Steganalysis of content-adaptive binary image data hiding

被引:24
作者
Feng, Bingwen [1 ]
Weng, Jian [1 ]
Lu, Wei [2 ]
Pei, Bei [3 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Guangdong Key Lab Informat Secur Technol, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[3] Minist Publ Secur, Key Lab Informat Network Secur, Shanghai 200000, Peoples R China
关键词
Binary image; Content-adaptive data hiding; Steganography; Steganalysis; l-shape pattern; AUTHENTICATION;
D O I
10.1016/j.jvcir.2017.01.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most state-of-the-art binary image data hiding methods concentrate the embedding changes on the centers of l-shape patterns. This embedding criterion, however, introduces an unbalanced modification on boundary structures. This paper proposes a steganalytic scheme to detect recently developed content adaptive binary image data hiding by exploiting the embedding effect associated with the l-shape pattern-based embedding criterion. We first assess how changing l-shape patterns affects the distribution of a special 4 x 3 sized pattern. Based on the assessment, 4 classes of patterns that model the distribution of two pixels oriented the direction of pattern changing are employed to define a 32-dimensional steganalytic feature set. Experimental results show that, despite of the low dimensionality, the proposed steganalytic features can effectively detect state-of-the-art binary image data hiding schemes, especially those pattern-tracing-based approaches. (C) 2017 Published by Elsevier Inc.
引用
收藏
页码:119 / 127
页数:9
相关论文
共 33 条
[1]  
[Anonymous], ELECT IMAGING INT SO
[2]  
[Anonymous], DATA HIDING BINARY T
[3]  
[Anonymous], 2011, INT J COMPUT SCI ENG
[4]  
[Anonymous], 2014, P 2 ACM WORKSH INF H, DOI DOI 10.1145/2600918.2600935
[5]  
[Anonymous], 2013, P 1 ACM WORKSH INF H, DOI DOI 10.1145/2482513.2482514
[6]  
[Anonymous], IS T SPIE ELECT IMAG
[7]  
[Anonymous], 2011, ACM T INTEL SYST TEC, DOI DOI 10.1145/1961189.1961199
[8]   On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding [J].
Cao, Hong ;
Kot, Alex C. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (09) :1508-1518
[9]  
Cheng J, 2005, IEEE INT SYMP CIRC S, P4405
[10]  
Cheng J, 2005, INT CONF ACOUST SPEE, P689