Targeted Steganalysis of Edge Adaptive Image Steganography Based on LSB Matching Revisited Using B-Spline Fitting

被引:30
作者
Tan, Shunquan [1 ]
Li, Bin [2 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Guangdong, Peoples R China
[2] Shenzhen Univ, Coll Informat Engn, Shenzhen 518060, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
B-spline fitting; edge adaptive image steganography; LSB matching; steganalysis;
D O I
10.1109/LSP.2012.2194702
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this letter, the authors point out that the readjusting phase of edge adaptive image steganography based on LSB matching revisited introduces a pulse distortion to the long exponential tail of the histogram of the absolute difference of the pixel pairs. Making use of this observation, a targeted steganalytic method based on B-Spline fitting is proposed. Experimental results show that the proposed method obtains excellent results for detecting stego images with low embedding rate. The dominant performance of our method compared with state-of-the-art blind steganalyzers, such as SPAM and SRM is apparent. Furthermore, our method can accurately estimate the threshold used in the secret data embedding procedure and can separate the stego images with unit block size from those with block sizes greater than one.
引用
收藏
页码:336 / 339
页数:4
相关论文
共 11 条
[1]  
Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
[2]  
Cox IJ, 2008, MKS MULTIMED INFORM, P1
[3]  
Fridrich J., 2012, IEEE T INF IN PRESS
[4]   Ensemble Classifiers for Steganalysis of Digital Media [J].
Kodovsky, Jan ;
Fridrich, Jessica ;
Holub, Vojtech .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) :432-444
[5]   Edge Adaptive Image Steganography Based on LSB Matching Revisited [J].
Luo, Weiqi ;
Huang, Fangjun ;
Huang, Jiwu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) :201-214
[6]   LSB matching revisited [J].
Mielikainen, J .
IEEE SIGNAL PROCESSING LETTERS, 2006, 13 (05) :285-287
[7]  
Pevny T, 2010, LECT NOTES COMPUT SC, V6387, P161, DOI 10.1007/978-3-642-16435-4_13
[8]  
Pevny T, 2009, MM&SEC'09: PROCEEDINGS OF THE 2009 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, P75
[9]   THE STATISTICS OF NATURAL IMAGES [J].
RUDERMAN, DL .
NETWORK-COMPUTATION IN NEURAL SYSTEMS, 1994, 5 (04) :517-548
[10]  
Tan S., 2011, P INT WORKSH DIG FOR