Paper
20 June 2003 Steganalysis of additive-noise modelable information hiding
Author Affiliations +
Proceedings Volume 5020, Security and Watermarking of Multimedia Contents V; (2003) https://doi.org/10.1117/12.476813
Event: Electronic Imaging 2003, 2003, Santa Clara, CA, United States
Abstract
The process of information hiding is modeled in the context of additive noise. Under an independence assumption, the histogram of the stegomessage is a convolution of the noise probability mass function (PMF) and the original histogram. In the frequency domain this convolution is viewed as a multiplication of the histogram characteristic function (HCF) and the noise characteristic function. Least significant bit, spread spectrum, and DCT hiding methods for images are analyzed in this framework. It is shown that these embedding methods are equivalent to a lowpass filtering of histograms that is quantified by a decrease in the HCF center of mass (COM). These decreases are exploited in a known scheme detection to classify unaltered and spread spectrum images using a bivariate classifier. Finally, a blind detection scheme is built that uses only statistics from unaltered images. By calculating the Mahalanobis distance from a test COM to the training distribution, a threshold is used to identify steganographic images. At an embedding rate of 1 b.p.p. greater than 95% of the stegoimages are detected with false alarm rate of 5%.
© (2003) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jeremiah Joseph Harmsen and William A. Pearlman "Steganalysis of additive-noise modelable information hiding", Proc. SPIE 5020, Security and Watermarking of Multimedia Contents V, (20 June 2003); https://doi.org/10.1117/12.476813
Lens.org Logo
CITATIONS
Cited by 391 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data hiding

Data modeling

RGB color model

Steganography

Convolution

Steganalysis

Image analysis

RELATED CONTENT


Back to Top