Improving steganalysis by fusion techniques: A case study with image steganography

被引:0
|
作者
Kharrazi, Mehdi [1 ]
Sencar, Husrev T.
Memon, Nasir
机构
[1] Polytech Univ, Dept Elect & Comp Engn, Brooklyn, NY 11201 USA
[2] Polytech Univ, Dept Comp & Informat Sci, Brooklyn, NY 11201 USA
来源
TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY 1 | 2006年 / 4300卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the past few years, we have witnessed a number of powerful steganalysis technique proposed in the literature. These techniques could be categorized as either specific or universal. Each category of techniques has a set of advantages and disadvantages. A steganalysis technique specific to a steganographic embedding technique would perform well when tested only on that method and might fail on all others. On the other hand, universal steganalysis methods perform less accurately overall but provide acceptable performance in many cases. In practice, since the steganalyst will. not be able to know what steganographic technique is used, it has to deploy a number of techniques on suspected images. In such a setting the most important question that needs to be answered is: What should the steganalyst do when the decisions produced by different steganalysis techniques are in contradiction? In this work, we propose and investigate the use of information fusion methods to aggregate the outputs of multiple steganalysis techniques. We consider several fusion rules that are applicable to steganalysis, and illustrate, through a number of case studies, how composite steganalyzers with improved performance can be designed. It is shown that fusion techniques increase detection accuracy and offer scalability, by enabling seamless integration of new steganalysis techniques.
引用
收藏
页码:123 / 137
页数:15
相关论文
共 50 条
  • [1] Improving steganalysis by fusion techniques: A case study with image steganography
    Kharrazi, M
    Sencar, HT
    Memon, N
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [2] A comprehensive study on image steganography and steganalysis techniques
    Amsaveni, A.
    Vanathi, P.T.
    International Journal of Information and Communication Technology, 2015, 7 (4-5) : 406 - 424
  • [3] Performance study of common image steganography and steganalysis techniques
    Kharrazi, Mehdi
    Sencar, Husrev T.
    Mernon, Nasir
    JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (04)
  • [4] Image steganography and steganalysis
    Bachrach, Mayra
    Shih, Frank Y.
    WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2011, 3 (03) : 251 - 259
  • [5] Improving image steganography security via ensemble steganalysis and adversarial perturbation minimization
    Wang, Dewang
    Yang, Gaobo
    Guo, Zhiqing
    Chen, Jiyou
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 85
  • [6] Image steganography and steganalysis concepts and practice
    Chandramouli, R
    Kharrazi, M
    Memon, N
    DIGITAL WATERMARKING, 2004, 2939 : 35 - 49
  • [7] Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review
    Apau, Richard
    Asante, Michael
    Twum, Frimpong
    Ben Hayfron-Acquah, James
    Peasah, Kwame Ofosuhene
    PLOS ONE, 2024, 19 (09):
  • [8] Defeating the current steganalysis techniques (robust steganography)
    Sung, AH
    Tadiparthi, GR
    Mukkamala, S
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 440 - 444
  • [9] Steganalysis of Multi Bit Plane Image Steganography
    Barbier, Johann
    Mayoura, Kichenakoumar
    DIGITAL WATERMARKING, PROCEEDINGS, 2008, 5041 : 99 - 111
  • [10] Steganalysis of block-DCT image steganography
    Wang, Y
    Moulin, P
    PROCEEDINGS OF THE 2003 IEEE WORKSHOP ON STATISTICAL SIGNAL PROCESSING, 2003, : 339 - 342