Steganalysis of enhanced BPCS steganography using the Hilbert-Huang transform based sequential analysis

Shunquan Tan, Jiwu Huang, Yun Q. Shi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

In this paper, we present a steganalytic method to attack the enhanced BPCS steganography (for short EBPCS) proposed by Niimi et al. The key element of the method is analysis of the bitplane-block complexity difference sequences between stego images and cover images based on Hilbert-Huang transform. The Hilbert transform based characteristic vectors are constructed via empirical mode decomposition of the sequences and the support vector machine classifier is used for classification. Experimental results have demonstrated effectiveness of the proposed steganalytic method in spatial domain images and JPEG2000 format images. According to our best knowledge, this method is the first successful attack of EBPCS and can be effectively used in spatial domain and frequency domain (especially DWT/JPEG2000) images.

Original languageEnglish (US)
Title of host publicationDigital Watermarking - 6th International Workshop, IWDW 2007, Proceedings
Pages112-126
Number of pages15
DOIs
StatePublished - 2008
Event6th International Workshop on Digital Watermarking, IWDW 2007 - Guangzhou, China
Duration: Dec 3 2007Dec 5 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5041 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other6th International Workshop on Digital Watermarking, IWDW 2007
Country/TerritoryChina
CityGuangzhou
Period12/3/0712/5/07

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Steganalysis of enhanced BPCS steganography using the Hilbert-Huang transform based sequential analysis'. Together they form a unique fingerprint.

Cite this