Table 5: Confusion matrix of the multi-class classifier for the testing set. The leftmost column contains the embedding
algorithm. The remaining columns show the results of the classification of HUBFIRE and the model proposed by Pevný
and Fridrich (2006).
HUBFIRE (Pevný and Fridrich, 2006)
Cover LSB JPHS MBS Cover LSB JPHS MBS
Cover 70.67% 26.67% 2.67% 0.00% 96.45% 0.12% 0.20% 1.44%
LSB 0.00% 99.33% 0.67% 0.00% 0.08% 99.08% 0.53% 0.08%
JPHS 0.00% 0.67% 99.33% 0.00% 0.20% 0.12%
98.32
%
0.56%
MBS 0.00% 0.00% 0.00% 100.00% 1.44% 1.56% 0.72% 94.44%
REFERENCES
Bhat, H, V., Krishna, S., Shenoy, P, D., Venugopal, K, R.,
Patnaik, L, M., 2010. JPEG Steganalysis using HBCL
Statistics and FR Index. To be published in the
Proceedings of Pacific Asia Workshop on Intelligence
and Security Informatics.
Burges, C., 1998. A Tutorial on Support Vector Machines
for Pattern Recognition. Data Mining and Knowledge
Discovery, 2, 121–167.
Boser, B., Guyon, I., Vapnik, V., 1992. A Training
Algorithm for Optimal Margin Classifiers.
Proceedings of the Fifth Annual Workshop on
Computational Learning Theory, 5, 144–152.
Chen, Ming.,Zhang, Ru., Niu, Xinxin., Yang, Yixian.,
2006. Analysis of Current Steganography Tools:
Classification & Features. Proceedings of the 2006
International Conference on Intelligent Information
Hiding and Multimedia Signal Processing, 384-387.
Cristianini, N., Shawe-Taylor, J., 2000. An Introduction
to Support Vector Machines, Cambridge University
Press.
Herve, Jegou., Matthijs, Douze., Cordelia, Schmid., 2008.
Hamming Embedding and Weak Geometry
Consistency for Large Scale Image Search.
Proceedings of the Tenth European Conference on
Computer Vision, 304-317.
Hsu, Chih-Wei., Lin, Chih-Jen., 2002. A Comparison of
Methods for Multiclass Support Vector Machines.
IEEE Transactions on Neural Networks, 415-425.
Joachims, T., 1998. Text categorization with support
vector machines: Learning with many relevant
features. Proceeding of the Tenth European
Conference on Machine Learning (ECML), 137–142.
Kristin, P, Bennet., Campbell, Colin., 2000. Support
Vector Machines: Hype or Hallelujah ? SIGKDD
Explorations, 2, 1-13.
Lyu, Siwei., Farid, Hany., 2002. Detecting Hidden
Messages Using Higher-Order Statistics and Support
Vector Machines. Proceedings of the Fifth
International Workshop on Information Hiding, 2578,
340-354.
Miche, Yoan., Bas, Patrick., Lendasse, Amaury., Jutten,
Christian., Simula, Olli., 2009. Reliable Steganalysis
using a Minimum Set of Samples and Features.
EURASIP Journal of Information Security.
Pevný, Tomas., Fridrich, J., 2006. Multi-class Blind
Steganalysis for JPEG Images, Computer Science and
Software Engineering , 939-942.
Pevný, Tomas., Fridrich, J., 2007. Merging Markov and
DCT features for Multi-class JPEG Steganalysis,
Proceedings SPIE - Electronic Imaging, Security,
Steganography, and Watermarking of Multimedia
Contents, 03–04.
Pfitzmann, B., 1996. Information Hiding Terminology.
Proceedings of the First International Workshop on
Information Hiding, 347-350.
Sallee, P., Model-based Methods for Steganography and
Steganalysis, 2005. International Journal of Image
Graphics, 167–190.
Ullerich, Christian., Westfeld, Andreas., 2008. Weakness
of MB2. Digital Watermarking, 127-142.
Vapnik, N, Vladimir., 1995. Nature of Statistical Learning
Theory, Springer.
Vapnik, N, Vladimir., 1998. Statistical Learning Theory,
York: Wiley.
Xuezeng, Pan., Li, Zhuo., Jian, Chen., Jiang, Xiaoning.,
Zeng, Xianting., 2008. A New Blind Steganalysis
Method for JPEG Images. International Conference
on Computer Science and Software Engineering. 939-
942.
SECRYPT 2010 - International Conference on Security and Cryptography
452