schaefer. 2001. A soft K-nearest neighbor voting scheme. International Journal of Intelligent Systems 16, 4 (2001), 459--468.Google ScholarCross Ref
- W. M. Pang, K. S. Choi, and J. Qin. 2016. Fast Gabor texture feature extraction with separable filters using GPU. Journal of Real-Time Image Processing 12, 1 (June 2016), 5--13. Google ScholarDigital Library
- T. Pevny and J. Fridrich. 2007. Merging Markov and DCT features for multi-class JPEG steganalysis. Proc. SPIE 6505 (2007), 650503--650503--13.Google Scholar
- X. Song, F. Liu, C. Yang, X. Luo, and Y. Zhang. 2015. Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'15). ACM, New York, NY, USA, 15--23. Google ScholarDigital Library
- C. Xia, Q. Guan, X. Zhao, and C. Zhao. 2016. Highly accurate real-time image steganalysis based on GPU. Journal of Real-Time Image Processing (2016), 1--14.Google Scholar
Index Terms
- Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms
Recommendations
Steganalysis of DCT-embedding based adaptive steganography and YASS
MM&Sec '11: Proceedings of the thirteenth ACM multimedia workshop on Multimedia and securityRecently well-designed adaptive steganographic systems, including ±1 embedding in the DCT domain with optimized costs to achieve the minimal-distortion [8], have posed serious challenges to steganalyzers. Additionally, although the steganalysis of Yet ...
Steganalysis of YASS
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and securityIn this paper, we describe a method for attacking Yet Another Steganographic Scheme (YASS), which is designed to be a very secure JPEG steganographic algorithm. The success of YASS is attributed to its innovation in embedding, i.e., hiding data in ...
Steganalysis of YASS
A promising steganographic method--Yet Another Steganography Scheme (YASS)--was designed to resist blind steganalysis via embedding data in randomized locations. In addition to a concrete realization which is named the YASS algorithm in this paper, a ...
Comments