From Blind to Quantitative Steganalysis

A quantitative steganalyzer is an estimator of the number of embedding changes introduced by a specific embedding operation. Since for most algorithms the number of embedding changes correlates with the message length, quantitative steganalyzers are important forensic tools. In this paper, a general...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information forensics and security Vol. 7; no. 2; pp. 445 - 454
Main Authors Pevny, T., Fridrich, J., Ker, A. D.
Format Journal Article
LanguageEnglish
Published New York IEEE 01.04.2012
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1556-6013
1556-6021
DOI10.1109/TIFS.2011.2175918

Cover

Abstract A quantitative steganalyzer is an estimator of the number of embedding changes introduced by a specific embedding operation. Since for most algorithms the number of embedding changes correlates with the message length, quantitative steganalyzers are important forensic tools. In this paper, a general method for constructing quantitative steganalyzers from features used in blind detectors is proposed. The core of the method is a support vector regression, which is used to learn the mapping between a feature vector extracted from the investigated object and the embedding change rate. To demonstrate the generality of the proposed approach, quantitative steganalyzers are constructed for a variety of steganographic algorithms in both JPEG transform and spatial domains. The estimation accuracy is investigated in detail and compares favorably with state-of-the-art quantitative steganalyzers.
AbstractList A quantitative steganalyzer is an estimator of the number of embedding changes introduced by a specific embedding operation. Since for most algorithms the number of embedding changes correlates with the message length, quantitative steganalyzers are important forensic tools. In this paper, a general method for constructing quantitative steganalyzers from features used in blind detectors is proposed. The core of the method is a support vector regression, which is used to learn the mapping between a feature vector extracted from the investigated object and the embedding change rate. To demonstrate the generality of the proposed approach, quantitative steganalyzers are constructed for a variety of steganographic algorithms in both JPEG transform and spatial domains. The estimation accuracy is investigated in detail and compares favorably with state-of-the-art quantitative steganalyzers.
Author Fridrich, J.
Pevny, T.
Ker, A. D.
Author_xml – sequence: 1
  givenname: T.
  surname: Pevny
  fullname: Pevny, T.
  email: pevnak@gmail.com
  organization: Agent Technol. Center, Czech Tech. Univ., Prague, Czech Republic
– sequence: 2
  givenname: J.
  surname: Fridrich
  fullname: Fridrich, J.
  email: fridrich@binghamton.edu
  organization: Dept. of Electr. & Comput. Eng., Binghamton Univ., Binghamton, NY, USA
– sequence: 3
  givenname: A. D.
  surname: Ker
  fullname: Ker, A. D.
  email: adk@comlab.ox.ac.uk
  organization: Oxford Univ. Comput. Lab., R. Soc. Univ. Res. Fellow, Oxford, UK
BookMark eNp9kMFOAjEQhhuDiYA-gPGy8aKXxU5LW_aoRJSExBjw3HS7s6Zk2WK7a8Lbuwjh4MHTzOH7_sz8A9KrfY2EXAMdAdDsYTWfLUeMAowYKJHB5Iz0QQiZSsqgd9qBX5BBjGtKx2OQkz65mwW_SZ4qVxdJ45P31tSNa0zjvjFZNvhpalPtoouX5Lw0VcSr4xySj9nzavqaLt5e5tPHRWo5E00qlIUcLFe54tQKhhIMRZFZowrBpRSiKHiJubDcCmVyo5BhURTClMA7lg_J_SF3G_xXi7HRGxctVpWp0bdRA4VMCmBUdejtH3Tt29DdG3XGlFRizHgHqQNkg48xYKnt73u-boJxVZen9_3pfX96358-9teZ8MfcBrcxYfevc3NwHCKeeEknkHHGfwBKPXwQ
CODEN ITIFA6
CitedBy_id crossref_primary_10_1016_j_image_2018_10_004
crossref_primary_10_1016_j_sigpro_2014_09_008
crossref_primary_10_1117_1_JEI_27_2_023004
crossref_primary_10_1007_s11042_013_1654_y
crossref_primary_10_1109_TIFS_2017_2766580
crossref_primary_10_1016_j_dsp_2014_12_004
crossref_primary_10_1145_3694965
crossref_primary_10_1007_s11042_017_4656_3
crossref_primary_10_1016_j_eij_2023_05_010
crossref_primary_10_1109_TIFS_2015_2470220
crossref_primary_10_1007_s11042_014_2381_8
crossref_primary_10_1117_1_JEI_23_1_013025
crossref_primary_10_3390_sym9060092
crossref_primary_10_1016_j_image_2024_117171
crossref_primary_10_1186_1687_417X_2014_8
crossref_primary_10_1109_TIFS_2012_2229987
crossref_primary_10_1016_j_jisa_2018_04_005
crossref_primary_10_1007_s11042_019_7217_0
crossref_primary_10_1007_s11042_023_15504_9
crossref_primary_10_1109_TIP_2014_2310126
crossref_primary_10_1007_s11042_020_10001_9
crossref_primary_10_1016_j_diin_2014_12_001
crossref_primary_10_1016_j_sigpro_2013_11_009
crossref_primary_10_1109_ACCESS_2019_2920304
crossref_primary_10_1016_j_patrec_2017_08_016
crossref_primary_10_1007_s13198_023_02203_9
Cites_doi 10.1007/3-540-45496-9_21
10.1117/12.521350
10.1007/978-3-540-24624-4_12
10.1007/11558859_22
10.1117/12.759147
10.1145/1073170.1073176
10.1007/978-3-540-74124-4_21
10.1109/TIFS.2005.863485
10.1007/978-3-540-77370-2_25
10.1145/1288869.1288872
10.1007/978-3-642-18405-5_22
10.2307/2347973
10.1007/s00530-005-0194-3
10.1145/952532.952595
10.1007/978-3-540-88961-8_13
10.1007/978-3-540-88961-8_12
10.1007/978-3-540-74124-4_17
10.1007/3-540-36415-3_23
10.1145/1597817.1597831
10.1117/12.584426
10.1109/ICME.2006.262792
10.1007/11558859_20
10.1007/s00530-003-0100-9
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Apr 2012
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Apr 2012
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
F28
DOI 10.1109/TIFS.2011.2175918
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Civil Engineering Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
DatabaseTitle CrossRef
Civil Engineering Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList
Civil Engineering Abstracts
Civil Engineering Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1556-6021
EndPage 454
ExternalDocumentID 2607873351
10_1109_TIFS_2011_2175918
6081932
Genre orig-research
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
RIG
F28
ID FETCH-LOGICAL-c325t-57c1b1c37b730c52e61a0e59ca7d536655dd3feb5c3c57aba7e2eddd5af1361a3
IEDL.DBID RIE
ISSN 1556-6013
IngestDate Sun Sep 28 06:16:24 EDT 2025
Mon Jun 30 03:46:15 EDT 2025
Wed Oct 01 03:15:36 EDT 2025
Thu Apr 24 22:59:40 EDT 2025
Tue Aug 26 17:18:10 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c325t-57c1b1c37b730c52e61a0e59ca7d536655dd3feb5c3c57aba7e2eddd5af1361a3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
PQID 927675423
PQPubID 85506
PageCount 10
ParticipantIDs proquest_journals_927675423
crossref_citationtrail_10_1109_TIFS_2011_2175918
proquest_miscellaneous_1019651207
crossref_primary_10_1109_TIFS_2011_2175918
ieee_primary_6081932
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2012-April
2012-4-00
20120401
PublicationDateYYYYMMDD 2012-04-01
PublicationDate_xml – month: 04
  year: 2012
  text: 2012-April
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on information forensics and security
PublicationTitleAbbrev TIFS
PublicationYear 2012
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References goljan (ref33) 2006; 6072
ref37
ref15
bhme (ref36) 2008
ref11
ref10
soukal (ref9) 2005; 5681
ref1
ref17
bhme (ref31) 2006; 6072
pevn (ref18) 2009
ker (ref39) 2008; 6819
smola (ref21) 1998
schlkopf (ref22) 2001
westfeld (ref20) 2001; 2137
shi (ref13) 2006; 4437
dumitrescu (ref35) 2005
ref26
sallee (ref25) 2003; 2939
dumitrescu (ref2) 2002; 2578
(ref34) 0
ref27
hetzl (ref30) 2005; 3677
ref29
provos (ref28) 2001
ref8
pevn (ref14) 2007; 6505
fridrich (ref19) 2006; 6072
kodovsk (ref16) 2008
xuan (ref12) 2005; 3727
ref3
ref6
fridrich (ref4) 2004; 5306
bhme (ref7) 2008
upham (ref24) 0
greenspun (ref38) 0
latham (ref23) 0
cancelli (ref32) 2008
ker (ref5) 2005; 3727
References_xml – year: 1998
  ident: ref21
  publication-title: A tutorial on support vector regression
– year: 2001
  ident: ref28
  article-title: Defending against statistical steganalysis
  publication-title: Proc ACM Symp Applied Computing 10th USENIX Security Symp
– volume: 2137
  start-page: 289
  year: 2001
  ident: ref20
  article-title: High capacity despite better steganalysis (F5 - A steganographic algorithm)
  publication-title: Proc 4th Int Workshop Information Hiding
  doi: 10.1007/3-540-45496-9_21
– volume: 5306
  start-page: 23
  year: 2004
  ident: ref4
  article-title: On estimation of secret message length in LSB steganography in spatial domain
  publication-title: Proc SPIE Electronic Imaging Security Steganography and Watermarking of Multimedia Contents VI
  doi: 10.1117/12.521350
– volume: 2939
  start-page: 154
  year: 2003
  ident: ref25
  article-title: Model-based steganography
  publication-title: Proc 2nd Int Workshop Digital Watermarking
  doi: 10.1007/978-3-540-24624-4_12
– volume: 3727
  start-page: 296
  year: 2005
  ident: ref5
  article-title: A general framework for structural analysis of LSB replacement
  publication-title: Proc 7th Int Workshop Information Hiding
  doi: 10.1007/11558859_22
– year: 2001
  ident: ref22
  publication-title: Learning With Kernels Support Vector Machines Regularization Optimization and Beyond (Adaptive Computation and Machine Learning)
– year: 0
  ident: ref34
– year: 2008
  ident: ref16
  article-title: Influence of embedding strategies on security of steganographic methods in the JPEG domain
  publication-title: Proc SPIE Electronic Imaging Security Forensics Steganography and Watermarking of Multimedia Contents X
  doi: 10.1117/12.759147
– start-page: 25
  year: 2005
  ident: ref35
  article-title: LSB steganalysis based on higher-order statistics
  publication-title: Proc ACM Workshop on Multimedia Security
  doi: 10.1145/1073170.1073176
– volume: 6072
  start-page: 59
  year: 2006
  ident: ref31
  article-title: A two-factor error model for quantitative steganalysis
  publication-title: Proc SPIE Security Steganography and Watermarking of Multimedia Contents VII
– volume: 6072
  start-page: 1w
  year: 2006
  ident: ref19
  article-title: Matrix embedding for large payloads
  publication-title: Proc SPIE Security Steganography and Watermarking of Multimedia Contents VII
– volume: 3677
  start-page: 119
  year: 2005
  ident: ref30
  article-title: A graph-theoretic approach to steganography
  publication-title: Proc 9th IFIP TC-6 TC-11 Int Conf Communications and Multimedia Security (CMS 2005)
– ident: ref26
  doi: 10.1007/978-3-540-74124-4_21
– ident: ref11
  doi: 10.1109/TIFS.2005.863485
– volume: 6819
  start-page: 5-1
  year: 2008
  ident: ref39
  article-title: Revisiting weighted stego-image steganalysis
  publication-title: Proc SPIE Electronic Imaging Security Forensics Steganography and Watermarking of Multimedia Contents X
– ident: ref6
  doi: 10.1007/978-3-540-77370-2_25
– ident: ref27
  doi: 10.1145/1288869.1288872
– ident: ref10
  doi: 10.1007/978-3-642-18405-5_22
– year: 0
  ident: ref38
– volume: 6072
  start-page: 1
  year: 2006
  ident: ref33
  article-title: New blind steganalysis and its implications
  publication-title: Proc SPIE Security Steganography and Watermarking of Multimedia Contents VII
– ident: ref37
  doi: 10.2307/2347973
– year: 0
  ident: ref23
  publication-title: Steganography
– ident: ref29
  doi: 10.1007/s00530-005-0194-3
– ident: ref3
  doi: 10.1145/952532.952595
– year: 2009
  ident: ref18
  article-title: From blind to quantitative steganalysis
  publication-title: Proc SPIE Electronic Imaging Security Steganography Watermarking of Multimedia Contents VI
– start-page: 178
  year: 2008
  ident: ref7
  article-title: Weighted stego-image steganalysis for JPEG covers
  publication-title: Proc 10th Int Workshop Information Hiding
  doi: 10.1007/978-3-540-88961-8_13
– ident: ref8
  doi: 10.1007/978-3-540-88961-8_12
– volume: 4437
  start-page: 249
  year: 2006
  ident: ref13
  article-title: A Markov process based approach to effective attacking JPEG steganography
  publication-title: Proc 8th Int Workshop Information Hiding
  doi: 10.1007/978-3-540-74124-4_17
– volume: 2578
  start-page: 355
  year: 2002
  ident: ref2
  article-title: Detection of LSB steganography via sample pair analysis
  publication-title: Proc 5th Int Workshop Information Hiding
  doi: 10.1007/3-540-36415-3_23
– year: 2008
  ident: ref36
  publication-title: Improved Statistical Steganalysis Using Models of Heterogeneous Cover Signals
– ident: ref15
  doi: 10.1145/1597817.1597831
– volume: 5681
  start-page: 595
  year: 2005
  ident: ref9
  article-title: Maximum likelihood estimation of secret message length embedded using <formula formulatype="inline"><tex Notation="TeX">$\pm k$</tex></formula> steganography in spatial domain
  publication-title: Proc SPIE Security Steganography and Watermarking of Multimedia Contents VII
  doi: 10.1117/12.584426
– year: 0
  ident: ref24
  publication-title: JSteg source
– year: 2008
  ident: ref32
  article-title: Detection of <formula formulatype="inline"><tex Notation="TeX">$\pm {1}$</tex></formula> steganography based on the amplitude of histogram local extrema
  publication-title: Proc IEEE Int Conf Image Processing (ICIP)
– ident: ref17
  doi: 10.1109/ICME.2006.262792
– volume: 6505
  start-page: 3 1
  year: 2007
  ident: ref14
  article-title: Merging Markov and DCT features for multi-class JPEG steganalysis
  publication-title: Proc SPIE Electronic Imaging Security Steganography and Watermarking of Multimedia Contents IX
– volume: 3727
  start-page: 262
  year: 2005
  ident: ref12
  article-title: Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
  publication-title: Proc 7th Int Workshop Information Hiding
  doi: 10.1007/11558859_20
– ident: ref1
  doi: 10.1007/s00530-003-0100-9
SSID ssj0044168
Score 2.2375388
Snippet A quantitative steganalyzer is an estimator of the number of embedding changes introduced by a specific embedding operation. Since for most algorithms the...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 445
SubjectTerms Accuracy
Algorithms
Blind steganalysis
Blinds
Construction
Feature extraction
Forensic engineering
Kernel
Mathematical analysis
message length estimation
Messages
Q factor
quantitative steganalysis
Regression
Support vector machines
Training
Transform coding
Vectors (mathematics)
Title From Blind to Quantitative Steganalysis
URI https://ieeexplore.ieee.org/document/6081932
https://www.proquest.com/docview/927675423
https://www.proquest.com/docview/1019651207
Volume 7
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1556-6021
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0044168
  issn: 1556-6013
  databaseCode: RIE
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB7Ukx58reL6ooIgiF3bZidpjyouKijI7oK3kiapB7UVbS_-eidtuoiKeCs0TUsmM_OlM_MNwKEObPAn174RPPeHCtGPyU35msfKxpGioCmkvb3jV9PhzQM-zMHJrBbGGNMkn5mBvWxi-bpUtf1Vdsqt_2JkcOdFzNtarc7qkldvy94QuU-HDOYimGGQnE6uR-OWrJPwNya2v8cXH9Q0VflhiRv3MlqB2-7D2qySp0FdZQP18Y2z8b9fvgrLDmd6Z-3GWIM5U6zDStfDwXMqvQ5LXwgJe3A0eitfvHOCntqrSu--lkVThEYm0RtX5lE6CpMNmI4uJxdXvmul4CsWYeWjUGEWKiYy0miFkeGhDAwmSgqNjHNErVluMlRMoZCZFCYyWmuUechoLNuEhaIszBZ4JMWcQEYuMdZDoWWWSxNksczJ8dMc2IegW9xUOZ5x2-7iOW3OG0GSWnmkVh6pk0cfjmePvLYkG38N7tn1nQ10S9uHnU6CqVPD9zSJLFcNIcY-HMzukv7YoIgsTFm_2xS3hBPqCcT27xPvwCK9PmqzdXZhoXqrzR4BkSrbb3bgJ9ZO2H8
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB5ED-rBt7g-KwiC2N226aTbo4rL-lhBXMFbSZPUg9qKthd_vZM2XURFvBWahpDJzHzpzHwDcKA8E_zJlKsjnrmhRHT75KZcxfvSxJECry6kHd3w4X14-YAPU3A8qYXRWtfJZ7prHutYvipkZX6V9bjxX4wM7gyGYYhNtVZrd8mvN4VviNylawazMUzfi3vji8FdQ9dJCBxj0-Hjixeq26r8sMW1gxkswqhdWpNX8tStyrQrP76xNv537UuwYJGmc9IcjWWY0vkKLLZdHByr1Csw_4WScBUOB2_Fi3NK4FM5ZeHcViKvy9DIKDp3pX4UlsRkDe4H5-OzoWubKbiSBVi6GEk_9SWLUtJpiYHmvvA0xlJEChnniEqxTKcomcRIpCLSgVZKoch8RmPZOkznRa43wCE5ZgQzMoF9FUZKpJnQXtoXGbl-mgM74LWbm0jLNG4aXjwn9Y3DixMjj8TII7Hy6MDR5JPXhmbjr8GrZn8nA-3WdmCrlWBiFfE9iQPDVkOYsQP7k7ekQSYsInJdVO8myS3mhHu8aPP3ifdgdjgeXSfXFzdXWzBHSwma3J1tmC7fKr1DsKRMd-vT-AlVtdvM
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=From+Blind+to+Quantitative+Steganalysis&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Pevny%2C+Tom%C3%A1%C5%A1&rft.au=Fridrich%2C+Jessica&rft.au=Ker%2C+Andrew+D.&rft.date=2012-04-01&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=7&rft.issue=2&rft.spage=445&rft.epage=454&rft_id=info:doi/10.1109%2FTIFS.2011.2175918&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TIFS_2011_2175918
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon