Optimizing Pixel Predictors for Steganalysis

Size: px
Start display at page:

Download "Optimizing Pixel Predictors for Steganalysis"

Transcription

1 Optimizing Pixel Predictors for Steganalysis Vojtěch Holub and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York IS&T / SPIE 2012, San Francisco, CA

2 Steganography The art of secret communication message m message m cover X Emb(X,m,k) stego Y Ext(Y,k) key k channel with passive warden key k Steganography by cover modification X is slightly modified to Y to convey a secret message (by flipping LSBs, changing DCT coefficients,...). Goal: make the embedding changes statistically undetectable. Steganalysis Warden s job: tell whether a cover or stego object is sent. Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 2 of 18

3 Pixel Predictor Warden represents images by features computed from noise residuals and builds the detector as a classifier in the feature space. Noise residual Narrower dynamic range than x ij Increased SNR Predictor Estimates the value of pixel x ij from its neighborhood E.g., by fitting linear or quadratic polynomials, etc. r ij = x ij Pred(x ij ) Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 3 of 18 i xij j

4 Detection Framework 1 Computing residual: r ij = x ij Pred(x ij ) ( 2 Quantization and truncation: r ij round q R,T = 2. Thus, r ij { 2,1,0,1,2} trunc T ( rij q 3 Forming 4D co-occurrence matrix: C = C (h) + C (v) )), C (h) d 1 d 2 d 3 d 4 = {#(i,j) r ij = d 1,r ij+1 = d 2,r ij+2 = d 3,r ij+3 = d 4 } dim(c) = 5 4 = Symmetrization of C Dim. reduction Sign-symmetry: C d1 d 2 d 3 d 4 C d1 d 2 d 3 d 4 + C d1 d 2 d 3 d 4 Directional symmetry: C d1 d 2 d 3 d 4 C d1 d 2 d 3 d 4 + C d4 d 3 d 2 d 1 5 Ensemble classifier [Kodovský-2011] Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 4 of 18

5 Predictor Parametrization (structure) Each predictor will be parametrized, for instance i xij = K = 0 d c d 0 d b a b d c a 0 a c d b a b d 0 d c d 0 j Parameters a,b,c,d Sum over all elements must equal to 1 Free parameters b,c,d since a can be computed from the rest Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 5 of 18

6 Optimization Methodology Optimized parameters Free parameters of the predictor structure Quantization step q Objective function L2R_L2LOSS (margin width of linear SVM) proposed by [Filler-2011] Problematic 1 P E = min P 2 (P FA + P MD (P FA )) calculated using ensemble FA classifier on a subset of 2000 images. 50 Optimization method Nelder-Mead Derivative-free simplex-reflection algorithm 40 K = b a b a 0 a b a b Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 6 of 18 PE (%) q b

7 Cover Sources Three image databases BOSSbase ver [BOSS-2010] 9074 images, grayscale, 7 cameras, resized to NRCS images, grayscale, NRCS scans, two cropped from the center of every image LEICA images, grayscale, Leica M9, 18 Mpixels, two cropped from the center of every image Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 7 of 18

8 Steganographic Algorithms Three stego algorithms HUGO (Highly Undetectable stego) [Pevný et al.-2010] EA (Edge-Adaptive) [Luo et al.-2010] ±1 embedding with optimal ternary coder Two payloads 0.1 bits per pixel (bpp) 0.4 bits per pixel (bpp) Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 8 of 18

9 Optimizing the 3 3 Predictor We optimized symmetric 3 3 predictors with structure b a b a 0 a b a b Predictor parameters: (a, b), q (b = free parameter, q = quantization step) Initial predictor parameters for optimization: Optimal cover predictor in the LSE sense q = 1.5 Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 9 of 18

10 Reference predictors Predictor derived by [Böhme&Ker-2008]: KB = Optimal 3 3 cover predictor in the LSE sense (LSE) Quantization q selected as best q {1,1.25,1.5,1.75,2} Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 10 of 18

11 Optimization Results RAW BOSSbase NRCS512 LEICA512 Alg. Pld. Ker (a, b), q P E (a, b), q P E (a, b), q P E HUGO 0.1 KB (0.50, -0.25), (0.50, -0.25), (0.50, -0.25), LSE (0.45, -0.20), (0.51, -0.26), (0.48, -0.23), Opt (0.49, -0.24), (0.60, -0.35), (0.57, -0.32), KB (0.50, -0.25), (0.50, -0.25), (0.50, -0.25), LSE (0.45, -0.20), (0.51, -0.26), (0.48, -0.23), Opt (0.51, -0.26), (0.37, -0.12), (0.38, -0.13), EA 0.1 KB (0.50, -0.25), (0.50, -0.25), (0.50, -0.25), LSE (0.45, -0.20), (0.51, -0.26), (0.48, -0.23), Opt (0.46, -0.21), (0.67, -0.42), (0.37, -0.12), KB (0.50, -0.25), (0.50, -0.25), (0.50, -0.25), LSE (0.45, -0.20), (0.51, -0.26), (0.48, -0.23), Opt (0.26, -0.01), (0.39, -0.14), (0.40, -0.15), ±1 0.1 KB (0.50, -0.25), (0.50, -0.25), (0.50, -0.25), LSE (0.45, -0.20), (0.51, -0.26), (0.48, -0.23), Opt (0.55, -0.30), (0.67, -0.42), (0.56, -0.31), KB (0.50, -0.25), (0.50, -0.25), (0.50, -0.25), LSE (0.45, -0.20), (0.51, -0.26), (0.48, -0.23), Opt (0.52, -0.27), (0.73, -0.48), (0.32, -0.07), Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 11 of 18

12 Interpretation of EA Results (1/2) EA, BOSSbase, payload 0.4 bpp ( ) KB = P E = 17.93% ( ) Opt = P E = 13.74% Why? Message is embedded only to horizontal/vertical pixel pairs depending only their value difference. = Adding diagonal neighbors does not improve steganalysis. Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 12 of 18

13 EA algorithm Interpretation of EA Results (2/2) Image is divided into square blocks of a randomly selected size B B, B {1,4,8,12} Every block is randomly rotated by d degrees, d {0,90,180,270} Embedding into two horizontally neighboring pixels (x i,j,x i,j+1 ),i odd, where x i,j x i,j+1 > T. At most one value from the pair is modified. Blocks are rotated back to their original direction. B = 4 rot. 180 rot. 90 Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 13 of 18

14 Interpretation of LEICA512 Results ±1, LEICA512, payload 0.4 bpp S = ( ) 0.25 KB = ( ) Opt = P E = 10.49% P E = 8.28% b a b a 0 a b a b LEICA512 images are crops of 18 Mpix originals = Strong dependencies among neighboring pixels = [Böhme-2008] recommends optimal LSE predictors for steganalysis satisfying a b = 1 2ρ, where ρ is the correlation among neighboring pixels. = In contrast, our study suggests that a b should increase Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 14 of 18

15 JPEG Results RAW images compressed to 80% quality JPEG, then decompressed. Predictor optimization did not improve performance, why? KB BOSSbase HUGO EA ±1 RAW JPEG PE (%) Payload (bpp) Change Rate (%) Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 15 of 18

16 JPEG Results RAW images compressed to 80% quality JPEG, then decompressed. Predictor optimization did not improve performance, why? KB NRCS512 HUGO EA ±1 RAW JPEG PE (%) Payload (bpp) Change Rate (%) Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 15 of 18

17 JPEG Results RAW images compressed to 80% quality JPEG, then decompressed. Predictor optimization did not improve performance, why? KB LEICA512 HUGO EA ±1 RAW JPEG PE (%) Payload (bpp) Change Rate (%) Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 15 of 18

18 Interpretation of JPEG Results 1 JPEG compression nearly empties some co-occurrence bins. 2 Embedding repopulates them from neighboring bins. Example: ±1 embedding, BOSSbase 80, payload 0.4 bpp avg. RAW bin avg. JPEG bin JPEG P E k best bin Cover Stego Cover Stego indiv. merged 1. (1, 1, 2, 1), (1, 1, 0, 0), (2, 0, 0, 0), Detection exploits a cover-source singularity rather than effects of embedding. Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 16 of 18

19 Conditional optimization Predictor optimization with respect to already existing predictors cascading Example 1: HUGO, BOSSbase, 0.4 bpp Structure Optimized predictor, q PE indiv Dim ( ) ( ) a 0 a , ( ) ( ) a 0 b , P merged E The second-order difference is optimally supplemented by the first-order difference Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 17 of 18

20 Conditional optimization Predictor optimization with respect to already existing predictors cascading Example 2: HUGO, BOSSbase, 0.4 bpp Structure Optimized predictor, q PE indiv ( ) ( ) b a b a 0 a b a b ( c b c a 0 a c b c ( c b c a 0 a c b c ) ( ) ( P merged E Dim, ), ), Result comparable with HUGO BOSS winners only with 507 features Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 17 of 18

21 Summary Predictor optimization for covers is a different problem than for a binary detection (cover/stego) within a framework. Advantages Noticeable improvement for some cover sources (LEICA512) and steganographic algorithms (EA). Conditional optimization to improve the performance dimensionality ratio or to build a rich model. Limitations Other Optimization only over a small parameter vector (e.g., up to dimension of five) due to noisy objective function. Astonishingly accurate detection in decompressed JPEGs (future direction). Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 18 of 18

Optimizing Pixel Predictors for Steganalysis

Optimizing Pixel Predictors for Steganalysis Optimizing Pixel Predictors for Steganalysis Vojtěch Holub and Jessica Fridrich Department of C, SUNY Binghamton, NY, USA {vholub1,fridrich}@binghamton.edu ABSTRACT A standard way to design steganalysis

More information

Steganalysis of Content-Adaptive Steganography in Spatial Domain

Steganalysis of Content-Adaptive Steganography in Spatial Domain Steganalysis of Content-Adaptive Steganography in Spatial Domain Jessica Fridrich, Jan Kodovský, Vojtěch Holub, and Miroslav Goljan Department of ECE, SUNY Binghamton, NY, USA {fridrich,jan.kodovsky,vholub1,mgoljan}@binghamton.edu

More information

Rich Models for Steganalysis of Digital Images

Rich Models for Steganalysis of Digital Images 1 Rich Models for Steganalysis of Digital Images Jessica Fridrich, Member, IEEE and Jan Kodovský Abstract We describe a novel general strategy for building steganography detectors for digital images. The

More information

Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital Images in Spatial Domain Ningbo Li, Pan Feng, Liu Jia

Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital Images in Spatial Domain Ningbo Li, Pan Feng, Liu Jia 216 International Conference on Information Engineering and Communications Technology (IECT 216) ISBN: 978-1-69-37- Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital

More information

Modern Steganalysis Can Detect YASS

Modern Steganalysis Can Detect YASS Jan Kodovský, Tomáš Pevný, Jessica Fridrich January 18, 2010 / SPIE 1 / 13 YASS Curriculum Vitae Birth Location: University of California, Santa Barbara Birth Date: More than 2 years ago [Solanki-2007],

More information

Breaking the OutGuess

Breaking the OutGuess Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,

More information

Ivans Lubenko & Andrew Ker

Ivans Lubenko & Andrew Ker Ivans Lubenko & Andrew Ker lubenko@ comlab.ox.ac.uk adk@comlab.ox.ac.uk Oxford University Computing Laboratory SPIE/IS&T Electronic Imaging, San Francisco 25 January 2011 Classification in steganalysis

More information

Selection-Channel-Aware Rich Model for Steganalysis of Digital Images

Selection-Channel-Aware Rich Model for Steganalysis of Digital Images Selection-Channel-Aware Rich Model for Steganalysis of Digital Images Tomáš Denemark, Vahid Sedighi, Vojtěch Holub Department of ECE Binghamton University Binghamton, NY 13902-6000 {tdenema1,vsedigh1}@binghamton.edu

More information

arxiv: v1 [cs.mm] 2 Mar 2017

arxiv: v1 [cs.mm] 2 Mar 2017 This is a preprint of the paper: arxiv:1703.00817v1 [cs.mm] 2 Mar 2017 Daniel Lerch-Hostalot, David Megías, LSB matching steganalysis based on patterns of pixel differences and random embedding, Computers

More information

With ever-increasing growth of electronic

With ever-increasing growth of electronic Journal of Advances in Computer Engineering and Technology, 3(2) 2017 Parallelization of Rich Models for Steganalysis of Digital Images using a CUDA-based Approach Mahmoud Kazemi 1, Meysam Mirzaee 2, Reza

More information

Toss that BOSSbase, Alice!

Toss that BOSSbase, Alice! Toss that BOSSbase, Alice! Vahid Sedighi, Jessica Fridrich, Rémi Cogranne To cite this version: Vahid Sedighi, Jessica Fridrich, Rémi Cogranne. Toss that BOSSbase, Alice!. IS&T intl symposium on Electronic

More information

Quantitative and Binary Steganalysis in JPEG: A Comparative Study

Quantitative and Binary Steganalysis in JPEG: A Comparative Study Quantitative and Binary Steganalysis in JPEG: A Comparative Study Ahmad ZAKARIA LIRMM, Univ Montpellier, CNRS ahmad.zakaria@lirmm.fr Marc CHAUMONT LIRMM, Univ Nîmes, CNRS marc.chaumont@lirmm.fr Gérard

More information

Steganalysis of Overlapping Images

Steganalysis of Overlapping Images Steganalysis of Overlapping Images James M. Whitaker and Andrew D. Ker Oxford University Department of Computer Science, Parks Road, Oxford OX1 3QD, England. ABSTRACT We examine whether steganographic

More information

A Study on Different JPEG Steganograhic Schemes

A Study on Different JPEG Steganograhic Schemes A Study on Different JPEG Steganograhic Schemes Alphy Ros Mathew, Sreekumar K Department of Computer Science, College of Engineering,Ponjar, Cochin University of Science And Technology Kottayam,Kerala,India

More information

Ventsislav Chonev & Andrew Ker

Ventsislav Chonev & Andrew Ker Ventsislav Chonev & Andrew Ker ventsislav.chonev@oriel.ox.ac.uk adk@comlab.ox.ac.uk- Oxford University Computing Laboratory SPIE/IS&T Electronic Imaging, San Francisco 24 January 2011 Consider some fixed

More information

Calibration Revisited

Calibration Revisited Jan Kodovský, Jessica Fridrich September 7, 2009 / ACM MM&Sec 09 1 / 16 What is Calibration? 2002 - Calibration introduced (attack on F5) Part of feature extraction procedure for blind steganalysis Idea:

More information

LOCAL TERNARY PATTERN BASED ON PATH INTEGRAL FOR STEGANALYSIS. Qiuyan Lin, Jiaying Liu and Zongming Guo

LOCAL TERNARY PATTERN BASED ON PATH INTEGRAL FOR STEGANALYSIS. Qiuyan Lin, Jiaying Liu and Zongming Guo LOCAL TERNARY PATTERN BASED ON PATH INTEGRAL FOR STEGANALYSIS Qiuyan Lin, Jiaying Liu and Zongming Guo Institute of Computer Science and Technology, Peking University, Beijing 87, China ABSTRACT The least

More information

A General Framework for the Structural Steganalysis of LSB Replacement

A General Framework for the Structural Steganalysis of LSB Replacement A General Framework for the Structural Steganalysis of LSB Replacement Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory 7 th Information Hiding

More information

STEGANOGRAPHY is a technique for covert communication,

STEGANOGRAPHY is a technique for covert communication, This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 0.09/TCSVT.206.2587388,

More information

where ρ i (x, y i ) denotes the cost of changing the i-th cover element from x i to y i. With the syndrome coding, the minimal

where ρ i (x, y i ) denotes the cost of changing the i-th cover element from x i to y i. With the syndrome coding, the minimal 814 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 5, MAY 2014 Uniform Embedding for Efficient JPEG Steganography Linjie Guo, Student Member, IEEE, Jiangqun Ni, Member, IEEE, and

More information

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting

More information

Deep Learning Regressors for Quantitative Steganalysis

Deep Learning Regressors for Quantitative Steganalysis Deep Learning Regressors for Quantitative Steganalysis Mo Chen, Mehdi Boroumand, and Jessica Fridrich, Department of ECE, SUNY Binghamton, NY, USA, mochen8@gmail.com, {mboroum1, fridrich}@binghamton.edu

More information

On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography

On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography Ainuddin Wahid Abdul Wahab, Johann A Briffa and Hans Georg Schaathun Department of Computing, University of Surrey Abstract.

More information

On dangers of cross-validation in steganalysis

On dangers of cross-validation in steganalysis Jan Kodovský jan.kodovsky@binghamton.edu Abstract Modern steganalysis is a combination of a feature space design and a supervised binary classification. In this report, we assume that the feature space

More information

Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes

Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes Multimed Tools Appl (2016) 75:13557 13583 DOI 10.1007/s11042-015-2759-2 Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes Xiangyang Luo 1,2 & Xiaofeng Song 1,2

More information

A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis

A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.27-31 A Blind Steganalysis on JPEG Gray Level

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

arxiv: v1 [cs.mm] 2 Mar 2017

arxiv: v1 [cs.mm] 2 Mar 2017 This is a preprint of the paper: arxiv:1703.00796v1 [cs.mm] 2 Mar 2017 Daniel Lerch-Hostalot, David Megías, Unsupervised steganalysis based on artificial training sets, Engineering Applications of Artificial

More information

Alpha-trimmed Image Estimation for JPEG Steganography Detection

Alpha-trimmed Image Estimation for JPEG Steganography Detection Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Alpha-trimmed Image Estimation for JPEG Steganography Detection Mei-Ching Chen,

More information

Defining Cost Functions for Adaptive Steganography at the Microscale

Defining Cost Functions for Adaptive Steganography at the Microscale Defining Cost Functions for Adaptive Steganography at the Microscale Kejiang Chen, Weiming Zhang, Hang Zhou, Nenghai Yu CAS Key Laboratory of Electromagnetic Space Information University of Science and

More information

Merging Markov and DCT Features for Multi-Class JPEG Steganalysis

Merging Markov and DCT Features for Multi-Class JPEG Steganalysis Merging Markov and DCT Features for Multi-Class JPEG Steganalysis Tomáš Pevný a, Jessica Fridrich b a Department of Computer Science, Binghamton University, State University of New York b Department of

More information

14 th ACM Multimedia & Security Workshop, Warwick University, 6 Sept 2012

14 th ACM Multimedia & Security Workshop, Warwick University, 6 Sept 2012 adk@ cs.ox.ac.uk Department of Computer Science, Oxford University pevnak@ gmail.com Agent Technology Center, Czech Technical University in Prague 14 th ACM Multimedia & Security Workshop, Warwick University,

More information

What Makes the Stego Image Undetectable?

What Makes the Stego Image Undetectable? What Makes the Stego Image Undetectable? Songtao Wu, Yan Liu Department of Computing The Hong Kong Polytechnic University Hong Kong, P. R. China {csstwu, csyliu} @comp.polyu.edu.hk Shenghua Zhong College

More information

DESIGN OF HIGH SPEED STEGOSYSTEM BASED ON TRELLIS CODES JOINTLY WITH GENERALISED VITERBI ALGORITHM *

DESIGN OF HIGH SPEED STEGOSYSTEM BASED ON TRELLIS CODES JOINTLY WITH GENERALISED VITERBI ALGORITHM * International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 3, No. 2, pp. 5, 26 DESIGN OF HIGH SPEED STEGOSYSTEM BASED ON TRELLIS CODES JOINTLY WITH GENERALISED

More information

Adaptive Pixel Pair Matching Technique for Data Embedding

Adaptive Pixel Pair Matching Technique for Data Embedding Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Image Steganography (cont.)

Image Steganography (cont.) Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares

More information

Adversarial Examples Against Deep Neural Network based Steganalysis

Adversarial Examples Against Deep Neural Network based Steganalysis Adversarial Examples Against Deep Neural Network based Steganalysis Yiwei Zhang zywvvd@mail.ustc.edu.cn Jiayang Liu 122937169@qq.com Weiming Zhang zhangwm@ustc.edu.cn Yujia Liu yjcaihon@mail.ustc.edu.cn

More information

Evolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography

Evolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) Evolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography

More information

IMAGE steganography is the science and art to conceal. Deep Learning Hierarchical Representations for Image Steganalysis

IMAGE steganography is the science and art to conceal. Deep Learning Hierarchical Representations for Image Steganalysis 1 Deep Learning Hierarchical Representations for Image Steganalysis Jian Ye, Jiangqun Ni, Member, IEEE, Yang Yi Abstract Nowadays the prevailing detectors of steganographic communication in digital images

More information

Double-Compressed JPEG Detection in a Steganalysis System

Double-Compressed JPEG Detection in a Steganalysis System Annual ADFSL Conference on Digital Forensics, Security and Law 2012 May 30th, 10:30 AM Double-Compressed JPEG Detection in a Steganalysis System Jennifer L. Davidson Department of Mathematics, Iowa State

More information

Deep Learning Hierarchical Representations for Image Steganalysis Jian Ye, Jiangqun Ni, Member, IEEE, and Yang Yi

Deep Learning Hierarchical Representations for Image Steganalysis Jian Ye, Jiangqun Ni, Member, IEEE, and Yang Yi IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 12, NO. 11, NOVEMBER 2017 2545 Deep Learning Hierarchical Representations for Image Steganalysis Jian Ye, Jiangqun Ni, Member, IEEE, and Yang

More information

Universal distortion function for steganography in an arbitrary domain

Universal distortion function for steganography in an arbitrary domain Holub et al. EURASIP Journal on Information Security 2014, 2014:1 RESEARCH Open Access Universal distortion function for steganography in an arbitrary domain Vojtěch Holub *, Jessica Fridrich and Tomáš

More information

Ensemble Classifiers for Steganalysis of Digital Media

Ensemble Classifiers for Steganalysis of Digital Media 1 Ensemble Classifiers for Steganalysis of Digital Media Jan Kodovský, Jessica Fridrich, Member, IEEE, and Vojtěch Holub Abstract Today, the most accurate steganalysis methods for digital media are built

More information

Multi-Class Detector of Current Steganographic Methods for JPEG Format

Multi-Class Detector of Current Steganographic Methods for JPEG Format 1 Multi-Class Detector of Current Steganographic Methods for JPEG Format Tomáš Pevný and Jessica Fridrich, IEEE member Abstract The aim of this paper is to construct a practical forensic steganalysis tool

More information

Compression-Compatible Fragile and Semi-Fragile Tamper Detection

Compression-Compatible Fragile and Semi-Fragile Tamper Detection Compression-Compatible Fragile and Semi-Fragile Tamper Detection Lisa M. Marvel George W. Hartwig, Jr. Charles Boncelet, Jr. Presentation by Peter Macko Motivation Direct Applications Establishing credibility

More information

AN EMBEDDING MECHANISM FOR NATURAL STEGANOGRAPHY AFTER DOWN-SAMPLING

AN EMBEDDING MECHANISM FOR NATURAL STEGANOGRAPHY AFTER DOWN-SAMPLING AN EMBEDDING MECHANISM FOR NATURAL STEGANOGRAPHY AFTER DOWN-SAMPLING Patrick Bas To cite this version: Patrick Bas. AN EMBEDDING MECHANISM FOR NATURAL STEGANOGRAPHY AFTER DOWN-SAMPLING. ICASSP, Mar 2017,

More information

J2: REFINEMENT OF A TOPOLOGICAL IMAGE STEGANOGRAPHIC METHOD

J2: REFINEMENT OF A TOPOLOGICAL IMAGE STEGANOGRAPHIC METHOD J2: REFINEMENT OF A TOPOLOGICAL IMAGE STEGANOGRAPHIC METHOD Richard E Newman, 1 Ira S Moskowitz 2 and Mahendra Kumar 1 1 CISE Department University of Florida Gainesville, FL 32611-6120 email: {nemo,makumar}@ciseufledu

More information

Feature Extraction and Analysis using Gabor Filter and Higher Order Statistics for the JPEG Steganography

Feature Extraction and Analysis using Gabor Filter and Higher Order Statistics for the JPEG Steganography Feature Extraction and Analysis using Gabor Filter and Higher Order Statistics for the JPEG Steganography SwagotaBera 1, Dr Monisha Sharma 2 and Dr Bikesh Singh 3 1 Department of Electronics & Telecommunication

More information

Detection of double-compression for applications in steganography

Detection of double-compression for applications in steganography 1 Detection of double-compression for applications in steganography Tomáš Pevný and Jessica Fridrich Abstract This paper presents a method for detection of double JPEG compression and a maximum likelihood

More information

Benchmarking steganographic and steganalysis techniques

Benchmarking steganographic and steganalysis techniques Benchmarking steganographic and steganalysis techniques Mehdi Kharrazi a, Husrev T. Sencar b Nasir Memon b a Department of Electrical and Computer Engineering b Department of Computer and Information Science

More information

STEGANALYSIS OF STEGOSTORAGE LIBRARY

STEGANALYSIS OF STEGOSTORAGE LIBRARY t m Mathematical Publications DOI: 10.1515/tmmp-2016-0034 Tatra Mt. Math. Publ. 67 (2016), 99 116 STEGANALYSIS OF STEGOSTORAGE LIBRARY Michala Gulášová Matúš Jókay ABSTRACT. The main goal of this research

More information

On Completeness of Feature Spaces in Blind Steganalysis

On Completeness of Feature Spaces in Blind Steganalysis On Completeness of Feature Spaces in Blind Steganalysis Jan Kodovský SUNY Binghamton Department of ECE Binghamton, NY 39-6 jan@kodovsky.com Jessica Fridrich SUNY Binghamton Department of ECE Binghamton,

More information

Tackling Android Stego Apps in the Wild

Tackling Android Stego Apps in the Wild Tackling Android Stego Apps in the Wild Wenhao Chen, Li Lin, Min Wu, and Jennifer Newman Iowa State University, Ames, IA, USA E-mail: {wenhaoc, llin, jlnewman}@iastate.edu University of Maryland, College

More information

Model Based Steganography with Precover

Model Based Steganography with Precover Model Based Steganography with Precover Tomáš Denemark and Jessica Fridrich, Department of ECE, SUNY Binghamton, NY, USA, {tdenema1,fridrich}@binghamtonedu Abstract It is widely recognized that steganography

More information

Calibration Revisited

Calibration Revisited Calibration Revisited Jan Kodovský SUNY Binghamton Department of ECE Binghamton, NY 1392-6 jan.kodovsky@binghamton.edu Jessica Fridrich SUNY Binghamton Department of ECE Binghamton, NY 1392-6 fridrich@binghamton.edu

More information

DETECTING STEGANOGRAPHY USING MULTI-CLASS CLASSIFICATION

DETECTING STEGANOGRAPHY USING MULTI-CLASS CLASSIFICATION Chapter 13 DETECTING STEGANOGRAPHY USING MULTI-CLASS CLASSIFICATION Benjamin Rodriguez and Gilbert Peterson Abstract When a digital forensics investigator suspects that steganography has been used to hide

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

Feature selection, statistical modeling and its applications to universal JPEG steganalyzer

Feature selection, statistical modeling and its applications to universal JPEG steganalyzer Graduate Theses and Dissertations Iowa State University Capstones, Theses and Dissertations 2009 Feature selection, statistical modeling and its applications to universal JPEG steganalyzer Jaikishan Jalan

More information

Information Cloaking Technique with Tree Based Similarity

Information Cloaking Technique with Tree Based Similarity Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

SECURITY ENHANCEMENT: STEGANO-CRYPTO USING CHOAS BASED Sblock EMBEDDING TECHNIQUE

SECURITY ENHANCEMENT: STEGANO-CRYPTO USING CHOAS BASED Sblock EMBEDDING TECHNIQUE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 8, August 2015,

More information

Steganalysis in the Presence of Watermarked Images

Steganalysis in the Presence of Watermarked Images 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing Steganalysis in the Presence of Watermarked Images Pham Hai Dang Le, Daniel Graf, and Matthias O.

More information

Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis

Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis Anindya Sarkar, Kaushal Solanki and B. S. Manjunath Department of Electrical and Computer Engineering, University

More information

Enhancing the Image Compression Rate Using Steganography

Enhancing the Image Compression Rate Using Steganography The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,

More information

A Parallel SRM Feature Extraction Algorithm for Steganalysis Based on GPU Architecture

A Parallel SRM Feature Extraction Algorithm for Steganalysis Based on GPU Architecture Computer Science and Information Systems 12(4):1345 1359 DOI: 10.2298/CSIS140815058C A Parallel SRM Feature Extraction Algorithm for Steganalysis Based on GPU Architecture Kaizhi Chen 1,2, Chenjun Lin

More information

A Steganography method for JPEG2000 Baseline System

A Steganography method for JPEG2000 Baseline System A Steganography method for JPEG2000 Baseline System P.Ramakrishna Rao M.Tech.,[CSE], Teaching Associate, Department of Computer Science, Dr.B.R.Ambedkar University, Etcherla Srikaulam, 532 410. Abstract

More information

Steganography Using Gibbs Random Fields

Steganography Using Gibbs Random Fields Steganography Using Gibbs Random Fields Tomáš Filler SUNY Binghamton Department of ECE Binghamton, NY 13902-6000 tomas.filler@binghamton.edu Jessica Fridrich SUNY Binghamton Department of ECE Binghamton,

More information

Image Steganography Technique By Using Braille Method of Blind People (LSBraille)

Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt

More information

A DWT Based Steganography Approach

A DWT Based Steganography Approach A DWT Based Steganography Approach EE604 Term Paper Instructor: Prof. Sumana Gupta Group No. 1 Group Members Anirudh Kumar Agrawal, 11907098 Pratik Likhar, 11531 Radhika Ravi, 11553 Introduction Image

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

NOWADAYS, the mainstream scheme of steganography. Adaptive Spatial Steganography Based on Probability-Controlled Adversarial Examples

NOWADAYS, the mainstream scheme of steganography. Adaptive Spatial Steganography Based on Probability-Controlled Adversarial Examples IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 1 Adaptive Spatial Steganography Based on Probability-Controlled Adversarial Examples Sai Ma, Qingxiao Guan, Xianfeng Zhao*, and Yaqi Liu arxiv:1804.02691v2

More information

Steganography and Steganalysis of JPEG Images

Steganography and Steganalysis of JPEG Images DEPARTMENT OF COMPUTER AND INFORMATION SCIENCES AND ENGINEERING PH.D. PROPOSAL Steganography and Steganalysis of JPEG Images Supervisory Committee: Author: Mahendra Kumar makumar@cise.ufl.edu Dr. Richard

More information

A Multi-Algorithm, High Reliability, Extensible Steganalyzer Using Services Oriented Architecture

A Multi-Algorithm, High Reliability, Extensible Steganalyzer Using Services Oriented Architecture Sacred Heart University From the SelectedWorks of Eman Abdelfattah August, 2011 A Multi-Algorithm, High Reliability, Extensible Steganalyzer Using Services Oriented Architecture Eman Abdelfattah, Sacred

More information

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography Smruti Ranjan Gouda (Dept. Of computer Science & Engineering, Asst. Professor, Gandhi Group of institutions, Berhampur,

More information

Steganography. Brent McClain Rob Carey

Steganography. Brent McClain Rob Carey Steganography Brent McClain Rob Carey What is Steganography Greek Origin Steganos means covered Graph means writing Hiding information in plain sight Cover Image Another image hidden in the picture Created

More information

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami to MPEG Prof. Pratikgiri Goswami Electronics & Communication Department, Shree Swami Atmanand Saraswati Institute of Technology, Surat. Outline of Topics 1 2 Coding 3 Video Object Representation Outline

More information

GENERATIVE ADVERSARIAL NETWORKS FOR IMAGE STEGANOGRAPHY

GENERATIVE ADVERSARIAL NETWORKS FOR IMAGE STEGANOGRAPHY GENERATIVE ADVERSARIAL NETWORKS FOR IMAGE STEGANOGRAPHY Denis Volkhonskiy 2,3, Boris Borisenko 3 and Evgeny Burnaev 1,2,3 1 Skolkovo Institute of Science and Technology 2 The Institute for Information

More information

Detection of double-compression in JPEG images for applications in steganography

Detection of double-compression in JPEG images for applications in steganography 1 Detection of double-compression in JPEG images for applications in steganography Tomáš Pevný and Jessica Fridrich Abstract This paper presents a method for detection of double JPEG compression and a

More information

STeganography is a technique for covert communication,

STeganography is a technique for covert communication, 1 A New Rule for Cost Reassignment in Adaptive Steganography Wenbo Zhou, Weiming Zhang, and Nenghai Yu Abstract In steganography schemes, the distortion function is used to define modification costs on

More information

STEGANOGRAPHY DETECTION USING MULTI-CLASS CLASSIFICATION

STEGANOGRAPHY DETECTION USING MULTI-CLASS CLASSIFICATION Chapter 1 STEGANOGRAPHY DETECTION USING MULTI-CLASS CLASSIFICATION Benjamin M. Rodriguez and Gilbert L. Peterson Abstract Several steganography tools are freely available over the Internet, ranging from

More information

Features. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy

Features. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy JPEG JPEG Joint Photographic Expert Group Voted as international standard in 1992 Works with color and grayscale images, e.g., satellite, medical,... Motivation: The compression ratio of lossless methods

More information

Feature Restoration and Distortion Metrics

Feature Restoration and Distortion Metrics Feature Restoration and Distortion Metrics Ventsislav K. Chonev and Andrew D. Ker Oxford University Computing Laboratory, Parks Road, Oxford OX1 3QD, England. ABSTRACT Our work focuses on Feature Restoration

More information

A Feature Selection Methodology for Steganalysis

A Feature Selection Methodology for Steganalysis A Feature Selection Methodology for Steganalysis Yoan Miche 1, Benoit Roue 2, Amaury Lendasse 1,andPatrickBas 1,2 1 Laboratory of Computer and Information Science Helsinki University of Technology P.O.

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 6: Image Instructor: Kate Ching-Ju Lin ( 林靖茹 ) Chap. 9 of Fundamentals of Multimedia Some reference from http://media.ee.ntu.edu.tw/courses/dvt/15f/ 1 Outline

More information

Defining Cost Functions for Adaptive JPEG Steganography at the Microscale

Defining Cost Functions for Adaptive JPEG Steganography at the Microscale 1052 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 4, APRIL 2019 Defining Cost Functions for Adaptive JPEG Steganography at the Microscale Kejiang Chen, Hang Zhou, Wenbo Zhou, Weiming

More information

Reversible Data Hiding VIA Optimal Code for Image

Reversible Data Hiding VIA Optimal Code for Image Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering

More information

A Novel Message Decomposing and Embedding Scheme for Image Steganography

A Novel Message Decomposing and Embedding Scheme for Image Steganography Journal of Computers Vol. 29 No. 2, 2018, pp. 241-248 doi:10.3966/199115992018042902023 A Novel Message Decomposing and Embedding Scheme for Image Steganography Zhihai Zhuo 1*, Ning Zhong 2, Hongxia Miao

More information

A new predictive image compression scheme using histogram analysis and pattern matching

A new predictive image compression scheme using histogram analysis and pattern matching University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching

More information

Space Filling Curves in Steganalysis

Space Filling Curves in Steganalysis Space Filling Curves in Steganalysis Andreas Westfeld Technische Universität Dresden, 01062 Dresden, Germany ABSTRACT We introduce a new method to increase the reliability of current steganalytic techniques

More information

Robust PDF Table Locator

Robust PDF Table Locator Robust PDF Table Locator December 17, 2016 1 Introduction Data scientists rely on an abundance of tabular data stored in easy-to-machine-read formats like.csv files. Unfortunately, most government records

More information

Reverse engineering of double compressed images in the presence of contrast enhancement

Reverse engineering of double compressed images in the presence of contrast enhancement Reverse engineering of double compressed images in the presence of contrast enhancement P. Ferrara #, T. Bianchi, A. De Rosa, A. Piva # National Institute of Optics (INO), Firenze, Italy pasquale.ferrara@ino.it

More information

F5 A Steganographic Algorithm

F5 A Steganographic Algorithm F5 A Steganographic Algorithm High Capacity Despite Better Steganalysis 1 Outline Benefits of F5 Properties of existing tools From Jsteg to F5 How secure is F5? My challenge to you 2 Benefits of F5 High

More information

Random Image Embedded in Videos using LSB Insertion Algorithm

Random Image Embedded in Videos using LSB Insertion Algorithm Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.

More information

A New Statistical Restoration Method for Spatial Domain Images

A New Statistical Restoration Method for Spatial Domain Images A New Statistical Restoration Method for Spatial Domain Images Arijit Sur 1,,PiyushGoel 2, and Jayanta Mukherjee 2 1 Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati-781039,

More information

Compression of Stereo Images using a Huffman-Zip Scheme

Compression of Stereo Images using a Huffman-Zip Scheme Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract

More information

A Framework to Reversible Data Hiding Using Histogram-Modification

A Framework to Reversible Data Hiding Using Histogram-Modification A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya

More information

Metamorphosis of High Capacity Steganography Schemes

Metamorphosis of High Capacity Steganography Schemes 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Metamorphosis of High Capacity Steganography Schemes 1 Shami

More information

Digital Image Representation Image Compression

Digital Image Representation Image Compression Digital Image Representation Image Compression 1 Image Representation Standards Need for compression Compression types Lossless compression Lossy compression Image Compression Basics Redundancy/redundancy

More information

JPEG: An Image Compression System. Nimrod Peleg update: Nov. 2003

JPEG: An Image Compression System. Nimrod Peleg update: Nov. 2003 JPEG: An Image Compression System Nimrod Peleg update: Nov. 2003 Basic Structure Source Image Data Reconstructed Image Data Encoder Compressed Data Decoder Encoder Structure Source Image Data Compressed

More information

Fingerprint Image Compression

Fingerprint Image Compression Fingerprint Image Compression Ms.Mansi Kambli 1*,Ms.Shalini Bhatia 2 * Student 1*, Professor 2 * Thadomal Shahani Engineering College * 1,2 Abstract Modified Set Partitioning in Hierarchical Tree with

More information