Abstract
When a digital forensics investigator suspects that steganography has been used to hide data in an image, he must not only determine that the image contains embedded information but also identify the method used for embedding. The determination of the embedding methodor stego fingerprint — is critical to extracting the hidden information. This paper focuses on identifying stego fingerprints in JPEG images. The steganography tools targeted are F5, JSteg, Model-Based Embedding, OutGuess and StegHide. Each of these tools embeds data in a dramatically different way and, therefore, presents a different challenge to extracting the hidden information. The embedding methods are distinguished using features developed from sets of stego images that are used to train a multi-class support vector machine (SVM) classifier. For new images, the image features are calculated and evaluated based on their associated label to the most similar class, i.e., clean or embedding method feature space. The SVM results demonstrate that, in the worst case, embedding methods can be distinguished with 87% reliability.
Chapter PDF
Similar content being viewed by others
References
S. Agaian and H. Cai, Color wavelet based universal blind steganalysis, presented at the International Workshop on Spectral Methods and Multirate Signal Processing, 2004.
R. Buccigrossi and E. Simoncelli, Image compression via joint statistical characterization in the wavelet domain, IEEE Transactions on Image Processing, vol. 8(12), pp. 1688–1701, 1999.
C. Burges, A tutorial on support vector machines for pattern recognition, Data Mining and Knowledge Discovery, vol. 2(2), pp. 121–167, 1998.
N. Cristianini and J. Shawe-Taylor, An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods, Cambridge University Press, Cambridge, United Kingdom, 2000.
J. Fridrich, G. Miroslav and H. Dorin, New methodology for breaking steganographic techniques for JPEGs, Proceedings of the SPIE Symposium on Electronic Imaging, pp. 143–155, 2003.
J. Fridrich and T. Pevny, Determining the stego algorithm for JPEG images, IEE Proceedings, vol. 153(3), pp. 75–139, 2006.
S. Har-Peled, D. Roth and D. Zimak, Constraint classification for multiclass classification and ranking, in Advances in Neural Information Systems 15, S. Becker, S. Thrun and K. Obermayer (Eds.), MIT Press, Cambridge, Massachusetts, pp. 785–792, 2003.
S. Hetzl, StegHide (http://steghide.sourceforge.net).
C. Hsu, C. Chang and C. Lin, A practical guide to support vector classification (http://www.csie.ntu.edu.tw/~cjlin/papers/guide/guide.pdf), 2005.
T. Lane, P. Gladstone, L. Ortiz, L. Crocker, G. Weijers and other members of the Independent JPEG Group, JSteg (http://www.stegoarchive.com).
S. Lyu and H. Farid, Steganalysis using color wavelet statistics and one-class support vector machines, Proceedings of the SPIE Symposium on Electronic Imaging, 2004.
J. Platt, N. Cristianini and J. Shawe-Taylor, Large margin DAGs for multiclass classification, in Advances in Neural Information Systems 12, S. Solla, T. Leen and K. Muller (Eds.), MIT Press, Cambridge, Massachusetts, pp. 547–553, 2000.
N. Provos, OutGuess (http://www.outguess.org).
P. Sallee, Model-based steganography, Proceedings of the Second International Workshop on Digital Watermarking, pp. 154–167, 2003.
B. Scholkopf and A. Smola, Learning with Kernels: Support Vector Machines, Regularization, Optimization and Beyond, MIT Press, Cambridge, Massachusetts, 2002.
StegoArchive.com (http://www.stegoarchive.com).
A. Tewari and P. Bartlett, On the consistency of multiclass classification methods, Proceedings of the Eighteenth Annual Conference on Learning Theory, pp. 143–157, 2005.
A. Westfeld, F5 —A steganographic algorithm, Proceedings of the Fourth International Workshop on Information Hiding, pp. 289–302, 2001.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 International Federation for Information Processing
About this paper
Cite this paper
Rodriguez, B., Peterson, G. (2007). Detecting Steganography Using Multi-Class Classification. In: Craiger, P., Shenoi, S. (eds) Advances in Digital Forensics III. DigitalForensics 2007. IFIP — The International Federation for Information Processing, vol 242. Springer, New York, NY. https://doi.org/10.1007/978-0-387-73742-3_13
Download citation
DOI: https://doi.org/10.1007/978-0-387-73742-3_13
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-73741-6
Online ISBN: 978-0-387-73742-3
eBook Packages: Computer ScienceComputer Science (R0)