Steganalysis of JPEG images using non-linear residuals

被引:0
|
作者
Xia C. [1 ]
Liu Y. [1 ]
Guan Q. [2 ]
Jin X. [1 ]
Zhang Y. [1 ]
Xu S. [1 ]
机构
[1] Beijing Electronic Science and Technology Institute, Beijing
[2] Computer Engineering College, Jimei University, Xiamen
来源
基金
中国国家自然科学基金;
关键词
information hiding; JPEG image; steganalysis; steganography;
D O I
10.11959/j.issn.1000-436x.2023010
中图分类号
学科分类号
摘要
Most current JPEG steganalytic methods can only extract features from a series of linear residuals. Non-linear filters are not considered in these JPEG steganalytic methods, resulting in single types of residuals. Hence, a JPEG steganalytic method using non-linear residuals was proposed. Firstly, non-linear residuals were generated without a high computational cost by using element-wise minimum and maximum operations across a couple of linear residuals which had been obtained in the current JPEG steganalytic method. Secondly, according to the JPEG phase, the non-linear residual was divided into sub-residuals in which the histogram features were extracted. Thirdly, considering the minimum and maximum operators, the symmetrization method was accordingly designed. Finally, all the symmetrized histogram features were concatenated to form the final feature set. Experimental results indicate that the performance for JPEG steganalysis can be improved effectively by using both the linear and the non-linear residuals. © 2023 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:142 / 152
页数:10
相关论文
共 25 条
  • [1] FILLER T, JUDAS J, FRIDRICH J., Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE Transactions on Information Forensics and Security, 6, 3, pp. 920-935, (2011)
  • [2] HOLUB V, FRIDRICH J, DENEMARK T., Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, 1, pp. 1-13, (2014)
  • [3] GUO L J, NI J Q, SU W K, Et al., Using statistical image model for JPEG steganography: uniform embedding revisited, IEEE Transactions on Information Forensics and Security, 10, 12, pp. 2669-2680, (2015)
  • [4] TANG G M, SUN Y, XU X Y, Et al., Adaptive JPEG steganography based on distortion cost updating, Journal on Communications, 38, 9, pp. 1-8, (2017)
  • [5] SU W K, NI J Q, LI X H, Et al., A new distortion function design for JPEG steganography using the generalized uniform embedding strategy, IEEE Transactions on Circuits and Systems for Video Technology, 28, 12, pp. 3545-3549, (2018)
  • [6] HU X L, NI J Q, SHI Y Q., Efficient JPEG steganography using domain transformation of embedding entropy, IEEE Signal Processing Letters, 25, 6, pp. 773-777, (2018)
  • [7] CHEN K J, ZHOU H, ZHOU W B, Et al., Defining cost functions for adaptive JPEG steganography at the microscale, IEEE Transactions on Information Forensics and Security, 14, 4, pp. 1052-1066, (2019)
  • [8] WANG Y F, LI W X, ZHANG W M, Et al., BBC: enhanced block boundary continuity on defining non-additive distortion for JPEG steganography, IEEE Transactions on Circuits and Systems for Video Technology, 31, 5, pp. 2082-2088, (2021)
  • [9] WANG Z C, FENG G R, QIAN Z X, Et al., JPEG steganography with content similarity evaluation, IEEE Transactions on Cybernetics, (2022)
  • [10] PEVNY T, FRIDRICH J., Merging Markov and DCT features for multi-class JPEG steganalysis, Proceeding of Security, Steganography, and Watermarking of Multimedia Contents IX, pp. 28-40, (2007)