Breaking the OutGuess

Similar documents
EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis

Steganography. Brent McClain Rob Carey

In 2001, US officials stated that they have suspicions that terrorists communicate using steganography in the internet.

Alpha-trimmed Image Estimation for JPEG Steganography Detection

Image Steganography (cont.)

JPEG Steganography System with Minimal Changes to the Quantized DCT Coefficients

AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS

Steganalysis Techniques: A Comparative Study

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

A General Framework for the Structural Steganalysis of LSB Replacement

Detecting Hidden Information in Images: A Comparative Study

Optimizing Pixel Predictors for Steganalysis

STEGANALYSIS OF STEGOSTORAGE SYSTEM

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

Detection of double-compression for applications in steganography

Calibration Revisited

Merging Markov and DCT Features for Multi-Class JPEG Steganalysis

DETECTING STEGANOGRAPHY USING MULTI-CLASS CLASSIFICATION

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Detection of double-compression in JPEG images for applications in steganography

STEGANOGRAPHY DETECTION USING MULTI-CLASS CLASSIFICATION

Benchmarking steganographic and steganalysis techniques

STEGANALYSIS OF STEGOSTORAGE LIBRARY

The DCT domain and JPEG

GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY

On Completeness of Feature Spaces in Blind Steganalysis

Receiver Operating Characteristic (ROC) Graph to Determine the Most Suitable Pairs Analysis Threshold Value

Benchmarking steganographic and steganalysis techniques

Information Cloaking Technique with Tree Based Similarity

Modern Steganalysis Can Detect YASS

Multiple Masks Based Pixel Comparison Steganalysis Method for Mobile Imaging

DATA HIDING TECHNIQUES IN DIGITAL MULTIMEDIA Girish Kumar BS 1, Prof (Dr) Ajay Rana 2 1 M Tech Scholar Computer Science & Engineering,

Quality based JPEG Steganography using balanced Embedding Technique

Jeff Hinson CS525, Spring 2010

Optimizing Image Steganography using Genetic Algorithm

Multi-Class Detector of Current Steganographic Methods for JPEG Format

An Improved Steganalysis Approach for Breaking the F5 Algorithm

Performance study of common image steganography and steganalysis techniques

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography

Steganography and Steganalysis of JPEG Images

Compression-Compatible Fragile and Semi-Fragile Tamper Detection

A Multi-Algorithm, High Reliability, Extensible Steganalyzer Using Services Oriented Architecture

Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis

Copyright Warning & Restrictions

On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography

Signal Processing: Image Communication

Content-independent steganography and steganalysis of JPEG images

A Study on Different JPEG Steganograhic Schemes

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

J2: REFINEMENT OF A TOPOLOGICAL IMAGE STEGANOGRAPHIC METHOD

Searching For Hidden Messages: Automatic Detection of Steganography

Calibration Revisited

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A New Approach to Compressed Image Steganography Using Wavelet Transform

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Space Filling Curves in Steganalysis

F5 A Steganographic Algorithm

A Reversible Data Hiding Scheme for BTC- Compressed Images

Feature selection, statistical modeling and its applications to universal JPEG steganalyzer

SECURITY METHOD FOR COMBINATION STEGANOGRAPHY ALGORITHMS ON TRANSFORM DOMAIN FOR JPEG IMAGES

Comparision in cover media under Stegnography Digital media by Hide and Seek Approach

Defending Against Statistical Steganalysis

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY

Adaptive Pixel Pair Matching Technique for Data Embedding

A Survey on Image Steganography and Steganalysis

A Feature Selection Methodology for Steganalysis

Steganography: Hiding Data In Plain Sight. Ryan Gibson

CANVASS - A Steganalysis Forensic Tool for JPEG Images

Pixel Steganalysis A Novel Approach in Image Steganography Using F5 Algorithm

A Reversible Data Hiding Scheme For JPEG Images

A Novel Information Security Scheme using Cryptic Steganography

A Formula Diamond Encoding Data Hiding Scheme

Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram

Review of steganalysis of digital images

A Review: A Digital Image Steganography Mrs.M.A.Wakure [1], Mrs.S.A.Wakure [2]

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Appendix A. Definition of Terms

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers

A Steganography method for JPEG2000 Baseline System

Advanced JPEG Steganography & Detec7on

Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack

Reversible Data Hiding VIA Optimal Code for Image

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Secure Information Hiding Portfolio. Ruoxi Li

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

Steganalysis Using Higher-Order Image Statistics

Steganography Process- A Review

From Blind to Quantitative Steganalysis

International Journal of Innovative Research in Computer and Communication Engineering

Public key Steganography Using Discrete Cross- Coupled Chaotic Maps

Steganalysis Using Color Wavelet Statistics and One-Class Support Vector Machines

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography

HUBFIRE - A MULTI-CLASS SVM BASED JPEG STEGANALYSIS USING HBCL STATISTICS AND FR INDEX

FPGA IMPLEMENTATION OF INVISIBLE VIDEO WATERMARKING USING DWT TECHNIQUE

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

A Review of Approaches for Steganography

Transcription:

Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton, NY 13902-6000, U.S.A, State University of New York

Outline Introduction to steganography and steganalysis OutGuess steganographic algorithm Detection algorithm Experimental results Limitations and countermeasures Conclusion

Steganography (brief introduction) The main goal of steganography is to hide the very presence of communication, such as by hiding messages in digital images The most important requirement is that the act of embedding should not create any statistically detectable artifacts in stego images It is not typically required that the data is embedded in a robust manner. Steganography is fundamentally different from watermarking.

Steganalysis Steganalysis is the art of discovering the presence of secret data Steganography has been broken if we can distinguish innocuous images from stego images with a success better than random guessing even though we may not be able to recover the embedded data The goal of this paper is not only to distinguish cover images from stego images, but also to obtain an estimate of the length of the hidden message

OutGuess (part I) Proposed by Neils Provos in 2001 as a response to the statistical chi-square attack by Andreas Westfeld in 1999 Main features of OutGuess: OutGuess hides messages in JPEG files It embeds message bits in LSBs of quantized DCT coefficients along a key-dependent walk through the image OutGuess preserves the histogram of DCT coefficients exactly OutGuess cannot be detected using the chi-square attack or its generalized versions

OutGuess (part II) OutGuess works in two phases embedding and correction steps. Original DCT coefficients Message bits Modified DCT coefficients Embedding -4 1 3 0 1 8 skipped skipped skipped 1 0 0 1 1 0-3 1 2 0 1 8 skipped skipped skipped The embedding process skips 0 s and 1 s and flips the LSBs of coefficients to match them with the message bits Correction Because the embedding process changes the histogram of the quantized DCT coefficients, the correction steps flips LSBs of yet not visited DCTs to match the cover and stego histograms

Detection principle We identify a macroscopic quantity S(m, q) (distinguishing statistics) that predictably changes (for example, monotonically increases) with the length of the embedded secret message m. S depends on parameters q. S(m,q) the functional form of S is either derived or estimated from experiments parameter(s) q determined from extreme values of S, such as S(0) or S(m max ) Once the parameters have been determined, one can calculate an estimate of the unknown message length m by solving the equation S(m) = S stego for m, where S stego is the value of S for the stego image under investigation.

Distinguishing statistics S B = M 1/8 N N 1/8 g + 8i, j g8i 1, j i= 1 j= 1 M + g j= 1 i= 1 i,8 j g i,8 j+ 1 Blockiness B is the sum of spatial discontinuities along the boundary of 8 8 JPEG blocks. B linearly increases with m the number of bits embedded using OutGuess (experimental but well verified fact) S = B(m max ) B(0) will be taken as our distinguishing statistics S.

S predictably changes with m B maximally embedded image B max (m max ) B p (m max ) B max (0) B 0 (m max ) stego image with message p B p (0) S = B(m max ) B(0) original cover image B 0 (0) m Because OutGuess uses LSB flipping as the main embedding mechanism, embedding another message into the stego image partially cancels out. Thus, S is largest for the cover image, smallest for the maximally embedded image, and somewhere inbetween for a partially embedded image: B 0 (m max ) B 0 (0) > B p (m max ) B p (0) > B max (m max ) B max (0) S 0 S p S max

Detection algorithm S p =B p (m max ) B p (0) is known from the stego image S 0 and S max can be estimated from the stego image by cropping it and recompressing using the same quantization matrix. The cropping and recompression breaks the quantization structure of DCT coefficients. Because the cropped/recompressed image is perceptually close to the cover image, most macroscopic quantities, such as S 0 and S max, are approximately preserved. 4 pixels 8 pixels

Detection algorithm Because S is a linear function of the message length, the unknown message length p can be calculated as p = S S 0 0 S S max

Experimental results 70 grayscale JPEG images compressed using quality factors ranging from 70 to 90 were used to test the detection routine. y-axis: relative number of changes due to embedding (includes embedding and correction modifications)

Problem with double-compressed images If a JPEG file is sent to OutGuess, it decompresses it first, then recompresses using a user-defined quality factor, and then embeds the message. This double compression complicates detection. Frequency of occurrence + + cover image o o double compressed cover image

Double-compression correction Double compression must be corrected for, otherwise a large error in message length estimation may result The cropped image can be used to estimate the primary quantization matrix of the cover image: Q s = quality factor of the stego image h = histogram of DCT coefficients for the stego image X c = Cropped stego image for Q = 60 95 Compress X c using quality factor Q Recompress it using Q s and denote X Q h c = histogram of X Q Calculate distance between histograms d(q) = h h c 2 end The primary quality factor Q s =argmin d(q) Q

Lessons learned By cropping and recompressing the stego image, we obtain a new JPEG file with many macroscopic properties close to the cover image Thus, secure steganography must preserve all statistical measures that exhibit approximate invariance to cropping/recompressing, which might be a highly non-trivial task. It will also limit the already low capacity of JPEGs The same approach can be used to attack F5: J. Fridrich, M. Goljan, and D. Hogea, Steganalysis of JPEG Images: Breaking the F5 Algorithm, 5th Information Hiding Workshop, Noordwijkerhout, The Netherlands, October 2002