Introduction to statistical pattern recognition (2nd ed.)
Introduction to statistical pattern recognition (2nd ed.)
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
DCT-based watermark recovering without resorting to the uncorrupted original image
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Bhattacharyya Distance Feature Selection
ICPR '96 Proceedings of the 13th International Conference on Pattern Recognition - Volume 2
Reversible data hiding using integer wavelet transform and companding technique
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
The JPEG2000 still image coding system: an overview
IEEE Transactions on Consumer Electronics
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Review: A review on blind detection for image steganography
Signal Processing
On completeness of feature spaces in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
Universal Steganalysis Using Multiwavelet Higher-Order Statistics and Support Vector Machines
ISNN '07 Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks, Part III
Benchmarking for Steganography
Information Hiding
Fusion Based Blind Image Steganalysis by Boosting Feature Selection
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
IEEE Transactions on Information Forensics and Security
Steganalysis for Markov feature of difference array in DCT domain
FSKD'09 Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 7
Steganalysis by subtractive pixel adjacency matrix
IEEE Transactions on Information Forensics and Security
Classification of steganalysis techniques: A study
Digital Signal Processing
An experimental study on the security performance of YASS
IEEE Transactions on Information Forensics and Security
CBS: Contourlet-Based Steganalysis Method
Journal of Signal Processing Systems
Ternary data hiding technique for JPEG steganography
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Progressive exponential clustering-based steganography
EURASIP Journal on Advances in Signal Processing
Multimedia Tools and Applications
Video steganography with perturbed motion estimation
IH'11 Proceedings of the 13th international conference on Information hiding
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Steganalysis of LSB matching revisited for consecutive pixels using b-spline functions
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Insider threats in corporate environments: a case study for data leakage prevention
Proceedings of the Fifth Balkan Conference in Informatics
Audio steganalysis based on lossless data-compression techniques
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Textural features for steganalysis
IH'12 Proceedings of the 14th international conference on Information Hiding
A novel mapping scheme for steganalysis
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Calibration based reliable detector for detecting LSB matching steganography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Pixel rearrangement based statistical restoration scheme reducing embedding noise
Multimedia Tools and Applications
Hi-index | 0.00 |
In this paper, a steganalysis scheme based on multiple features formed by statistical moments of wavelet characteristic functions is proposed. Our theoretical analysis has pointed out that the defined n-th statistical moment of a wavelet characteristic function is related to the n-th derivative of the corresponding wavelet histogram, and hence is sensitive to data embedding. The selection of the first three moments of the characteristic functions of wavelet subbands of the three-level Haar wavelet decomposition as well as the test image has resulted in total 39 features for steganalysis. The effectiveness of the proposed system has been demonstrated by extensive experimental investigation. The detection rate for Cox et al.'s non-blind spread spectrum (SS) data hiding method, Piva et al.'s blind SS method, Huang and Shi's 8×8 block SS method, a generic LSB method (as embedding capacity being 0.3 bpp), and a generic QIM method (as embedding capacity being 0.1 bpp) are all above 90% over all of the 1096 images in the CorelDraw image database using the Bayes classifier. Furthermore, when these five typical data hiding methods are jointly considered for steganalysis, i.e., when the proposed steganalysis scheme is first trained sequentially for each of these five methods, and is then tested blindly for stego-images generated by all of these methods, the success classification rate is 86%, thus pointing out a new promising approach to general blind steganalysis. The detection results of steganalysis on Jsteg, Outguess and F5 have further demonstrated the effectiveness of the proposed steganalysis scheme.