Analysis of alteration the chi-squared divergence for pixels brightness distributions by cover and stego images filtering
DOI:
https://doi.org/10.20535/RADAP.2018.75.54-60Keywords:
digital image, steganalysis, chi-squared divergenceAbstract
Information protection of government agencies, organizations as well as private corporations is topical task today. Great attention is given to prevention of confidential information leakage by data transmission in global and local communication systems. Revealing and destruction of covert channels require investigation of information flows in communication systems with usage of steganalysis methods. Providing a high detection accuracy (more than 95 %) of formed stego files requires a priory information about features of steganographic methods, used for message embedding into cover files, such as digital images. It leads to significantly decrease the performance of widespread steganalysis in case of stego image formation according to unknown embedding methods. Therefore, it is required a development of universal (blind) stegdetectors, that allow reliable revealing stego images even in case of limited a priory information about used steganographic algorithm. One of the toughest challenges for known universal stegdetectors is revealing of stego images, formed according to advanced adaptive embedding methods. Feature of these methods is minimization of cover image parameters distortions by message hiding. The work is devoted to investigation the effectiveness of preliminary processing (filtering) of cover as well as stego images for improving the accuracy of blind stegdetectors. The case of usage the median and wiener filters for cover/stego image processing is analyzed. Based on the results of research it is revealed that preliminary processing of analyzed images with median and wiener filters gives opportunity to detect weak alterations of cover image’s pixels brightness distributions, caused by stego data embedding according to HUGO and WOW adaptive methods. It is shown that analysis of χ2-divergences between distributions for initial and processed cover as well as stego images allows increasing detection accuracy of universal stegdetectors. Obtained results allow improve stegdetector’s performance even in case of low payload a cover image (less than 10 %), when standard detection methods are inefficient.
References
Перелік посилань
Fridrich J. Steganography in Digital Media: Principles, Algorithms, and Applications / J. Fridrich. - Cambridge University Press, 2009. - 437 p.
Kodovsky J. Steganalysis of JPEG Images Using Rich Models / J. Kodovsky, J. Fridrich // XIV Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics. - 2012.
Chen M. et al. JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images / M. Chen, V. Sedighi, M. Boroumand, J. Fridrich // 5th ACM Workshop on Information Hiding and Multimedia Security. - 2017. - pp. 75-84.
Progonov D. Information-Theoretic Estimations of Cover Distortion by Adaptive Message Embedding / D. Progonov // Int. J. "Information Theories and Applications". - 2018. - Vol. 25, Iss. 1. - pp. 47-62.
Filler T. Gibbs Construction in Steganography / T. Filler, J. Fridrich // IEEE Trans. Inf. Forensics Security. - 2010. - Vol. 5, Iss. 4. - pp. 705-720.
Holub V. Designing Steganographic Distortion Using Directional Filters / V. Holub, J. Fridrich // Proc. of IEEE Workshop on Information Forensic and Security. - 2012.
Nielsen F. On the Chi square and higher-order Chi distances for approximating f-divergences / F. Nielsen, R. Nock // Cornell University Library. Electronic Archive. - 2013.
Huiskes M.J. The MIR Flickr Retrieval Evaluation / M.J. Huiskes, M.S. Lew // Proc. of ACM Int. Conf. on Multimedia Information Retrieval. - 2008.
Avcibas I. et al. Steganalysis using image quality metrics / I. Avcibas, N. Memon, B. Sankur // IEEE Trans. Image Process. - 2003. - Vol. 12, Iss. 2. - pp. 221-229.
Гонсалес Р. Цифровая обработка изображений / Р. Гонсалес, Р. Вудс - М. : Техносфера. - 2012. - 1104 с.
References
Fridrich J. (2009) Steganography in Digital Media. DOI: 10.1017/cbo9781139192903
Kodovský J. and Fridrich J. (2012) Steganalysis of JPEG images using rich models. Media Watermarking, Security, and Forensics 2012. DOI: 10.1117/12.907495
Chen M., Sedighi V., Boroumand M. and Fridrich J. (2017) JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images. Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security - IHMMSec '17. DOI: 10.1145/3082031.3083248
Progonov D. (2018) Information-Theoretic Estimations of Cover Distortion by Adaptive Message Embedding. Information Theories and Applications, Vol. 25, No 1, pp. 47-62.
Filler T. and Fridrich J. (2010) Gibbs Construction in Steganography. IEEE Transactions on Information Forensics and Security, Vol. 5, Iss. 4, pp. 705-720. DOI: 10.1109/tifs.2010.2077629
Holub V. and Fridrich J. (2012) Designing steganographic distortion using directional filters. 2012 IEEE International Workshop on Information Forensics and Security (WIFS). DOI: 10.1109/wifs.2012.6412655
Nielsen F. and Nock R. (2014) On the chi square and higher-order chi distances for approximating f-divergences. IEEE Signal Processing Letters, Vol. 21, Iss. 1, pp. 10-13. DOI: 10.1109/lsp.2013.2288355
Huiskes M.J. and Lew M.S. (2008) The MIR flickr retrieval evaluation. Proceeding of the 1st ACM international conference on Multimedia information retrieval - MIR '08. DOI: 10.1145/1460096.1460104
Avcibas I., Memon N. and Sankur B. (2003) Steganalysis using image quality metrics. IEEE Transactions on Image Processing, Vol. 12, Iss. 2, pp. 221-229. DOI: 10.1109/tip.2002.807363
Gonzalez R.C and Woods R. E. (2007) Digital Image Processing, Prentice Hall, 976 p.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).