From Blind to Quantitative Steganalysis
A quantitative steganalyzer is an estimator of the number of embedding changes introduced by a specific embedding operation. Since for most algorithms the number of embedding changes correlates with the message length, quantitative steganalyzers are important forensic tools. In this paper, a general...
        Saved in:
      
    
          | Published in | IEEE transactions on information forensics and security Vol. 7; no. 2; pp. 445 - 454 | 
|---|---|
| Main Authors | , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        New York
          IEEE
    
        01.04.2012
     The Institute of Electrical and Electronics Engineers, Inc. (IEEE)  | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 1556-6013 1556-6021  | 
| DOI | 10.1109/TIFS.2011.2175918 | 
Cover
| Abstract | A quantitative steganalyzer is an estimator of the number of embedding changes introduced by a specific embedding operation. Since for most algorithms the number of embedding changes correlates with the message length, quantitative steganalyzers are important forensic tools. In this paper, a general method for constructing quantitative steganalyzers from features used in blind detectors is proposed. The core of the method is a support vector regression, which is used to learn the mapping between a feature vector extracted from the investigated object and the embedding change rate. To demonstrate the generality of the proposed approach, quantitative steganalyzers are constructed for a variety of steganographic algorithms in both JPEG transform and spatial domains. The estimation accuracy is investigated in detail and compares favorably with state-of-the-art quantitative steganalyzers. | 
    
|---|---|
| AbstractList | A quantitative steganalyzer is an estimator of the number of embedding changes introduced by a specific embedding operation. Since for most algorithms the number of embedding changes correlates with the message length, quantitative steganalyzers are important forensic tools. In this paper, a general method for constructing quantitative steganalyzers from features used in blind detectors is proposed. The core of the method is a support vector regression, which is used to learn the mapping between a feature vector extracted from the investigated object and the embedding change rate. To demonstrate the generality of the proposed approach, quantitative steganalyzers are constructed for a variety of steganographic algorithms in both JPEG transform and spatial domains. The estimation accuracy is investigated in detail and compares favorably with state-of-the-art quantitative steganalyzers. | 
    
| Author | Fridrich, J. Pevny, T. Ker, A. D.  | 
    
| Author_xml | – sequence: 1 givenname: T. surname: Pevny fullname: Pevny, T. email: pevnak@gmail.com organization: Agent Technol. Center, Czech Tech. Univ., Prague, Czech Republic – sequence: 2 givenname: J. surname: Fridrich fullname: Fridrich, J. email: fridrich@binghamton.edu organization: Dept. of Electr. & Comput. Eng., Binghamton Univ., Binghamton, NY, USA – sequence: 3 givenname: A. D. surname: Ker fullname: Ker, A. D. email: adk@comlab.ox.ac.uk organization: Oxford Univ. Comput. Lab., R. Soc. Univ. Res. Fellow, Oxford, UK  | 
    
| BookMark | eNp9kMFOAjEQhhuDiYA-gPGy8aKXxU5LW_aoRJSExBjw3HS7s6Zk2WK7a8Lbuwjh4MHTzOH7_sz8A9KrfY2EXAMdAdDsYTWfLUeMAowYKJHB5Iz0QQiZSsqgd9qBX5BBjGtKx2OQkz65mwW_SZ4qVxdJ45P31tSNa0zjvjFZNvhpalPtoouX5Lw0VcSr4xySj9nzavqaLt5e5tPHRWo5E00qlIUcLFe54tQKhhIMRZFZowrBpRSiKHiJubDcCmVyo5BhURTClMA7lg_J_SF3G_xXi7HRGxctVpWp0bdRA4VMCmBUdejtH3Tt29DdG3XGlFRizHgHqQNkg48xYKnt73u-boJxVZen9_3pfX96358-9teZ8MfcBrcxYfevc3NwHCKeeEknkHHGfwBKPXwQ | 
    
| CODEN | ITIFA6 | 
    
| CitedBy_id | crossref_primary_10_1016_j_image_2018_10_004 crossref_primary_10_1016_j_sigpro_2014_09_008 crossref_primary_10_1117_1_JEI_27_2_023004 crossref_primary_10_1007_s11042_013_1654_y crossref_primary_10_1109_TIFS_2017_2766580 crossref_primary_10_1016_j_dsp_2014_12_004 crossref_primary_10_1145_3694965 crossref_primary_10_1007_s11042_017_4656_3 crossref_primary_10_1016_j_eij_2023_05_010 crossref_primary_10_1109_TIFS_2015_2470220 crossref_primary_10_1007_s11042_014_2381_8 crossref_primary_10_1117_1_JEI_23_1_013025 crossref_primary_10_3390_sym9060092 crossref_primary_10_1016_j_image_2024_117171 crossref_primary_10_1186_1687_417X_2014_8 crossref_primary_10_1109_TIFS_2012_2229987 crossref_primary_10_1016_j_jisa_2018_04_005 crossref_primary_10_1007_s11042_019_7217_0 crossref_primary_10_1007_s11042_023_15504_9 crossref_primary_10_1109_TIP_2014_2310126 crossref_primary_10_1007_s11042_020_10001_9 crossref_primary_10_1016_j_diin_2014_12_001 crossref_primary_10_1016_j_sigpro_2013_11_009 crossref_primary_10_1109_ACCESS_2019_2920304 crossref_primary_10_1016_j_patrec_2017_08_016 crossref_primary_10_1007_s13198_023_02203_9  | 
    
| Cites_doi | 10.1007/3-540-45496-9_21 10.1117/12.521350 10.1007/978-3-540-24624-4_12 10.1007/11558859_22 10.1117/12.759147 10.1145/1073170.1073176 10.1007/978-3-540-74124-4_21 10.1109/TIFS.2005.863485 10.1007/978-3-540-77370-2_25 10.1145/1288869.1288872 10.1007/978-3-642-18405-5_22 10.2307/2347973 10.1007/s00530-005-0194-3 10.1145/952532.952595 10.1007/978-3-540-88961-8_13 10.1007/978-3-540-88961-8_12 10.1007/978-3-540-74124-4_17 10.1007/3-540-36415-3_23 10.1145/1597817.1597831 10.1117/12.584426 10.1109/ICME.2006.262792 10.1007/11558859_20 10.1007/s00530-003-0100-9  | 
    
| ContentType | Journal Article | 
    
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Apr 2012 | 
    
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Apr 2012 | 
    
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D F28  | 
    
| DOI | 10.1109/TIFS.2011.2175918 | 
    
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts  Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering  | 
    
| DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering  | 
    
| DatabaseTitleList | Civil Engineering Abstracts Civil Engineering Abstracts  | 
    
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering Computer Science  | 
    
| EISSN | 1556-6021 | 
    
| EndPage | 454 | 
    
| ExternalDocumentID | 2607873351 10_1109_TIFS_2011_2175918 6081932  | 
    
| Genre | orig-research | 
    
| GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D RIG F28  | 
    
| ID | FETCH-LOGICAL-c325t-57c1b1c37b730c52e61a0e59ca7d536655dd3feb5c3c57aba7e2eddd5af1361a3 | 
    
| IEDL.DBID | RIE | 
    
| ISSN | 1556-6013 | 
    
| IngestDate | Sun Sep 28 06:16:24 EDT 2025 Mon Jun 30 03:46:15 EDT 2025 Wed Oct 01 03:15:36 EDT 2025 Thu Apr 24 22:59:40 EDT 2025 Tue Aug 26 17:18:10 EDT 2025  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 2 | 
    
| Language | English | 
    
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c325t-57c1b1c37b730c52e61a0e59ca7d536655dd3feb5c3c57aba7e2eddd5af1361a3 | 
    
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Article-2 ObjectType-Feature-1 content type line 23  | 
    
| PQID | 927675423 | 
    
| PQPubID | 85506 | 
    
| PageCount | 10 | 
    
| ParticipantIDs | proquest_journals_927675423 crossref_citationtrail_10_1109_TIFS_2011_2175918 proquest_miscellaneous_1019651207 crossref_primary_10_1109_TIFS_2011_2175918 ieee_primary_6081932  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2012-April 2012-4-00 20120401  | 
    
| PublicationDateYYYYMMDD | 2012-04-01 | 
    
| PublicationDate_xml | – month: 04 year: 2012 text: 2012-April  | 
    
| PublicationDecade | 2010 | 
    
| PublicationPlace | New York | 
    
| PublicationPlace_xml | – name: New York | 
    
| PublicationTitle | IEEE transactions on information forensics and security | 
    
| PublicationTitleAbbrev | TIFS | 
    
| PublicationYear | 2012 | 
    
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE)  | 
    
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)  | 
    
| References | goljan (ref33) 2006; 6072 ref37 ref15 bhme (ref36) 2008 ref11 ref10 soukal (ref9) 2005; 5681 ref1 ref17 bhme (ref31) 2006; 6072 pevn (ref18) 2009 ker (ref39) 2008; 6819 smola (ref21) 1998 schlkopf (ref22) 2001 westfeld (ref20) 2001; 2137 shi (ref13) 2006; 4437 dumitrescu (ref35) 2005 ref26 sallee (ref25) 2003; 2939 dumitrescu (ref2) 2002; 2578 (ref34) 0 ref27 hetzl (ref30) 2005; 3677 ref29 provos (ref28) 2001 ref8 pevn (ref14) 2007; 6505 fridrich (ref19) 2006; 6072 kodovsk (ref16) 2008 xuan (ref12) 2005; 3727 ref3 ref6 fridrich (ref4) 2004; 5306 bhme (ref7) 2008 upham (ref24) 0 greenspun (ref38) 0 latham (ref23) 0 cancelli (ref32) 2008 ker (ref5) 2005; 3727  | 
    
| References_xml | – year: 1998 ident: ref21 publication-title: A tutorial on support vector regression – year: 2001 ident: ref28 article-title: Defending against statistical steganalysis publication-title: Proc ACM Symp Applied Computing 10th USENIX Security Symp – volume: 2137 start-page: 289 year: 2001 ident: ref20 article-title: High capacity despite better steganalysis (F5 - A steganographic algorithm) publication-title: Proc 4th Int Workshop Information Hiding doi: 10.1007/3-540-45496-9_21 – volume: 5306 start-page: 23 year: 2004 ident: ref4 article-title: On estimation of secret message length in LSB steganography in spatial domain publication-title: Proc SPIE Electronic Imaging Security Steganography and Watermarking of Multimedia Contents VI doi: 10.1117/12.521350 – volume: 2939 start-page: 154 year: 2003 ident: ref25 article-title: Model-based steganography publication-title: Proc 2nd Int Workshop Digital Watermarking doi: 10.1007/978-3-540-24624-4_12 – volume: 3727 start-page: 296 year: 2005 ident: ref5 article-title: A general framework for structural analysis of LSB replacement publication-title: Proc 7th Int Workshop Information Hiding doi: 10.1007/11558859_22 – year: 2001 ident: ref22 publication-title: Learning With Kernels Support Vector Machines Regularization Optimization and Beyond (Adaptive Computation and Machine Learning) – year: 0 ident: ref34 – year: 2008 ident: ref16 article-title: Influence of embedding strategies on security of steganographic methods in the JPEG domain publication-title: Proc SPIE Electronic Imaging Security Forensics Steganography and Watermarking of Multimedia Contents X doi: 10.1117/12.759147 – start-page: 25 year: 2005 ident: ref35 article-title: LSB steganalysis based on higher-order statistics publication-title: Proc ACM Workshop on Multimedia Security doi: 10.1145/1073170.1073176 – volume: 6072 start-page: 59 year: 2006 ident: ref31 article-title: A two-factor error model for quantitative steganalysis publication-title: Proc SPIE Security Steganography and Watermarking of Multimedia Contents VII – volume: 6072 start-page: 1w year: 2006 ident: ref19 article-title: Matrix embedding for large payloads publication-title: Proc SPIE Security Steganography and Watermarking of Multimedia Contents VII – volume: 3677 start-page: 119 year: 2005 ident: ref30 article-title: A graph-theoretic approach to steganography publication-title: Proc 9th IFIP TC-6 TC-11 Int Conf Communications and Multimedia Security (CMS 2005) – ident: ref26 doi: 10.1007/978-3-540-74124-4_21 – ident: ref11 doi: 10.1109/TIFS.2005.863485 – volume: 6819 start-page: 5-1 year: 2008 ident: ref39 article-title: Revisiting weighted stego-image steganalysis publication-title: Proc SPIE Electronic Imaging Security Forensics Steganography and Watermarking of Multimedia Contents X – ident: ref6 doi: 10.1007/978-3-540-77370-2_25 – ident: ref27 doi: 10.1145/1288869.1288872 – ident: ref10 doi: 10.1007/978-3-642-18405-5_22 – year: 0 ident: ref38 – volume: 6072 start-page: 1 year: 2006 ident: ref33 article-title: New blind steganalysis and its implications publication-title: Proc SPIE Security Steganography and Watermarking of Multimedia Contents VII – ident: ref37 doi: 10.2307/2347973 – year: 0 ident: ref23 publication-title: Steganography – ident: ref29 doi: 10.1007/s00530-005-0194-3 – ident: ref3 doi: 10.1145/952532.952595 – year: 2009 ident: ref18 article-title: From blind to quantitative steganalysis publication-title: Proc SPIE Electronic Imaging Security Steganography Watermarking of Multimedia Contents VI – start-page: 178 year: 2008 ident: ref7 article-title: Weighted stego-image steganalysis for JPEG covers publication-title: Proc 10th Int Workshop Information Hiding doi: 10.1007/978-3-540-88961-8_13 – ident: ref8 doi: 10.1007/978-3-540-88961-8_12 – volume: 4437 start-page: 249 year: 2006 ident: ref13 article-title: A Markov process based approach to effective attacking JPEG steganography publication-title: Proc 8th Int Workshop Information Hiding doi: 10.1007/978-3-540-74124-4_17 – volume: 2578 start-page: 355 year: 2002 ident: ref2 article-title: Detection of LSB steganography via sample pair analysis publication-title: Proc 5th Int Workshop Information Hiding doi: 10.1007/3-540-36415-3_23 – year: 2008 ident: ref36 publication-title: Improved Statistical Steganalysis Using Models of Heterogeneous Cover Signals – ident: ref15 doi: 10.1145/1597817.1597831 – volume: 5681 start-page: 595 year: 2005 ident: ref9 article-title: Maximum likelihood estimation of secret message length embedded using <formula formulatype="inline"><tex Notation="TeX">$\pm k$</tex></formula> steganography in spatial domain publication-title: Proc SPIE Security Steganography and Watermarking of Multimedia Contents VII doi: 10.1117/12.584426 – year: 0 ident: ref24 publication-title: JSteg source – year: 2008 ident: ref32 article-title: Detection of <formula formulatype="inline"><tex Notation="TeX">$\pm {1}$</tex></formula> steganography based on the amplitude of histogram local extrema publication-title: Proc IEEE Int Conf Image Processing (ICIP) – ident: ref17 doi: 10.1109/ICME.2006.262792 – volume: 6505 start-page: 3 1 year: 2007 ident: ref14 article-title: Merging Markov and DCT features for multi-class JPEG steganalysis publication-title: Proc SPIE Electronic Imaging Security Steganography and Watermarking of Multimedia Contents IX – volume: 3727 start-page: 262 year: 2005 ident: ref12 article-title: Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions publication-title: Proc 7th Int Workshop Information Hiding doi: 10.1007/11558859_20 – ident: ref1 doi: 10.1007/s00530-003-0100-9  | 
    
| SSID | ssj0044168 | 
    
| Score | 2.2375388 | 
    
| Snippet | A quantitative steganalyzer is an estimator of the number of embedding changes introduced by a specific embedding operation. Since for most algorithms the... | 
    
| SourceID | proquest crossref ieee  | 
    
| SourceType | Aggregation Database Enrichment Source Index Database Publisher  | 
    
| StartPage | 445 | 
    
| SubjectTerms | Accuracy Algorithms Blind steganalysis Blinds Construction Feature extraction Forensic engineering Kernel Mathematical analysis message length estimation Messages Q factor quantitative steganalysis Regression Support vector machines Training Transform coding Vectors (mathematics)  | 
    
| Title | From Blind to Quantitative Steganalysis | 
    
| URI | https://ieeexplore.ieee.org/document/6081932 https://www.proquest.com/docview/927675423 https://www.proquest.com/docview/1019651207  | 
    
| Volume | 7 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1556-6021 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0044168 issn: 1556-6013 databaseCode: RIE dateStart: 20060101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB7Ukx58reL6ooIgiF3bZidpjyouKijI7oK3kiapB7UVbS_-eidtuoiKeCs0TUsmM_OlM_MNwKEObPAn174RPPeHCtGPyU35msfKxpGioCmkvb3jV9PhzQM-zMHJrBbGGNMkn5mBvWxi-bpUtf1Vdsqt_2JkcOdFzNtarc7qkldvy94QuU-HDOYimGGQnE6uR-OWrJPwNya2v8cXH9Q0VflhiRv3MlqB2-7D2qySp0FdZQP18Y2z8b9fvgrLDmd6Z-3GWIM5U6zDStfDwXMqvQ5LXwgJe3A0eitfvHOCntqrSu--lkVThEYm0RtX5lE6CpMNmI4uJxdXvmul4CsWYeWjUGEWKiYy0miFkeGhDAwmSgqNjHNErVluMlRMoZCZFCYyWmuUechoLNuEhaIszBZ4JMWcQEYuMdZDoWWWSxNksczJ8dMc2IegW9xUOZ5x2-7iOW3OG0GSWnmkVh6pk0cfjmePvLYkG38N7tn1nQ10S9uHnU6CqVPD9zSJLFcNIcY-HMzukv7YoIgsTFm_2xS3hBPqCcT27xPvwCK9PmqzdXZhoXqrzR4BkSrbb3bgJ9ZO2H8 | 
    
| linkProvider | IEEE | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB5ED-rBt7g-KwiC2N226aTbo4rL-lhBXMFbSZPUg9qKthd_vZM2XURFvBWahpDJzHzpzHwDcKA8E_zJlKsjnrmhRHT75KZcxfvSxJECry6kHd3w4X14-YAPU3A8qYXRWtfJZ7prHutYvipkZX6V9bjxX4wM7gyGYYhNtVZrd8mvN4VviNylawazMUzfi3vji8FdQ9dJCBxj0-Hjixeq26r8sMW1gxkswqhdWpNX8tStyrQrP76xNv537UuwYJGmc9IcjWWY0vkKLLZdHByr1Csw_4WScBUOB2_Fi3NK4FM5ZeHcViKvy9DIKDp3pX4UlsRkDe4H5-OzoWubKbiSBVi6GEk_9SWLUtJpiYHmvvA0xlJEChnniEqxTKcomcRIpCLSgVZKoch8RmPZOkznRa43wCE5ZgQzMoF9FUZKpJnQXtoXGbl-mgM74LWbm0jLNG4aXjwn9Y3DixMjj8TII7Hy6MDR5JPXhmbjr8GrZn8nA-3WdmCrlWBiFfE9iQPDVkOYsQP7k7ekQSYsInJdVO8myS3mhHu8aPP3ifdgdjgeXSfXFzdXWzBHSwma3J1tmC7fKr1DsKRMd-vT-AlVtdvM | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=From+Blind+to+Quantitative+Steganalysis&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Pevny%2C+Tom%C3%A1%C5%A1&rft.au=Fridrich%2C+Jessica&rft.au=Ker%2C+Andrew+D.&rft.date=2012-04-01&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=7&rft.issue=2&rft.spage=445&rft.epage=454&rft_id=info:doi/10.1109%2FTIFS.2011.2175918&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TIFS_2011_2175918 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon |