Calibration Revisited
|
|
- Dayna Farmer
- 5 years ago
- Views:
Transcription
1 Jan Kodovský, Jessica Fridrich September 7, 2009 / ACM MM&Sec 09 1 / 16
2 What is Calibration? Calibration introduced (attack on F5) Part of feature extraction procedure for blind steganalysis Idea: estimate cover image statistics from the stego image JPEG Spatial Spatial Original image J 1 IDCT Crop DCT JPEG Reference image J 2 Calibrated feature = F(J 2 ) F(J 1 ) Non-calibrated feature = F(J 1 ) 2 / 16
3 Motivation How well does calibration approximate cover? Experiment: local histograms (average over 6,500 images) Relative frequency of occurence bpac nsf5 cover Value of the DCT coefficient (2,1) 3 / 16
4 Motivation How well does calibration approximate cover? Experiment: local histograms (average over 6,500 images) Relative frequency of occurence nsf5 1.0 bpac cover stego Value of the DCT coefficient (2,1) 3 / 16
5 Motivation How well does calibration approximate cover? Experiment: local histograms (average over 6,500 images) Relative frequency of occurence nsf5 1.0 bpac cover stego ref. stego Value of the DCT coefficient (2,1) 3 / 16
6 Motivation How well does calibration approximate cover? Experiment: local histograms (average over 6,500 images) Relative frequency of occurence nsf5 0.2 bpac (change rate 0.04) cover stego ref. stego Value of the DCT coefficient (2,1) 3 / 16
7 Motivation How well does calibration approximate cover? Experiment: local histograms (average over 6,500 images) Relative frequency of occurence nsf5 0.2 bpac (change rate 0.04) cover stego ref. stego Value of the DCT coefficient (2,1) 3 / 16
8 Motivation, cont d Detectability of the steganographic algorithm YASS [Pevný 2007] merged features (Pevný Feature Set) SVM machine with Gaussian kernel, 6500 images 1 YASS bpac PMD calibration P FA 4 / 16
9 Motivation, cont d Detectability of the steganographic algorithm YASS [Pevný 2007] merged features (Pevný Feature Set) SVM machine with Gaussian kernel, 6500 images 1 YASS bpac PMD no calibration calibration P FA 4 / 16
10 Challenges Challenges Goals How exactly does calibration affect detectability of steganographic algorithms? What is the real purpose of calibration? Does it make sense to calibrate all features? Create appropriate model for calibration Quantitative evaluation of the contribution of calibration to steganalysis performance 5 / 16
11 Notation Feature mapping... F : X F Reference transform... r : X X Reference-feature mapping... F r = F r : X F Space of images X Feature space F F x F(x) r F r(x) F r (x) 6 / 16
12 Notation Feature mapping... F : X F Reference transform... r : X X Reference-feature mapping... F r = F r : X F Space of images X Feature space F F x F(x) r F r(x) F r (x) 6 / 16
13 Basic Concept F(c) Feature Space F 0 F(s) F(c),F(s)... original features F r (c),f r (s)... reference features 7 / 16
14 Basic Concept F(c) Feature Space F 0 F(s) non-calibrated features F(c),F(s)... original features F r (c),f r (s)... reference features 7 / 16
15 Basic Concept F(c) F r (c) F r (s) Feature Space F 0 F(s) reference features F(c),F(s)... original features F r (c),f r (s)... reference features 7 / 16
16 Basic Concept F(c) F r (c) F r (s) Feature Space F 0 F(s) calibrated features F(c),F(s)... original features F r (c),f r (s)... reference features 7 / 16
17 Proposed Model Feature Space F F r (s) m q M rs m rs M e F r (c) m rc m e F(s) M c M rc F(c) M s 8 / 16
18 Proposed Model Feature Space F F r (s) m q M rs m rs M e F r (c) m rc m e F(s) M c M rc F(c) M s m e = median [F(s) F(c)], M e = median [ F(s) F(c) m e ] 8 / 16
19 Proposed Model Feature Space F F r (s) m q M rs m rs M e F r (c) m rc m e F(s) M c M rc F(c) M s m rs = median [F(rs) F(s)], M rs = median [ F(rs) F(s) m rs ] 8 / 16
20 Proposed Model Feature Space F F r (s) m q M rs m rs M e F r (c) m rc m e F(s) M c M rc F(c) M s m rc = median [F(rc) F(c)], M rc = median [ F(rc) F(c) m rc ] 8 / 16
21 Proposed Model Feature Space F F r (s) m q M rs m rs M e F r (c) m rc m e F(s) M c M rc F(c) M s m rc = median [F(rc) F(c)], M rc = median [ F(rc) F(c) m rc ] 8 / 16
22 Proposed Model Feature Space F F r (s) m q M rs m rs M e F r (c) m rc m e F(s) M c M rc F(c) M s m rc = median [F(rc) F(c)], M rc = median [ F(rc) F(c) m rc ] 8 / 16
23 Proposed Model Feature Space F m rc = median [F(rc) F(c)], M rc = median [ F(rc) F(c) m rc ] 8 / 16
24 Proposed Model Feature Space F m rc = median [F(rc) F(c)], M rc = median [ F(rc) F(c) m rc ] 8 / 16
25 Proposed Model Feature Space F m rc = median [F(rc) F(c)], M rc = median [ F(rc) F(c) m rc ] 8 / 16
26 Proposed Model Feature Space F m rc = median [F(rc) F(c)], M rc = median [ F(rc) F(c) m rc ] 8 / 16
27 Proposed Model Feature Space F F r (s) m q M rs m rs M e F r (c) m rc m e F(s) M c M rc F(c) M s m rc = median [F(rc) F(c)], M rc = median [ F(rc) F(c) m rc ] 8 / 16
28 Parallel Reference m rc m rc, M rc M rs Calibration can be seen as a constant feature-space shift Calibration causes failure of steganalysis m rc m rs F(c) F(s) Feature value 9 / 16
29 Parallel Reference m rc m rc, M rc M rs Calibration can be seen as a constant feature-space shift Calibration causes failure of steganalysis m rc m rs F(c) F(s) Feature value Experiments: observed often for YASS (robustness!) 9 / 16
30 Cover Estimate Both m rc and m rs are close to cover feature F(c) This stood behind the original idea of calibration Stego-image feature must differ from cover-image feature m rc m rs F(c) F(s) Feature value 10 / 16
31 Cover Estimate Both m rc and m rs are close to cover feature F(c) This stood behind the original idea of calibration Stego-image feature must differ from cover-image feature m rc m rs F(c) F(s) Feature value Experiments: easier to observe for larger payloads 10 / 16
32 Eraser Reference cover and stego features are close to each other Mapping r erases embedding changes F(c) F(s) must be consistent in terms of direction m rc m rs F(c) F(s) Feature value Experiments: more frequent than cover estimate 11 / 16
33 Eraser Reference cover and stego features are close to each other Mapping r erases embedding changes F(c) F(s) must be consistent in terms of direction m rc F(c) F(s) m rs Feature value Experiments: more frequent than cover estimate Different example: predictor in WS steganalysis 11 / 16
34 Divergent Reference m rc must be different from m rs This situation essentially covers some of the previous ones Works even when F(c) = F(s) m rc m rs F(c) F(s) Feature value 12 / 16
35 Divergent Reference m rc must be different from m rs This situation essentially covers some of the previous ones Works even when F(c) = F(s) m rc m rs F(c) F(s) Feature value Experiments: most frequent scenario Interesting example: histogram of zeros for JSteg 12 / 16
36 Lessons Learned Calibration does not have to approximate cover. Still, it might be benefitial to calibrate. 13 / 16
37 Lessons Learned Calibration does not have to approximate cover. Still, it might be benefitial to calibrate. Several different mechanisms may be responsible for a positive effect of calibration. 13 / 16
38 Lessons Learned Calibration does not have to approximate cover. Still, it might be benefitial to calibrate. Several different mechanisms may be responsible for a positive effect of calibration. Calibration may have a catastrophically negative effect on steganalysis as well (parallel reference). 13 / 16
39 Lessons Learned Calibration does not have to approximate cover. Still, it might be benefitial to calibrate. Several different mechanisms may be responsible for a positive effect of calibration. Calibration may have a catastrophically negative effect on steganalysis as well (parallel reference). How to prevent steganalysis from such failures? 13 / 16
40 Different Point of View F r Cartesian calibration [F(x),F r(x)] Original calibration F cal (x) = F r(x) F(x) F 14 / 16
41 Different Point of View F r Cartesian calibration [F(x),F r(x)] Original calibration F cal (x) = F r(x) F(x) F How well does Cartesian calibration perform in practice? 14 / 16
42 Cartesian Calibration Improves Steganalysis P E P E Algorithm bpac F F r F [F r,f] Algorithm bpac F F r F [F r,f] nsf JPHS Jsteg YASS YASS YASS YASS Steghide YASS YASS YASS YASS MME Reported values of P E are medians over 5 runs P E = min 1 2 (P FA + P MD ) 1 PMD ROC curve P FA 15 / 16
43 Shed more light on how, why, and when calibration works Introduced a new framework capable of both quantitatively and qualitatively capture behaviour of calibration in the feature space Supported our findings experimentally Proposed an improved way of calibration Extractor of Cartesian-calibrated 274 merged features available 16 / 16
Modern Steganalysis Can Detect YASS
Jan Kodovský, Tomáš Pevný, Jessica Fridrich January 18, 2010 / SPIE 1 / 13 YASS Curriculum Vitae Birth Location: University of California, Santa Barbara Birth Date: More than 2 years ago [Solanki-2007],
More informationCalibration Revisited
Calibration Revisited Jan Kodovský SUNY Binghamton Department of ECE Binghamton, NY 1392-6 jan.kodovsky@binghamton.edu Jessica Fridrich SUNY Binghamton Department of ECE Binghamton, NY 1392-6 fridrich@binghamton.edu
More informationOn Completeness of Feature Spaces in Blind Steganalysis
On Completeness of Feature Spaces in Blind Steganalysis Jan Kodovský SUNY Binghamton Department of ECE Binghamton, NY 39-6 jan@kodovsky.com Jessica Fridrich SUNY Binghamton Department of ECE Binghamton,
More informationOn dangers of cross-validation in steganalysis
Jan Kodovský jan.kodovsky@binghamton.edu Abstract Modern steganalysis is a combination of a feature space design and a supervised binary classification. In this report, we assume that the feature space
More informationBreaking the OutGuess
Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,
More informationOptimizing Pixel Predictors for Steganalysis
Optimizing Pixel Predictors for Steganalysis Vojtěch Holub and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York IS&T / SPIE 2012, San Francisco, CA Steganography
More informationA Study on Different JPEG Steganograhic Schemes
A Study on Different JPEG Steganograhic Schemes Alphy Ros Mathew, Sreekumar K Department of Computer Science, College of Engineering,Ponjar, Cochin University of Science And Technology Kottayam,Kerala,India
More informationIvans Lubenko & Andrew Ker
Ivans Lubenko & Andrew Ker lubenko@ comlab.ox.ac.uk adk@comlab.ox.ac.uk Oxford University Computing Laboratory SPIE/IS&T Electronic Imaging, San Francisco 25 January 2011 Classification in steganalysis
More informationOn the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography
On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography Ainuddin Wahid Abdul Wahab, Johann A Briffa and Hans Georg Schaathun Department of Computing, University of Surrey Abstract.
More informationMulti-Class Detector of Current Steganographic Methods for JPEG Format
1 Multi-Class Detector of Current Steganographic Methods for JPEG Format Tomáš Pevný and Jessica Fridrich, IEEE member Abstract The aim of this paper is to construct a practical forensic steganalysis tool
More information14 th ACM Multimedia & Security Workshop, Warwick University, 6 Sept 2012
adk@ cs.ox.ac.uk Department of Computer Science, Oxford University pevnak@ gmail.com Agent Technology Center, Czech Technical University in Prague 14 th ACM Multimedia & Security Workshop, Warwick University,
More informationDetection of double-compression for applications in steganography
1 Detection of double-compression for applications in steganography Tomáš Pevný and Jessica Fridrich Abstract This paper presents a method for detection of double JPEG compression and a maximum likelihood
More informationEnsemble Classifiers for Steganalysis of Digital Media
1 Ensemble Classifiers for Steganalysis of Digital Media Jan Kodovský, Jessica Fridrich, Member, IEEE, and Vojtěch Holub Abstract Today, the most accurate steganalysis methods for digital media are built
More informationPeak-Shaped-Based Steganographic Technique for MP3 Audio
Journal of Information Security, 3, 4, -8 doi:.436/jis.3.43 Published Online January 3 (http://www.scirp.org/journal/jis) Peak-Shaped-Based Steganographic Technique for MP3 Audio Raffaele Pinardi, Fabio
More informationA Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.27-31 A Blind Steganalysis on JPEG Gray Level
More informationFrom Blind to Quantitative Steganalysis
1 From Blind to Quantitative Steganalysis Tomáš Pevný, Jessica Fridrich, IEEE member, and Andrew D. Ker, IEEE member Abstract A quantitative steganalyzer is an estimator of the number of embedding changes
More informationDetection of double-compression in JPEG images for applications in steganography
1 Detection of double-compression in JPEG images for applications in steganography Tomáš Pevný and Jessica Fridrich Abstract This paper presents a method for detection of double JPEG compression and a
More informationNovelty Detection in Blind Steganalysis
Novelty Detection in Blind Steganalysis Tomáš Pevný INPG - Gipsa-Lab 46 avenue Félix Viallet Grenoble cedex 38031 France pevnak@gmail.com Jessica Fridrich SUNY Binghamton Department of ECE Binghamton,
More informationAlpha-trimmed Image Estimation for JPEG Steganography Detection
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Alpha-trimmed Image Estimation for JPEG Steganography Detection Mei-Ching Chen,
More informationarxiv: v1 [cs.mm] 2 Mar 2017
This is a preprint of the paper: arxiv:1703.00817v1 [cs.mm] 2 Mar 2017 Daniel Lerch-Hostalot, David Megías, LSB matching steganalysis based on patterns of pixel differences and random embedding, Computers
More informationFeature Extraction and Analysis using Gabor Filter and Higher Order Statistics for the JPEG Steganography
Feature Extraction and Analysis using Gabor Filter and Higher Order Statistics for the JPEG Steganography SwagotaBera 1, Dr Monisha Sharma 2 and Dr Bikesh Singh 3 1 Department of Electronics & Telecommunication
More informationInfluence of Embedding Strategies on Security of Steganographic Methods in the JPEG Domain
Influence of Embedding Strategies on Security of Steganographic Methods in the JPEG Domain Jan Kodovský, Jessica Fridrich Department of Electrical and Computer Engineering, Binghamton University, State
More informationSteganography. Brent McClain Rob Carey
Steganography Brent McClain Rob Carey What is Steganography Greek Origin Steganos means covered Graph means writing Hiding information in plain sight Cover Image Another image hidden in the picture Created
More informationSteganalysis in the Presence of Watermarked Images
2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing Steganalysis in the Presence of Watermarked Images Pham Hai Dang Le, Daniel Graf, and Matthias O.
More informationAN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS
AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS Chinchu Elza Andrews 1, Iwin Thanakumar Joseph 2 1. Post Graduate Student, Department of Computer Science and Engineering, Karunya University, India 2.
More informationQuantitative and Binary Steganalysis in JPEG: A Comparative Study
Quantitative and Binary Steganalysis in JPEG: A Comparative Study Ahmad ZAKARIA LIRMM, Univ Montpellier, CNRS ahmad.zakaria@lirmm.fr Marc CHAUMONT LIRMM, Univ Nîmes, CNRS marc.chaumont@lirmm.fr Gérard
More informationA New Statistical Restoration Method for Spatial Domain Images
A New Statistical Restoration Method for Spatial Domain Images Arijit Sur 1,,PiyushGoel 2, and Jayanta Mukherjee 2 1 Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati-781039,
More informationMerging Markov and DCT Features for Multi-Class JPEG Steganalysis
Merging Markov and DCT Features for Multi-Class JPEG Steganalysis Tomáš Pevný a, Jessica Fridrich b a Department of Computer Science, Binghamton University, State University of New York b Department of
More informationYET Another Steganographic Scheme (YASS) [1] is a
374 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010 An Experimental Study on the Security Performance of YASS Fangjun Huang, Member, IEEE, Jiwu Huang, Senior Member,
More informationA Feature Selection Methodology for Steganalysis
A Feature Selection Methodology for Steganalysis Yoan Miche 1, Benoit Roue 2, Amaury Lendasse 1,andPatrickBas 1,2 1 Laboratory of Computer and Information Science Helsinki University of Technology P.O.
More informationBenchmarking steganographic and steganalysis techniques
Benchmarking steganographic and steganalysis techniques Mehdi Kharrazi a, Husrev T. Sencar b Nasir Memon b a Department of Electrical and Computer Engineering b Department of Computer and Information Science
More informationSECURITY ENHANCEMENT: STEGANO-CRYPTO USING CHOAS BASED Sblock EMBEDDING TECHNIQUE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 8, August 2015,
More informationSTEGANALYSIS OF STEGOSTORAGE LIBRARY
t m Mathematical Publications DOI: 10.1515/tmmp-2016-0034 Tatra Mt. Math. Publ. 67 (2016), 99 116 STEGANALYSIS OF STEGOSTORAGE LIBRARY Michala Gulášová Matúš Jókay ABSTRACT. The main goal of this research
More informationOptimizing Image Steganography using Genetic Algorithm
Optimizing Image Steganography using Genetic Algorithm 1 Gangeshawar, 2 James Attri 1 M.Tech(CSE),Satya College of Engg.& Tech.,Palwal, India 2 Asst. Prof (CSE), Satya College of Engg.& Tech.,Palwal, India
More informationSteganalysis Techniques: A Comparative Study
University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 5-18-2007 Steganalysis Techniques: A Comparative Study Swaroop Kumar Pedda Reddy University
More informationDETECTING STEGANOGRAPHY USING MULTI-CLASS CLASSIFICATION
Chapter 13 DETECTING STEGANOGRAPHY USING MULTI-CLASS CLASSIFICATION Benjamin Rodriguez and Gilbert Peterson Abstract When a digital forensics investigator suspects that steganography has been used to hide
More informationOn the usefulness of information hiding techniques for wireless sensor networks security arxiv: v1 [cs.mm] 25 Jun 2017
On the usefulness of information hiding techniques for wireless sensor networks security arxiv:1706.08136v1 [cs.mm] 25 Jun 2017 Rola Al-Sharif, Christophe Guyeux, Yousra Ahmed Fadil, Abdallah Makhoul,
More informationA Survey on Image Steganography and Steganalysis
Journal of Information Hiding and Multimedia Signal Processing c 211 ISSN 273-4212 Ubiquitous International Volume 2, Number 2, April 211 A Survey on Image Steganography and Steganalysis Bin Li College
More informationDouble-Compressed JPEG Detection in a Steganalysis System
Annual ADFSL Conference on Digital Forensics, Security and Law 2012 May 30th, 10:30 AM Double-Compressed JPEG Detection in a Steganalysis System Jennifer L. Davidson Department of Mathematics, Iowa State
More informationFurther Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis
Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis Anindya Sarkar, Kaushal Solanki and B. S. Manjunath Department of Electrical and Computer Engineering, University
More informationHUBFIRE - A MULTI-CLASS SVM BASED JPEG STEGANALYSIS USING HBCL STATISTICS AND FR INDEX
HUBFIRE - A MULTI-CLASS SVM BASED JPEG STEGANALYSIS USING HBCL STATISTICS AND FR INDEX Veena H. Bhat 1, Krishna S., P. Deepa Shenoy, Venugopal K. R. Department of Computer Science and Engineering, University
More informationA General Framework for the Structural Steganalysis of LSB Replacement
A General Framework for the Structural Steganalysis of LSB Replacement Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory 7 th Information Hiding
More informationSteganography and Steganalysis of JPEG Images
DEPARTMENT OF COMPUTER AND INFORMATION SCIENCES AND ENGINEERING PH.D. PROPOSAL Steganography and Steganalysis of JPEG Images Supervisory Committee: Author: Mahendra Kumar makumar@cise.ufl.edu Dr. Richard
More informationImage Steganography (cont.)
Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares
More informationFunctions. Def. Let A and B be sets. A function f from A to B is an assignment of exactly one element of B to each element of A.
Functions functions 1 Def. Let A and B be sets. A function f from A to B is an assignment of exactly one element of B to each element of A. a A! b B b is assigned to a a A! b B f ( a) = b Notation: If
More informationKeywords- Steganography, Steganalysis,DWT, SVM, Stego Image, Cover Image
Volume 6, Issue 2, February 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance
More informationwhere ρ i (x, y i ) denotes the cost of changing the i-th cover element from x i to y i. With the syndrome coding, the minimal
814 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 5, MAY 2014 Uniform Embedding for Efficient JPEG Steganography Linjie Guo, Student Member, IEEE, Jiangqun Ni, Member, IEEE, and
More informationSTEGANOGRAPHY DETECTION USING MULTI-CLASS CLASSIFICATION
Chapter 1 STEGANOGRAPHY DETECTION USING MULTI-CLASS CLASSIFICATION Benjamin M. Rodriguez and Gilbert L. Peterson Abstract Several steganography tools are freely available over the Internet, ranging from
More informationImproving Blind Image Steganalysis using Genetic Algorithm and Fusion Technique
Improving Blind Image Steganalysis using Genetic Algorithm and Fusion Technique Sarita R. Visavalia 1, Dr. Amit Ganatra 2 1 Department of Information Technology, CHARUSAT, India 2 Dpartmentof Computer
More informationSteganalysis of Overlapping Images
Steganalysis of Overlapping Images James M. Whitaker and Andrew D. Ker Oxford University Department of Computer Science, Parks Road, Oxford OX1 3QD, England. ABSTRACT We examine whether steganographic
More informationSpace Filling Curves in Steganalysis
Space Filling Curves in Steganalysis Andreas Westfeld Technische Universität Dresden, 01062 Dresden, Germany ABSTRACT We introduce a new method to increase the reliability of current steganalytic techniques
More informationF5 A Steganographic Algorithm
F5 A Steganographic Algorithm High Capacity Despite Better Steganalysis 1 Outline Benefits of F5 Properties of existing tools From Jsteg to F5 How secure is F5? My challenge to you 2 Benefits of F5 High
More informationA Novel Message Decomposing and Embedding Scheme for Image Steganography
Journal of Computers Vol. 29 No. 2, 2018, pp. 241-248 doi:10.3966/199115992018042902023 A Novel Message Decomposing and Embedding Scheme for Image Steganography Zhihai Zhuo 1*, Ning Zhong 2, Hongxia Miao
More informationSteganalysis of Content-Adaptive Steganography in Spatial Domain
Steganalysis of Content-Adaptive Steganography in Spatial Domain Jessica Fridrich, Jan Kodovský, Vojtěch Holub, and Miroslav Goljan Department of ECE, SUNY Binghamton, NY, USA {fridrich,jan.kodovsky,vholub1,mgoljan}@binghamton.edu
More informationSteganographic Key Leakage Through Payload Metadata
Steganographic Key Leakage Through Payload Metadata Tomáš Pevný Agent Technology Group CTU in Prague Prague 16627, Czech Republic pevnak@gmail.com Andrew D. Ker Department of Computer Science University
More informationIMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY
IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,
More informationFeature selection, statistical modeling and its applications to universal JPEG steganalyzer
Graduate Theses and Dissertations Iowa State University Capstones, Theses and Dissertations 2009 Feature selection, statistical modeling and its applications to universal JPEG steganalyzer Jaikishan Jalan
More informationAdaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital Images in Spatial Domain Ningbo Li, Pan Feng, Liu Jia
216 International Conference on Information Engineering and Communications Technology (IECT 216) ISBN: 978-1-69-37- Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital
More informationFunctions. How is this definition written in symbolic logic notation?
functions 1 Functions Def. Let A and B be sets. A function f from A to B is an assignment of exactly one element of B to each element of A. We write f(a) = b if b is the unique element of B assigned by
More informationA Multi-Algorithm, High Reliability, Extensible Steganalyzer Using Services Oriented Architecture
Sacred Heart University From the SelectedWorks of Eman Abdelfattah August, 2011 A Multi-Algorithm, High Reliability, Extensible Steganalyzer Using Services Oriented Architecture Eman Abdelfattah, Sacred
More informationIdentifying a steganographer in realistic and heterogeneous data sets
Identifying a steganographer in realistic and heterogeneous data sets Andrew D. Ker a and Tomáš Pevný b a Oxford University Department of Computer Science, Parks Road, Oxford OX1 3QD, England; b Agent
More informationDATA HIDING TECHNIQUES IN DIGITAL MULTIMEDIA Girish Kumar BS 1, Prof (Dr) Ajay Rana 2 1 M Tech Scholar Computer Science & Engineering,
DATA HIDING TECHNIQUES IN DIGITAL MULTIMEDIA Girish Kumar BS 1, Prof (Dr) Ajay Rana 2 1 M Tech Scholar Computer Science & Engineering, ASET, Amity University, Noida, India bsgirishkumar@gmail.com 2 Director
More informationCompression-Compatible Fragile and Semi-Fragile Tamper Detection
Compression-Compatible Fragile and Semi-Fragile Tamper Detection Lisa M. Marvel George W. Hartwig, Jr. Charles Boncelet, Jr. Presentation by Peter Macko Motivation Direct Applications Establishing credibility
More informationEMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS
EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS Dr. N.MANOHARAN 1 Dr.R.BALASUBRAMANIAN 2 S.UMA NANDHINI 3 V.SUJATHA 4 1 Assistant Professor in Department of Computer Science,
More informationPublication F by authors
Publication F Yoan Miche, Patrick Bas, and Amaury Lendasse. 2010. Using multiple reembeddings for quantitative steganalysis and image reliability estimation. Espoo, Finland: Aalto University School of
More informationNeighboring Joint Density-Based JPEG Steganalysis
Neighboring Joint Density-Based JPEG Steganalysis QINGZHONG LIU, Sam Houston State University ANDREW H. SUNG and MENGYU QIAO, NewMexicoTech The threat posed by hackers, spies, terrorists, and criminals,
More informationJPEG Steganography System with Minimal Changes to the Quantized DCT Coefficients
International Journal of Soft Computing and Engineering (IJSCE ISSN: 3-307, Volume-, Issue-6, January 0 JPEG Steganography System with inimal Changes to the Quantized DCT Coefficients Hamdy A. orsy, Zaki
More informationContent-independent steganography and steganalysis of JPEG images
Content-independent steganography and steganalysis of JPEG images Mohammad Rezaei Security Analysis Laboratory Tehran, Iran rezaei@salab.ir M. Bagher Salahshoor Security Analysis Laboratory Tehran, Iran
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationTomas Pevny. Report Date: June Final Report from 01 July 2011 to 30 June 2014
AFRL-AFOSR-UK-TR-2014-0043 Universal Batch Steganalysis Tomas Pevny CZECH TECHNICAL UNIVERSITY IN PRAGUE ZIKOVA 4 PRAHA 6, 16636 CZECH REPUBLIC EOARD Grant 11-3035 Report Date: June 2014 Final Report from
More informationAdaptive Learning of an Accurate Skin-Color Model
Adaptive Learning of an Accurate Skin-Color Model Q. Zhu K.T. Cheng C. T. Wu Y. L. Wu Electrical & Computer Engineering University of California, Santa Barbara Presented by: H.T Wang Outline Generic Skin
More informationIn 2001, US officials stated that they have suspicions that terrorists communicate using steganography in the internet.
Statistical Steganalysis CHAPTER. INTRODUCTION. Steganography Steganography is an art of secret communications. Its main purpose is to hide the occurrence of communication over a public channel. In contrast
More informationBenchmarking steganographic and steganalysis techniques
Benchmarking steganographic and steganalysis techniques Mehdi Kharrazi, Husrev T. Sencar, Nasir Memon I. INTRODUCTION There have been a range of image based steganographic embedding techniques proposed
More informationJeff Hinson CS525, Spring 2010
DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction
More informationOpen Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain
Send Orders for Reprints to reprints@benthamscience.net The Open Signal Processing Journal, 2013, 5, 1-6 1 Open Access Side-Informed Image ing Scheme Based on Dither Modulation in the Frequency Domain
More informationGENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY
Volume 1, No. 5, December 2010 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY Samir
More informationA Survey on Digital Image Steganography and Steganalysis
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 8, Issue 1 (Sep. - Oct. 2013), PP 56-60 A Survey on Digital Image Steganography and Steganalysis
More informationMultiple Masks Based Pixel Comparison Steganalysis Method for Mobile Imaging
Multiple Masks Based Pixel Comparison Steganalysis Method for Mobile Imaging Sos S. Agaian* a, Gilbert L. Peterson b and Benjamin M. Rodriguez b a Multimedia and Mobile Signal Processing Laboratory The
More informationToss that BOSSbase, Alice!
Toss that BOSSbase, Alice! Vahid Sedighi, Jessica Fridrich, Rémi Cogranne To cite this version: Vahid Sedighi, Jessica Fridrich, Rémi Cogranne. Toss that BOSSbase, Alice!. IS&T intl symposium on Electronic
More informationDeep Learning Regressors for Quantitative Steganalysis
Deep Learning Regressors for Quantitative Steganalysis Mo Chen, Mehdi Boroumand, and Jessica Fridrich, Department of ECE, SUNY Binghamton, NY, USA, mochen8@gmail.com, {mboroum1, fridrich}@binghamton.edu
More informationJ2: REFINEMENT OF A TOPOLOGICAL IMAGE STEGANOGRAPHIC METHOD
J2: REFINEMENT OF A TOPOLOGICAL IMAGE STEGANOGRAPHIC METHOD Richard E Newman, 1 Ira S Moskowitz 2 and Mahendra Kumar 1 1 CISE Department University of Florida Gainesville, FL 32611-6120 email: {nemo,makumar}@ciseufledu
More informationSteganalysis using Logistic Regression
Steganalysis using Logistic Regression Ivans Lubenko and Andrew D. Ker Oxford University Computing Laboratory, Parks Road, Oxford OX1 3QD, England. ABSTRACT We advocate Logistic Regression (LR) as an alternative
More information3 Feature Selection & Feature Extraction
3 Feature Selection & Feature Extraction Overview: 3.1 Introduction 3.2 Feature Extraction 3.3 Feature Selection 3.3.1 Max-Dependency, Max-Relevance, Min-Redundancy 3.3.2 Relevance Filter 3.3.3 Redundancy
More informationA Formula Diamond Encoding Data Hiding Scheme
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 A Formula Diamond Encoding Data Hiding Scheme Wen-Chung Kuo
More informationSignal Processing: Image Communication
Signal Processing: Image Communication 25 (2) 577 587 Contents lists available at ScienceDirect Signal Processing: Image Communication journal homepage: www.elsevier.com/locate/image Reliable JPEG steganalysis
More informationSteganography Process- A Review
Steganography Process- A Review Lovepreet Kaur CGC Landran, Punjab, India. ABSTRACT: In this paper we survey different steganography techniques for encrypting the data along with characteristics, difference
More informationRich Models for Steganalysis of Digital Images
1 Rich Models for Steganalysis of Digital Images Jessica Fridrich, Member, IEEE and Jan Kodovský Abstract We describe a novel general strategy for building steganography detectors for digital images. The
More informationResearch Article Reliable Steganalysis Using a Minimum Set of Samples and Features
Hindawi Publishing Corporation EURASIP Journal on Information Security Volume 009, Article ID 9038, 3 pages doi:0.55/009/9038 Research Article Reliable Steganalysis Using a Minimum Set of Samples and Features
More informationA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY Md. Maklachur Rahman 1 1 Department of Computer Science and Engineering, Chittagong University of Engineering and Technology,
More informationA faster and intelligent Steganography Detection using Graphics Processing Unit in cloud
A faster and intelligent Steganography Detection using Graphics Processing Unit in cloud Mayank Tiwary Department of Information Technology C.V.Raman College of Engineering Bhubaneswar, India mayanktiwari09@gmail.com
More informationUNIT 2 LINEAR AND EXPONENTIAL RELATIONSHIPS Lesson 1: Graphs As Solution Sets and Function Notation
Lesson : Graphs As Solution Sets and Function Notation Guided Practice.. Example Is the relation below a function? Use a mapping diagram to determine your answer. {(, ), (, ), (, ), (, ), (, ), (, )}.
More informationReceiver Operating Characteristic (ROC) Graph to Determine the Most Suitable Pairs Analysis Threshold Value
Advances in Electrical and Electronics Engineering - IAENG Special Edition of the World Congress on Engineering and Computer Science 2008 Receiver Operating Characteristic (ROC) Graph to Determine the
More informationDefining Cost Functions for Adaptive Steganography at the Microscale
Defining Cost Functions for Adaptive Steganography at the Microscale Kejiang Chen, Weiming Zhang, Hang Zhou, Nenghai Yu CAS Key Laboratory of Electromagnetic Space Information University of Science and
More informationDESIGN OF HIGH SPEED STEGOSYSTEM BASED ON TRELLIS CODES JOINTLY WITH GENERALISED VITERBI ALGORITHM *
International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 3, No. 2, pp. 5, 26 DESIGN OF HIGH SPEED STEGOSYSTEM BASED ON TRELLIS CODES JOINTLY WITH GENERALISED
More informationSteganalysis versus Splicing Detection
Steganalysis versus Splicing Detection Yun Q. Shi 1, Chunhua Chen 1, Guorong Xuan 2, and Wei Su 1 1 New Jersey Institute of Technology, University Heights, Newark, NJ, USA 07102 2 Tongji University, Shanghai,
More informationSteganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram
, October 24-26, 2012, San Francisco, USA Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram Neeta Nain, Jaideep Singh, Ishan Dayma, Rajesh Meena The authors are
More informationSTEGANALYSIS OF STEGOSTORAGE SYSTEM
t m Mathematical Publications DOI: 10.1515/tmmp-2015-0049 Tatra Mt. Math. Publ. 64 (2015), 205 215 STEGANALYSIS OF STEGOSTORAGE SYSTEM Michala Gulášová Matúš Jókay ABSTRACT. The aim of this contribution
More informationA NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD
A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute
More informationDigital image steganography using LSB substitution, PVD, and EMD
Digital image steganography using LSB substitution, PVD, and EMD Anita Pradhan, K. Raja Sekhar, Gandharba Swain* Department of Computer Science and Engineering, K L University, Vaddeswaram-522502, Andhra
More informationBlock Mean Value Based Image Perceptual Hashing for Content Identification
Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions
More information