Stego anomaly detection in images exploiting the curvelet higher order statistics using evolutionary support vector machine

被引:7
作者
Muthuramalingam, S. [1 ]
Karthikeyan, N. [2 ]
Geetha, S. [3 ]
Sindhu, Siva S. Sivatha [4 ]
机构
[1] Thiagarajar Coll Engn, Dept Informat Technol, Madurai, Tamil Nadu, India
[2] Syed Ammal Engn Coll, Dept Comp Sci & Engn, Ramanathapuram, Tamil Nadu, India
[3] VIT Univ, Sch Comp Sci & Engn, Chennai Campus, Madras, Tamil Nadu, India
[4] Shan Syst LLC, Jersey City, NJ USA
关键词
Blind image steganalysis; Curvelet transformation; Evolutionary SVM model; Higher order statistics; DIGITAL IMAGES; STEGANALYSIS; WATERMARKING;
D O I
10.1007/s11042-015-2984-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steganalysis is an important extension to existing security infrastructure, and is gaining more research focus of forensic investigators and information security researchers. This paper reports the design principles and evaluation results of a new experimental blind image steganalysing system. This work approaches the steganalysis task as a pattern classification problem. The detection accuracy of the steganalyser depends on the selection of low-dimensional informative features. We investigate this problem as a three step process and propose a novel steganalyser with the following implications: a) Selection of the Curvelet sub-band image representation that offers better discrimination ability for detecting stego anomalies in images, than other conventional wavelet transforms. b) Exploiting the empirical moments of the transformation as effective steganalytic features c) Realizing the system using an efficient classifier, evolutionary-Support Vector Machine (SVM) model that provides promising classification rate. An extensive empirical evaluation on a database containing 5600 clean and stego images shows that the proposed scheme is a state-of-the-art steganalyser that outperforms other previous steganalytic methods.
引用
收藏
页码:13627 / 13661
页数:35
相关论文
共 58 条
[1]  
[Anonymous], JSTEG SHELL 2 0
[2]  
[Anonymous], J EURASIP APPL SIGNA
[3]  
[Anonymous], THESIS
[4]  
[Anonymous], 9 INT WORKSH INF HID
[5]  
[Anonymous], P ACIS INT C SOFTW E
[6]  
[Anonymous], 2011, ACM T INTEL SYST TEC
[7]  
[Anonymous], THESIS
[8]  
[Anonymous], LECT COMPUTER SCI
[9]  
[Anonymous], P IEEE INT C WAV AN
[10]  
[Anonymous], P WORLD C INT CONTR