Abstract
This paper investigates reliable steganalysis of natural cover images using a local non-linear parametric model. In the framework of hypothesis testing theory, the use of the model permits to warrant predictable results under false alarm constraint.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bruni, C., De Santi, A., Koch, G., Sinisgalli, C.: Identification of discontinuities in blurred noisy signals. IEEE Trans. on Circuit and systems-I 44(5), 422–433 (1997)
Böhme, R.: Advanced Statistical Steganalysis, 1st edn. Springer Publishing Company, Incorporated, Heidelberg (2010)
Böhme, R.: Assessment of Steganalytic Methods Using Multiple Regression Models. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 278–295. Springer, Heidelberg (2005)
BOSS Contest: Break Our Steganographic System (2010), http://boss.gipsa-lab.grenoble-inp.fr
Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann, San Francisco (2007)
Dabeer, O., Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.: Detection of hiding in the least significant bit. IEEE Transactions on Signal Processing 52(10), 3046–3058 (2004)
Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: Proc.of SPIE Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 23–34 (2004)
Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications, 1st edn. Cambridge University Press, Cambridge (2009)
Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in color and grayscale images. IEEE Multimedia 8, 22–28 (2001)
Goodman, J.W.: Introduction to Fourier Optics, 3rd edn. Roberts & Company Publishers, Englewood (2005)
Ker, A.D.: Locating steganographic payload via WS residuals. In: ACM Proceedings of 10th Multimedia and Security Workshop, pp. 27–31 (2008)
Ker, A.D., Böhme, R.: Revisiting weighted stego-image steganalysis. In: Proc. of SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, pp. 501–517 (2008)
Ker, A.D.: A Capacity Result for Batch Steganography. IEEE Signal Processing Letters 14(8), 525–528 (2007)
Lehman, E.: Testing Statistical Hypotheses, 2nd edn. Chapman & Hall, Boca Raton (1986)
Mumford, D., Shah, J.: Optimal approximations by piecewise smooth functions and associated variational problems. Communications on Pure and Applied Mathematics (5), 577–685 (1989)
Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics 5(1), 167–189 (2005)
Schaefer, G., Stich, M.: UCID - an uncompressed colour image database. In: SPIE Proceedings, vol. 5307, pp. 472–480, http://vision.cs.aston.ac.uk/datasets/UCID/
Seber, G., Wild, C.: Nonlinear Regression. Wiley, Chichester (1989)
Wang, Y., Moulin, P.: Steganalysis of block-DCT image steganography. In: 2003 IEEE Workshop on Statistical Signal Processing (2003)
Wang, Y., Moulin, P.: Statistical modelling and steganalysis of DFT-based image steganography, vol. 6072, p. 607202. SPIE, CA (2006)
Westfeld, A., Andreas, P.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Zitzmann, C., Cogranne, R., Retraint, F., Nikiforov, I., Fillatre, L., Cornu, P.: Statistical Decision Methods in Hidden Information Detection. In: Filler, T., et al. (eds.) IH 2011. LNCS, vol. 6958, pp. 163–177. Springer-, Heidelberg (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cogranne, R., Zitzmann, C., Fillatre, L., Retraint, F., Nikiforov, I., Cornu, P. (2011). A Cover Image Model For Reliable Steganalysis. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds) Information Hiding. IH 2011. Lecture Notes in Computer Science, vol 6958. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24178-9_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-24178-9_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24177-2
Online ISBN: 978-3-642-24178-9
eBook Packages: Computer ScienceComputer Science (R0)