Research article Special Issues

Color image steganalysis based on quaternion discrete cosine transform

  • Received: 22 March 2023 Revised: 16 April 2023 Accepted: 08 May 2023 Published: 26 May 2023
  • With the rapid development and application of Internet technology in recent years, the issue of information security has received more and more attention. Digital steganography is used as a means of secure communication to hide information by modifying the carrier. However, steganography can also be used for illegal acts, so it is of great significance to study steganalysis techniques. The steganalysis technology can be used to solve the illegal steganography problem of computer vision and engineering applications technology. Most of the images in the Internet are color images, and steganalysis for color images is a very critical problem in the field of steganalysis at this stage. Currently proposed algorithms for steganalysis of color images mainly rely on the manual design of steganographic features, and the steganographic features do not fully consider the internal connection between the three channels of color images. In recent years, advanced steganography techniques for color images have been proposed, which brings more serious challenges to color image steganalysis. Quaternions are a good tool to represent color images, and the transformation of quaternions can fully exploit the correlation among color image channels. In this paper, we propose a color image steganalysis algorithm based on quaternion discrete cosine transform, firstly, the image is represented by quaternion, then the quaternion discrete cosine transform is applied to it, and the coefficients obtained from the transformation are extracted to design features of the coeval matrix. The experimental results show that the proposed algorithm works better than the typical color image steganalysis algorithm.

    Citation: Meng Xu, Xiangyang Luo, Jinwei Wang, Hao Wang. Color image steganalysis based on quaternion discrete cosine transform[J]. Electronic Research Archive, 2023, 31(7): 4102-4118. doi: 10.3934/era.2023209

    Related Papers:

  • With the rapid development and application of Internet technology in recent years, the issue of information security has received more and more attention. Digital steganography is used as a means of secure communication to hide information by modifying the carrier. However, steganography can also be used for illegal acts, so it is of great significance to study steganalysis techniques. The steganalysis technology can be used to solve the illegal steganography problem of computer vision and engineering applications technology. Most of the images in the Internet are color images, and steganalysis for color images is a very critical problem in the field of steganalysis at this stage. Currently proposed algorithms for steganalysis of color images mainly rely on the manual design of steganographic features, and the steganographic features do not fully consider the internal connection between the three channels of color images. In recent years, advanced steganography techniques for color images have been proposed, which brings more serious challenges to color image steganalysis. Quaternions are a good tool to represent color images, and the transformation of quaternions can fully exploit the correlation among color image channels. In this paper, we propose a color image steganalysis algorithm based on quaternion discrete cosine transform, firstly, the image is represented by quaternion, then the quaternion discrete cosine transform is applied to it, and the coefficients obtained from the transformation are extracted to design features of the coeval matrix. The experimental results show that the proposed algorithm works better than the typical color image steganalysis algorithm.



    加载中


    [1] I. Cox, M. Miller, J. Bloom, J. Fridrich, T. Kalker, Digital Watermarking and Steganography, Morgan Kaufmann, 2007. https://doi.org/10.1016/B978-0-12-372585-1.X5001-3
    [2] W. Luo, F. Huang, J. Huang, Edge adaptive image steganography based on LSB matching revisited, IEEE Trans. Inf. Forensics Secur., 5 (2010), 201-214. https://doi.org/10.1109/TIFS.2010.2041812 doi: 10.1109/TIFS.2010.2041812
    [3] E. Kawaguchi, R. O. Eason, Principles and applications of BPCS steganography, in Proceedings of the Photonics East (ISAM, VVDC, IEMB), International Society for Optics and Photonics, 3528 (1999), 464-473. https://doi.org/10.1117/12.337436
    [4] V. K. Sharma, V. Shrivastava, A steganography algorithm for hiding image in image by improved LSB substitution by minimize detection, J. Theor. Appl. Inf. Technol., 36 (2012), 1-8. Available from: http://www.jatit.org/volumes/Vol36No1/1Vol36No1.pdf.
    [5] B. C. Nguyen, S. M. Yoon, H. K. Lee, Multi bit plane image steganography, in Digital Watermarking, Springer, (2006), 61-70. https://doi.org/10.1007/11922841_6
    [6] M. Omoomi, S. Samavi, S. Dumitrescu, An efficient high payload ±1 data embedding scheme, Multimedia Tools Appl., 54 (2011), 201-218. https://doi.org/10.1007/s11042-010-0517-z doi: 10.1007/s11042-010-0517-z
    [7] D. Upham, Jpeg-jsteg-v4, 2008. Available from: http://www.funet.fi/pub/crypt/steganography/jpeg-jsteg-v4.diff.gz.
    [8] F. A. Petitcolas, R. J. Anderson, M. G. Kuhn, Information hiding-a survey, Proc. IEEE, 87 (1999), 1062-1078. https://doi.org/10.1109/5.771065 doi: 10.1109/5.771065
    [9] N. Provos, Defending against statistical steganalysis, in Proceedings of the Usenix Security Symposium, 10 (2001), 323-336. https://dl.acm.org/doi/10.5555/1251327.1251351
    [10] P. Sallee, Model-based steganography, in Digital Watermarking, Springer, (2004), 154-167. https://doi.org/10.1007/978-3-540-24624-4_12
    [11] T. Pevný, T. Filler, P. Bas, Using high-dimensional image models to perform highly undetectable steganography, in International Workshop on Information Hiding, 6387 (2010), 161-177. https://doi.org/10.1007/978-3-642-16435-4_13
    [12] J. Fridrich, M. Goljan, D. Soukal, Perturbed quantization steganography, Multimedia Syst., 11 (2005), 98-107. https://doi.org/10.1007/s00530-005-0194-3 doi: 10.1007/s00530-005-0194-3
    [13] X. Song, F. Liu, C. Yang, X. Luo, Y. Zhang, Steganalysis of adaptive JPEG steganography using 2D gabor filters, in Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, (2015), 15-23. https://doi.org/10.1145/2756601.2756608
    [14] A. Westfeld, A. Pfitzmann, Attacks on steganographic systems, in International Workshop on Information Hiding, Springer, Berlin, Heidelberg, (2000), 61-76. https://doi.org/10.1007/10719724_5
    [15] J. Fridrich, M. Goljan, D. Rui, Reliable detection of LSB steganography in color and grayscale images, in Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges, 2002. https://doi.org/10.1145/1232454.1232466
    [16] S. Dumitrescu, X. Wu, W. Zhe, Detection of LSB steganography via sample pair analysis, IEEE Trans. Signal Process., 51 (2002), 1995-2007. https://doi.org/10.1109/TSP.2003.812753 doi: 10.1109/TSP.2003.812753
    [17] J. Fridrich, M. Goljan, On estimation of secret message length in LSB steganography in spatial domain, in Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004. https://doi.org/10.1117/12.521350
    [18] J. Fridrich, M. Long, Steganalysis of LSB encoding in color images, in Proceedings of IEEE International Conference on Multimedia and Expo, (2000), 1279-1282. https://doi.org/10.1109/ICME.2000.871000
    [19] W. You, H. Zhang, X. Zhao, A siamese CNN for image steganalysis, IEEE Trans. Inf. Forensics Secur., 16 (2020), 291-306. https://doi.org/10.1109/TIFS.2020.3013204 doi: 10.1109/TIFS.2020.3013204
    [20] K. Wei, W. Luo, S. Tan, J. Huang, Universal deep network for steganalysis of color image based on channel representation, IEEE Trans. Inf. Forensics Secur., 17 (2022), 3022-3036. https://doi.org/10.1109/TIFS.2022.3196265 doi: 10.1109/TIFS.2022.3196265
    [21] G. Su, H. Lu, H. Fang, B. Yang, A steganalysis algorithm based on statistic characteristics of the color images, in Proceedings of International Conference on Computer Science and Network Technology, (2011), 2294-2297. https://doi.org/10.1109/ICCSNT.2011.6182432
    [22] H. Abdulrahman, M. Chaumont, P. Montesinos, B. Magnier, Color images steganalysis using RGB channel geometric transformation measures, Secur. Commun. Netw., 9 (2016), 2945-2956. https://doi.org/10.1002/sec.1427 doi: 10.1002/sec.1427
    [23] M. Goljan, J. Fridrich, R. Cogranne, Rich model for steganalysis of color images, in Proceedings of IEEE International Workshop on Information Forensics and Security, (2014), 185-190. https://doi.org/10.1109/WIFS.2014.7084325
    [24] M. Goljan, J. Fridrich, CFA-aware features for steganalysis of color images, in Proceedings of SPIE 9409, Media Watermarking, Security, and Forensics, (2015), 1-13. https://doi.org/10.1117/12.2078399
    [25] X. Liao, G. Chen, J. Yin, Content-adaptive steganalysis for color images, Secur. Commun. Netw., 9 (2016), 5756-5763. https://doi.org/10.1002/sec.1734 doi: 10.1002/sec.1734
    [26] S. Lyu, H. Farid, Steganalysis using color wavelet statistics and one-class support vector machines, in Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, (2004), 35-45. https://doi.org/10.1117/12.526012
    [27] Q. Liu, A. H. Sung, J. Xu, B. M. Ribeiro, Image complexity and feature extraction for steganalysis of LSB matching steganography, in Proceedings of the 18th International Conference on Pattern Recognition, (2006), 267-270. https://doi.org/10.1109/ICPR.2006.684
    [28] F. Y. Li, X. P. Zhang, J. Yu, Steganalysis for color JPEG images based on ensemble proportion training, J. Electron. Inf. Technol., 36 (2014), 114-120. https://doi.org/10.3724/SP.J.1146.2013.00443 doi: 10.3724/SP.J.1146.2013.00443
    [29] H. Abdulrahman, M. Chaumont, P. Montesinos, B. Magnier, Color image steganalysis based on steerable gaussian filters bank, in Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, (2016), 109-114. https://doi.org/10.1145/2909827.2930799
    [30] Y. Kang, F. Liu, C. Yang, L. Xiang, X. Luo, P. Wang, Color image steganalysis based on channel gradient correlation, Int. J. Distrib. Sens. Netw., 15 (2019). https://doi.org/10.1177/1550147719852031
    [31] C. Qin, Y. Chen, K. Chen, X. Dong, W. Zhang, Y. He, et al., Feature fusion based adversarial example detection against second-round adversarial attacks, IEEE Trans. Artif. Intell., 2022 (2022), 1-12. https://doi.org/10.1109/TAI.2022.3190816 doi: 10.1109/TAI.2022.3190816
    [32] J. Zeng, S. Tan, G. Liu, B. Li, J. Huang, WISERNet: wider separate-then-reunion network for steganalysis of color images, IEEE Trans. Inf. Forensics Secur., 14 (2019), 2735-2748. https://doi.org/10.1109/TIFS.2019.2904413 doi: 10.1109/TIFS.2019.2904413
    [33] T. Wu, W. Ren, D. Li, L. Wang, J. Jia, JPEG steganalysis based on denoising network and attention module, Int. J. Intell. Syst., 37 (2021), 5011-5030. https://doi.org/10.1002/int.22749 doi: 10.1002/int.22749
    [34] J. Kodovsky, J. Fridrich, Steganalysis of JPEG images using rich models, in Proceedings of SPIE - Media Watermarking, Security, and Forensics, 2012. https://doi.org/10.1117/12.907495
    [35] W. Feng, B. Hu, Quaternion discrete cosine transform and its application in color template matching, in Congress on Image and Signal Processing, Sanya, (2008), 252-256. https://doi.org/10.1109/CISP.2008.61
    [36] V. Holub, J. Fridrich, Designing steganographic distortion using directional filters, in 2012 IEEE International Workshop on Information Forensics and Security (WIFS), (2012), 234-239. https://doi.org/10.1109/WIFS.2012.6412655
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(894) PDF downloads(52) Cited by(0)

Article outline

Figures and Tables

Figures(6)  /  Tables(6)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog