Optimizing Pixel Predictors for Steganalysis
|
|
- Judith Davis
- 5 years ago
- Views:
Transcription
1 Optimizing Pixel Predictors for Steganalysis Vojtěch Holub and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York IS&T / SPIE 2012, San Francisco, CA
2 Steganography The art of secret communication message m message m cover X Emb(X,m,k) stego Y Ext(Y,k) key k channel with passive warden key k Steganography by cover modification X is slightly modified to Y to convey a secret message (by flipping LSBs, changing DCT coefficients,...). Goal: make the embedding changes statistically undetectable. Steganalysis Warden s job: tell whether a cover or stego object is sent. Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 2 of 18
3 Pixel Predictor Warden represents images by features computed from noise residuals and builds the detector as a classifier in the feature space. Noise residual Narrower dynamic range than x ij Increased SNR Predictor Estimates the value of pixel x ij from its neighborhood E.g., by fitting linear or quadratic polynomials, etc. r ij = x ij Pred(x ij ) Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 3 of 18 i xij j
4 Detection Framework 1 Computing residual: r ij = x ij Pred(x ij ) ( 2 Quantization and truncation: r ij round q R,T = 2. Thus, r ij { 2,1,0,1,2} trunc T ( rij q 3 Forming 4D co-occurrence matrix: C = C (h) + C (v) )), C (h) d 1 d 2 d 3 d 4 = {#(i,j) r ij = d 1,r ij+1 = d 2,r ij+2 = d 3,r ij+3 = d 4 } dim(c) = 5 4 = Symmetrization of C Dim. reduction Sign-symmetry: C d1 d 2 d 3 d 4 C d1 d 2 d 3 d 4 + C d1 d 2 d 3 d 4 Directional symmetry: C d1 d 2 d 3 d 4 C d1 d 2 d 3 d 4 + C d4 d 3 d 2 d 1 5 Ensemble classifier [Kodovský-2011] Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 4 of 18
5 Predictor Parametrization (structure) Each predictor will be parametrized, for instance i xij = K = 0 d c d 0 d b a b d c a 0 a c d b a b d 0 d c d 0 j Parameters a,b,c,d Sum over all elements must equal to 1 Free parameters b,c,d since a can be computed from the rest Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 5 of 18
6 Optimization Methodology Optimized parameters Free parameters of the predictor structure Quantization step q Objective function L2R_L2LOSS (margin width of linear SVM) proposed by [Filler-2011] Problematic 1 P E = min P 2 (P FA + P MD (P FA )) calculated using ensemble FA classifier on a subset of 2000 images. 50 Optimization method Nelder-Mead Derivative-free simplex-reflection algorithm 40 K = b a b a 0 a b a b Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 6 of 18 PE (%) q b
7 Cover Sources Three image databases BOSSbase ver [BOSS-2010] 9074 images, grayscale, 7 cameras, resized to NRCS images, grayscale, NRCS scans, two cropped from the center of every image LEICA images, grayscale, Leica M9, 18 Mpixels, two cropped from the center of every image Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 7 of 18
8 Steganographic Algorithms Three stego algorithms HUGO (Highly Undetectable stego) [Pevný et al.-2010] EA (Edge-Adaptive) [Luo et al.-2010] ±1 embedding with optimal ternary coder Two payloads 0.1 bits per pixel (bpp) 0.4 bits per pixel (bpp) Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 8 of 18
9 Optimizing the 3 3 Predictor We optimized symmetric 3 3 predictors with structure b a b a 0 a b a b Predictor parameters: (a, b), q (b = free parameter, q = quantization step) Initial predictor parameters for optimization: Optimal cover predictor in the LSE sense q = 1.5 Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 9 of 18
10 Reference predictors Predictor derived by [Böhme&Ker-2008]: KB = Optimal 3 3 cover predictor in the LSE sense (LSE) Quantization q selected as best q {1,1.25,1.5,1.75,2} Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 10 of 18
11 Optimization Results RAW BOSSbase NRCS512 LEICA512 Alg. Pld. Ker (a, b), q P E (a, b), q P E (a, b), q P E HUGO 0.1 KB (0.50, -0.25), (0.50, -0.25), (0.50, -0.25), LSE (0.45, -0.20), (0.51, -0.26), (0.48, -0.23), Opt (0.49, -0.24), (0.60, -0.35), (0.57, -0.32), KB (0.50, -0.25), (0.50, -0.25), (0.50, -0.25), LSE (0.45, -0.20), (0.51, -0.26), (0.48, -0.23), Opt (0.51, -0.26), (0.37, -0.12), (0.38, -0.13), EA 0.1 KB (0.50, -0.25), (0.50, -0.25), (0.50, -0.25), LSE (0.45, -0.20), (0.51, -0.26), (0.48, -0.23), Opt (0.46, -0.21), (0.67, -0.42), (0.37, -0.12), KB (0.50, -0.25), (0.50, -0.25), (0.50, -0.25), LSE (0.45, -0.20), (0.51, -0.26), (0.48, -0.23), Opt (0.26, -0.01), (0.39, -0.14), (0.40, -0.15), ±1 0.1 KB (0.50, -0.25), (0.50, -0.25), (0.50, -0.25), LSE (0.45, -0.20), (0.51, -0.26), (0.48, -0.23), Opt (0.55, -0.30), (0.67, -0.42), (0.56, -0.31), KB (0.50, -0.25), (0.50, -0.25), (0.50, -0.25), LSE (0.45, -0.20), (0.51, -0.26), (0.48, -0.23), Opt (0.52, -0.27), (0.73, -0.48), (0.32, -0.07), Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 11 of 18
12 Interpretation of EA Results (1/2) EA, BOSSbase, payload 0.4 bpp ( ) KB = P E = 17.93% ( ) Opt = P E = 13.74% Why? Message is embedded only to horizontal/vertical pixel pairs depending only their value difference. = Adding diagonal neighbors does not improve steganalysis. Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 12 of 18
13 EA algorithm Interpretation of EA Results (2/2) Image is divided into square blocks of a randomly selected size B B, B {1,4,8,12} Every block is randomly rotated by d degrees, d {0,90,180,270} Embedding into two horizontally neighboring pixels (x i,j,x i,j+1 ),i odd, where x i,j x i,j+1 > T. At most one value from the pair is modified. Blocks are rotated back to their original direction. B = 4 rot. 180 rot. 90 Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 13 of 18
14 Interpretation of LEICA512 Results ±1, LEICA512, payload 0.4 bpp S = ( ) 0.25 KB = ( ) Opt = P E = 10.49% P E = 8.28% b a b a 0 a b a b LEICA512 images are crops of 18 Mpix originals = Strong dependencies among neighboring pixels = [Böhme-2008] recommends optimal LSE predictors for steganalysis satisfying a b = 1 2ρ, where ρ is the correlation among neighboring pixels. = In contrast, our study suggests that a b should increase Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 14 of 18
15 JPEG Results RAW images compressed to 80% quality JPEG, then decompressed. Predictor optimization did not improve performance, why? KB BOSSbase HUGO EA ±1 RAW JPEG PE (%) Payload (bpp) Change Rate (%) Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 15 of 18
16 JPEG Results RAW images compressed to 80% quality JPEG, then decompressed. Predictor optimization did not improve performance, why? KB NRCS512 HUGO EA ±1 RAW JPEG PE (%) Payload (bpp) Change Rate (%) Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 15 of 18
17 JPEG Results RAW images compressed to 80% quality JPEG, then decompressed. Predictor optimization did not improve performance, why? KB LEICA512 HUGO EA ±1 RAW JPEG PE (%) Payload (bpp) Change Rate (%) Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 15 of 18
18 Interpretation of JPEG Results 1 JPEG compression nearly empties some co-occurrence bins. 2 Embedding repopulates them from neighboring bins. Example: ±1 embedding, BOSSbase 80, payload 0.4 bpp avg. RAW bin avg. JPEG bin JPEG P E k best bin Cover Stego Cover Stego indiv. merged 1. (1, 1, 2, 1), (1, 1, 0, 0), (2, 0, 0, 0), Detection exploits a cover-source singularity rather than effects of embedding. Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 16 of 18
19 Conditional optimization Predictor optimization with respect to already existing predictors cascading Example 1: HUGO, BOSSbase, 0.4 bpp Structure Optimized predictor, q PE indiv Dim ( ) ( ) a 0 a , ( ) ( ) a 0 b , P merged E The second-order difference is optimally supplemented by the first-order difference Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 17 of 18
20 Conditional optimization Predictor optimization with respect to already existing predictors cascading Example 2: HUGO, BOSSbase, 0.4 bpp Structure Optimized predictor, q PE indiv ( ) ( ) b a b a 0 a b a b ( c b c a 0 a c b c ( c b c a 0 a c b c ) ( ) ( P merged E Dim, ), ), Result comparable with HUGO BOSS winners only with 507 features Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 17 of 18
21 Summary Predictor optimization for covers is a different problem than for a binary detection (cover/stego) within a framework. Advantages Noticeable improvement for some cover sources (LEICA512) and steganographic algorithms (EA). Conditional optimization to improve the performance dimensionality ratio or to build a rich model. Limitations Other Optimization only over a small parameter vector (e.g., up to dimension of five) due to noisy objective function. Astonishingly accurate detection in decompressed JPEGs (future direction). Holub, Fridrich Optimizing Pixel Predictors for Steganalysis 18 of 18
Optimizing Pixel Predictors for Steganalysis
Optimizing Pixel Predictors for Steganalysis Vojtěch Holub and Jessica Fridrich Department of C, SUNY Binghamton, NY, USA {vholub1,fridrich}@binghamton.edu ABSTRACT A standard way to design steganalysis
More informationSteganalysis of Content-Adaptive Steganography in Spatial Domain
Steganalysis of Content-Adaptive Steganography in Spatial Domain Jessica Fridrich, Jan Kodovský, Vojtěch Holub, and Miroslav Goljan Department of ECE, SUNY Binghamton, NY, USA {fridrich,jan.kodovsky,vholub1,mgoljan}@binghamton.edu
More informationRich Models for Steganalysis of Digital Images
1 Rich Models for Steganalysis of Digital Images Jessica Fridrich, Member, IEEE and Jan Kodovský Abstract We describe a novel general strategy for building steganography detectors for digital images. The
More informationAdaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital Images in Spatial Domain Ningbo Li, Pan Feng, Liu Jia
216 International Conference on Information Engineering and Communications Technology (IECT 216) ISBN: 978-1-69-37- Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital
More informationModern Steganalysis Can Detect YASS
Jan Kodovský, Tomáš Pevný, Jessica Fridrich January 18, 2010 / SPIE 1 / 13 YASS Curriculum Vitae Birth Location: University of California, Santa Barbara Birth Date: More than 2 years ago [Solanki-2007],
More informationBreaking the OutGuess
Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,
More informationIvans Lubenko & Andrew Ker
Ivans Lubenko & Andrew Ker lubenko@ comlab.ox.ac.uk adk@comlab.ox.ac.uk Oxford University Computing Laboratory SPIE/IS&T Electronic Imaging, San Francisco 25 January 2011 Classification in steganalysis
More informationSelection-Channel-Aware Rich Model for Steganalysis of Digital Images
Selection-Channel-Aware Rich Model for Steganalysis of Digital Images Tomáš Denemark, Vahid Sedighi, Vojtěch Holub Department of ECE Binghamton University Binghamton, NY 13902-6000 {tdenema1,vsedigh1}@binghamton.edu
More informationarxiv: v1 [cs.mm] 2 Mar 2017
This is a preprint of the paper: arxiv:1703.00817v1 [cs.mm] 2 Mar 2017 Daniel Lerch-Hostalot, David Megías, LSB matching steganalysis based on patterns of pixel differences and random embedding, Computers
More informationWith ever-increasing growth of electronic
Journal of Advances in Computer Engineering and Technology, 3(2) 2017 Parallelization of Rich Models for Steganalysis of Digital Images using a CUDA-based Approach Mahmoud Kazemi 1, Meysam Mirzaee 2, Reza
More informationToss that BOSSbase, Alice!
Toss that BOSSbase, Alice! Vahid Sedighi, Jessica Fridrich, Rémi Cogranne To cite this version: Vahid Sedighi, Jessica Fridrich, Rémi Cogranne. Toss that BOSSbase, Alice!. IS&T intl symposium on Electronic
More informationQuantitative and Binary Steganalysis in JPEG: A Comparative Study
Quantitative and Binary Steganalysis in JPEG: A Comparative Study Ahmad ZAKARIA LIRMM, Univ Montpellier, CNRS ahmad.zakaria@lirmm.fr Marc CHAUMONT LIRMM, Univ Nîmes, CNRS marc.chaumont@lirmm.fr Gérard
More informationSteganalysis of Overlapping Images
Steganalysis of Overlapping Images James M. Whitaker and Andrew D. Ker Oxford University Department of Computer Science, Parks Road, Oxford OX1 3QD, England. ABSTRACT We examine whether steganographic
More informationA Study on Different JPEG Steganograhic Schemes
A Study on Different JPEG Steganograhic Schemes Alphy Ros Mathew, Sreekumar K Department of Computer Science, College of Engineering,Ponjar, Cochin University of Science And Technology Kottayam,Kerala,India
More informationVentsislav Chonev & Andrew Ker
Ventsislav Chonev & Andrew Ker ventsislav.chonev@oriel.ox.ac.uk adk@comlab.ox.ac.uk- Oxford University Computing Laboratory SPIE/IS&T Electronic Imaging, San Francisco 24 January 2011 Consider some fixed
More informationCalibration Revisited
Jan Kodovský, Jessica Fridrich September 7, 2009 / ACM MM&Sec 09 1 / 16 What is Calibration? 2002 - Calibration introduced (attack on F5) Part of feature extraction procedure for blind steganalysis Idea:
More informationLOCAL TERNARY PATTERN BASED ON PATH INTEGRAL FOR STEGANALYSIS. Qiuyan Lin, Jiaying Liu and Zongming Guo
LOCAL TERNARY PATTERN BASED ON PATH INTEGRAL FOR STEGANALYSIS Qiuyan Lin, Jiaying Liu and Zongming Guo Institute of Computer Science and Technology, Peking University, Beijing 87, China ABSTRACT The least
More informationA General Framework for the Structural Steganalysis of LSB Replacement
A General Framework for the Structural Steganalysis of LSB Replacement Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory 7 th Information Hiding
More informationSTEGANOGRAPHY is a technique for covert communication,
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 0.09/TCSVT.206.2587388,
More informationwhere ρ i (x, y i ) denotes the cost of changing the i-th cover element from x i to y i. With the syndrome coding, the minimal
814 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 5, MAY 2014 Uniform Embedding for Efficient JPEG Steganography Linjie Guo, Student Member, IEEE, Jiangqun Ni, Member, IEEE, and
More informationOTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi
OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting
More informationDeep Learning Regressors for Quantitative Steganalysis
Deep Learning Regressors for Quantitative Steganalysis Mo Chen, Mehdi Boroumand, and Jessica Fridrich, Department of ECE, SUNY Binghamton, NY, USA, mochen8@gmail.com, {mboroum1, fridrich}@binghamton.edu
More informationOn the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography
On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography Ainuddin Wahid Abdul Wahab, Johann A Briffa and Hans Georg Schaathun Department of Computing, University of Surrey Abstract.
More informationOn dangers of cross-validation in steganalysis
Jan Kodovský jan.kodovsky@binghamton.edu Abstract Modern steganalysis is a combination of a feature space design and a supervised binary classification. In this report, we assume that the feature space
More informationSteganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes
Multimed Tools Appl (2016) 75:13557 13583 DOI 10.1007/s11042-015-2759-2 Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes Xiangyang Luo 1,2 & Xiaofeng Song 1,2
More informationA Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.27-31 A Blind Steganalysis on JPEG Gray Level
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationarxiv: v1 [cs.mm] 2 Mar 2017
This is a preprint of the paper: arxiv:1703.00796v1 [cs.mm] 2 Mar 2017 Daniel Lerch-Hostalot, David Megías, Unsupervised steganalysis based on artificial training sets, Engineering Applications of Artificial
More informationAlpha-trimmed Image Estimation for JPEG Steganography Detection
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Alpha-trimmed Image Estimation for JPEG Steganography Detection Mei-Ching Chen,
More informationDefining Cost Functions for Adaptive Steganography at the Microscale
Defining Cost Functions for Adaptive Steganography at the Microscale Kejiang Chen, Weiming Zhang, Hang Zhou, Nenghai Yu CAS Key Laboratory of Electromagnetic Space Information University of Science and
More informationMerging Markov and DCT Features for Multi-Class JPEG Steganalysis
Merging Markov and DCT Features for Multi-Class JPEG Steganalysis Tomáš Pevný a, Jessica Fridrich b a Department of Computer Science, Binghamton University, State University of New York b Department of
More information14 th ACM Multimedia & Security Workshop, Warwick University, 6 Sept 2012
adk@ cs.ox.ac.uk Department of Computer Science, Oxford University pevnak@ gmail.com Agent Technology Center, Czech Technical University in Prague 14 th ACM Multimedia & Security Workshop, Warwick University,
More informationWhat Makes the Stego Image Undetectable?
What Makes the Stego Image Undetectable? Songtao Wu, Yan Liu Department of Computing The Hong Kong Polytechnic University Hong Kong, P. R. China {csstwu, csyliu} @comp.polyu.edu.hk Shenghua Zhong College
More informationDESIGN OF HIGH SPEED STEGOSYSTEM BASED ON TRELLIS CODES JOINTLY WITH GENERALISED VITERBI ALGORITHM *
International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 3, No. 2, pp. 5, 26 DESIGN OF HIGH SPEED STEGOSYSTEM BASED ON TRELLIS CODES JOINTLY WITH GENERALISED
More informationAdaptive Pixel Pair Matching Technique for Data Embedding
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationImage Steganography (cont.)
Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares
More informationAdversarial Examples Against Deep Neural Network based Steganalysis
Adversarial Examples Against Deep Neural Network based Steganalysis Yiwei Zhang zywvvd@mail.ustc.edu.cn Jiayang Liu 122937169@qq.com Weiming Zhang zhangwm@ustc.edu.cn Yujia Liu yjcaihon@mail.ustc.edu.cn
More informationEvolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography
2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) Evolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography
More informationIMAGE steganography is the science and art to conceal. Deep Learning Hierarchical Representations for Image Steganalysis
1 Deep Learning Hierarchical Representations for Image Steganalysis Jian Ye, Jiangqun Ni, Member, IEEE, Yang Yi Abstract Nowadays the prevailing detectors of steganographic communication in digital images
More informationDouble-Compressed JPEG Detection in a Steganalysis System
Annual ADFSL Conference on Digital Forensics, Security and Law 2012 May 30th, 10:30 AM Double-Compressed JPEG Detection in a Steganalysis System Jennifer L. Davidson Department of Mathematics, Iowa State
More informationDeep Learning Hierarchical Representations for Image Steganalysis Jian Ye, Jiangqun Ni, Member, IEEE, and Yang Yi
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 12, NO. 11, NOVEMBER 2017 2545 Deep Learning Hierarchical Representations for Image Steganalysis Jian Ye, Jiangqun Ni, Member, IEEE, and Yang
More informationUniversal distortion function for steganography in an arbitrary domain
Holub et al. EURASIP Journal on Information Security 2014, 2014:1 RESEARCH Open Access Universal distortion function for steganography in an arbitrary domain Vojtěch Holub *, Jessica Fridrich and Tomáš
More informationEnsemble Classifiers for Steganalysis of Digital Media
1 Ensemble Classifiers for Steganalysis of Digital Media Jan Kodovský, Jessica Fridrich, Member, IEEE, and Vojtěch Holub Abstract Today, the most accurate steganalysis methods for digital media are built
More informationMulti-Class Detector of Current Steganographic Methods for JPEG Format
1 Multi-Class Detector of Current Steganographic Methods for JPEG Format Tomáš Pevný and Jessica Fridrich, IEEE member Abstract The aim of this paper is to construct a practical forensic steganalysis tool
More informationCompression-Compatible Fragile and Semi-Fragile Tamper Detection
Compression-Compatible Fragile and Semi-Fragile Tamper Detection Lisa M. Marvel George W. Hartwig, Jr. Charles Boncelet, Jr. Presentation by Peter Macko Motivation Direct Applications Establishing credibility
More informationAN EMBEDDING MECHANISM FOR NATURAL STEGANOGRAPHY AFTER DOWN-SAMPLING
AN EMBEDDING MECHANISM FOR NATURAL STEGANOGRAPHY AFTER DOWN-SAMPLING Patrick Bas To cite this version: Patrick Bas. AN EMBEDDING MECHANISM FOR NATURAL STEGANOGRAPHY AFTER DOWN-SAMPLING. ICASSP, Mar 2017,
More informationJ2: REFINEMENT OF A TOPOLOGICAL IMAGE STEGANOGRAPHIC METHOD
J2: REFINEMENT OF A TOPOLOGICAL IMAGE STEGANOGRAPHIC METHOD Richard E Newman, 1 Ira S Moskowitz 2 and Mahendra Kumar 1 1 CISE Department University of Florida Gainesville, FL 32611-6120 email: {nemo,makumar}@ciseufledu
More informationFeature Extraction and Analysis using Gabor Filter and Higher Order Statistics for the JPEG Steganography
Feature Extraction and Analysis using Gabor Filter and Higher Order Statistics for the JPEG Steganography SwagotaBera 1, Dr Monisha Sharma 2 and Dr Bikesh Singh 3 1 Department of Electronics & Telecommunication
More informationDetection of double-compression for applications in steganography
1 Detection of double-compression for applications in steganography Tomáš Pevný and Jessica Fridrich Abstract This paper presents a method for detection of double JPEG compression and a maximum likelihood
More informationBenchmarking steganographic and steganalysis techniques
Benchmarking steganographic and steganalysis techniques Mehdi Kharrazi a, Husrev T. Sencar b Nasir Memon b a Department of Electrical and Computer Engineering b Department of Computer and Information Science
More informationSTEGANALYSIS OF STEGOSTORAGE LIBRARY
t m Mathematical Publications DOI: 10.1515/tmmp-2016-0034 Tatra Mt. Math. Publ. 67 (2016), 99 116 STEGANALYSIS OF STEGOSTORAGE LIBRARY Michala Gulášová Matúš Jókay ABSTRACT. The main goal of this research
More informationOn Completeness of Feature Spaces in Blind Steganalysis
On Completeness of Feature Spaces in Blind Steganalysis Jan Kodovský SUNY Binghamton Department of ECE Binghamton, NY 39-6 jan@kodovsky.com Jessica Fridrich SUNY Binghamton Department of ECE Binghamton,
More informationTackling Android Stego Apps in the Wild
Tackling Android Stego Apps in the Wild Wenhao Chen, Li Lin, Min Wu, and Jennifer Newman Iowa State University, Ames, IA, USA E-mail: {wenhaoc, llin, jlnewman}@iastate.edu University of Maryland, College
More informationModel Based Steganography with Precover
Model Based Steganography with Precover Tomáš Denemark and Jessica Fridrich, Department of ECE, SUNY Binghamton, NY, USA, {tdenema1,fridrich}@binghamtonedu Abstract It is widely recognized that steganography
More informationCalibration Revisited
Calibration Revisited Jan Kodovský SUNY Binghamton Department of ECE Binghamton, NY 1392-6 jan.kodovsky@binghamton.edu Jessica Fridrich SUNY Binghamton Department of ECE Binghamton, NY 1392-6 fridrich@binghamton.edu
More informationDETECTING STEGANOGRAPHY USING MULTI-CLASS CLASSIFICATION
Chapter 13 DETECTING STEGANOGRAPHY USING MULTI-CLASS CLASSIFICATION Benjamin Rodriguez and Gilbert Peterson Abstract When a digital forensics investigator suspects that steganography has been used to hide
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationFeature selection, statistical modeling and its applications to universal JPEG steganalyzer
Graduate Theses and Dissertations Iowa State University Capstones, Theses and Dissertations 2009 Feature selection, statistical modeling and its applications to universal JPEG steganalyzer Jaikishan Jalan
More informationInformation Cloaking Technique with Tree Based Similarity
Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationSECURITY ENHANCEMENT: STEGANO-CRYPTO USING CHOAS BASED Sblock EMBEDDING TECHNIQUE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 8, August 2015,
More informationSteganalysis in the Presence of Watermarked Images
2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing Steganalysis in the Presence of Watermarked Images Pham Hai Dang Le, Daniel Graf, and Matthias O.
More informationFurther Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis
Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis Anindya Sarkar, Kaushal Solanki and B. S. Manjunath Department of Electrical and Computer Engineering, University
More informationEnhancing the Image Compression Rate Using Steganography
The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,
More informationA Parallel SRM Feature Extraction Algorithm for Steganalysis Based on GPU Architecture
Computer Science and Information Systems 12(4):1345 1359 DOI: 10.2298/CSIS140815058C A Parallel SRM Feature Extraction Algorithm for Steganalysis Based on GPU Architecture Kaizhi Chen 1,2, Chenjun Lin
More informationA Steganography method for JPEG2000 Baseline System
A Steganography method for JPEG2000 Baseline System P.Ramakrishna Rao M.Tech.,[CSE], Teaching Associate, Department of Computer Science, Dr.B.R.Ambedkar University, Etcherla Srikaulam, 532 410. Abstract
More informationSteganography Using Gibbs Random Fields
Steganography Using Gibbs Random Fields Tomáš Filler SUNY Binghamton Department of ECE Binghamton, NY 13902-6000 tomas.filler@binghamton.edu Jessica Fridrich SUNY Binghamton Department of ECE Binghamton,
More informationImage Steganography Technique By Using Braille Method of Blind People (LSBraille)
Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt
More informationA DWT Based Steganography Approach
A DWT Based Steganography Approach EE604 Term Paper Instructor: Prof. Sumana Gupta Group No. 1 Group Members Anirudh Kumar Agrawal, 11907098 Pratik Likhar, 11531 Radhika Ravi, 11553 Introduction Image
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationNOWADAYS, the mainstream scheme of steganography. Adaptive Spatial Steganography Based on Probability-Controlled Adversarial Examples
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 1 Adaptive Spatial Steganography Based on Probability-Controlled Adversarial Examples Sai Ma, Qingxiao Guan, Xianfeng Zhao*, and Yaqi Liu arxiv:1804.02691v2
More informationSteganography and Steganalysis of JPEG Images
DEPARTMENT OF COMPUTER AND INFORMATION SCIENCES AND ENGINEERING PH.D. PROPOSAL Steganography and Steganalysis of JPEG Images Supervisory Committee: Author: Mahendra Kumar makumar@cise.ufl.edu Dr. Richard
More informationA Multi-Algorithm, High Reliability, Extensible Steganalyzer Using Services Oriented Architecture
Sacred Heart University From the SelectedWorks of Eman Abdelfattah August, 2011 A Multi-Algorithm, High Reliability, Extensible Steganalyzer Using Services Oriented Architecture Eman Abdelfattah, Sacred
More informationLeast Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography
Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography Smruti Ranjan Gouda (Dept. Of computer Science & Engineering, Asst. Professor, Gandhi Group of institutions, Berhampur,
More informationSteganography. Brent McClain Rob Carey
Steganography Brent McClain Rob Carey What is Steganography Greek Origin Steganos means covered Graph means writing Hiding information in plain sight Cover Image Another image hidden in the picture Created
More informationOutline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami
to MPEG Prof. Pratikgiri Goswami Electronics & Communication Department, Shree Swami Atmanand Saraswati Institute of Technology, Surat. Outline of Topics 1 2 Coding 3 Video Object Representation Outline
More informationGENERATIVE ADVERSARIAL NETWORKS FOR IMAGE STEGANOGRAPHY
GENERATIVE ADVERSARIAL NETWORKS FOR IMAGE STEGANOGRAPHY Denis Volkhonskiy 2,3, Boris Borisenko 3 and Evgeny Burnaev 1,2,3 1 Skolkovo Institute of Science and Technology 2 The Institute for Information
More informationDetection of double-compression in JPEG images for applications in steganography
1 Detection of double-compression in JPEG images for applications in steganography Tomáš Pevný and Jessica Fridrich Abstract This paper presents a method for detection of double JPEG compression and a
More informationSTeganography is a technique for covert communication,
1 A New Rule for Cost Reassignment in Adaptive Steganography Wenbo Zhou, Weiming Zhang, and Nenghai Yu Abstract In steganography schemes, the distortion function is used to define modification costs on
More informationSTEGANOGRAPHY DETECTION USING MULTI-CLASS CLASSIFICATION
Chapter 1 STEGANOGRAPHY DETECTION USING MULTI-CLASS CLASSIFICATION Benjamin M. Rodriguez and Gilbert L. Peterson Abstract Several steganography tools are freely available over the Internet, ranging from
More informationFeatures. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy
JPEG JPEG Joint Photographic Expert Group Voted as international standard in 1992 Works with color and grayscale images, e.g., satellite, medical,... Motivation: The compression ratio of lossless methods
More informationFeature Restoration and Distortion Metrics
Feature Restoration and Distortion Metrics Ventsislav K. Chonev and Andrew D. Ker Oxford University Computing Laboratory, Parks Road, Oxford OX1 3QD, England. ABSTRACT Our work focuses on Feature Restoration
More informationA Feature Selection Methodology for Steganalysis
A Feature Selection Methodology for Steganalysis Yoan Miche 1, Benoit Roue 2, Amaury Lendasse 1,andPatrickBas 1,2 1 Laboratory of Computer and Information Science Helsinki University of Technology P.O.
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 6: Image Instructor: Kate Ching-Ju Lin ( 林靖茹 ) Chap. 9 of Fundamentals of Multimedia Some reference from http://media.ee.ntu.edu.tw/courses/dvt/15f/ 1 Outline
More informationDefining Cost Functions for Adaptive JPEG Steganography at the Microscale
1052 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 4, APRIL 2019 Defining Cost Functions for Adaptive JPEG Steganography at the Microscale Kejiang Chen, Hang Zhou, Wenbo Zhou, Weiming
More informationReversible Data Hiding VIA Optimal Code for Image
Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering
More informationA Novel Message Decomposing and Embedding Scheme for Image Steganography
Journal of Computers Vol. 29 No. 2, 2018, pp. 241-248 doi:10.3966/199115992018042902023 A Novel Message Decomposing and Embedding Scheme for Image Steganography Zhihai Zhuo 1*, Ning Zhong 2, Hongxia Miao
More informationA new predictive image compression scheme using histogram analysis and pattern matching
University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching
More informationSpace Filling Curves in Steganalysis
Space Filling Curves in Steganalysis Andreas Westfeld Technische Universität Dresden, 01062 Dresden, Germany ABSTRACT We introduce a new method to increase the reliability of current steganalytic techniques
More informationRobust PDF Table Locator
Robust PDF Table Locator December 17, 2016 1 Introduction Data scientists rely on an abundance of tabular data stored in easy-to-machine-read formats like.csv files. Unfortunately, most government records
More informationReverse engineering of double compressed images in the presence of contrast enhancement
Reverse engineering of double compressed images in the presence of contrast enhancement P. Ferrara #, T. Bianchi, A. De Rosa, A. Piva # National Institute of Optics (INO), Firenze, Italy pasquale.ferrara@ino.it
More informationF5 A Steganographic Algorithm
F5 A Steganographic Algorithm High Capacity Despite Better Steganalysis 1 Outline Benefits of F5 Properties of existing tools From Jsteg to F5 How secure is F5? My challenge to you 2 Benefits of F5 High
More informationRandom Image Embedded in Videos using LSB Insertion Algorithm
Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.
More informationA New Statistical Restoration Method for Spatial Domain Images
A New Statistical Restoration Method for Spatial Domain Images Arijit Sur 1,,PiyushGoel 2, and Jayanta Mukherjee 2 1 Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati-781039,
More informationCompression of Stereo Images using a Huffman-Zip Scheme
Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract
More informationA Framework to Reversible Data Hiding Using Histogram-Modification
A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya
More informationMetamorphosis of High Capacity Steganography Schemes
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Metamorphosis of High Capacity Steganography Schemes 1 Shami
More informationDigital Image Representation Image Compression
Digital Image Representation Image Compression 1 Image Representation Standards Need for compression Compression types Lossless compression Lossy compression Image Compression Basics Redundancy/redundancy
More informationJPEG: An Image Compression System. Nimrod Peleg update: Nov. 2003
JPEG: An Image Compression System Nimrod Peleg update: Nov. 2003 Basic Structure Source Image Data Reconstructed Image Data Encoder Compressed Data Decoder Encoder Structure Source Image Data Compressed
More informationFingerprint Image Compression
Fingerprint Image Compression Ms.Mansi Kambli 1*,Ms.Shalini Bhatia 2 * Student 1*, Professor 2 * Thadomal Shahani Engineering College * 1,2 Abstract Modified Set Partitioning in Hierarchical Tree with
More information