ABSTRACT
We examine the universal pooled steganalyzer of in two respects. First, we confirm that the method is applicable to a number of different steganographic embedding methods. Second, we consider the converse problem of how to spread payload between multiple covers, by testing different payload allocation strategies against the universal steganalyzer. We focus on practical options which can be implemented without new software or expert knowledge, and we test on real-world data. Concentration of payload into the minimal number of covers is consistently the least detectable option. We present additional investigations which explain this phenomenon, uncovering a nonlinear relationship between embedding distortion and payload. We conjecture that this is an unavoidable consequence of blind steganalysis. This is significant for both batch steganography and pooled steganalysis.
- M. M. Breunig, H.-P. Kriegel, R. T. Ng, and J. Sander. Lof: Identifying density-based local outliers. In Proc. 2000 ACM SIGMOD International Conference on Management of Data, SIGMOD, pages 93--104. ACM, 2000. Google ScholarDigital Library
- T. Filler and J. Fridrich. Gibbs construction in steganography. IEEE Transactions on Information Forensics and Security, 5(4):705--720, 2010. Google ScholarDigital Library
- T. Filler and J. Fridrich. Minimizing additive distortion functions with non-binary embedding operation in steganography. In Information Forensics and Security (WIFS), 2010 IEEE International Workshop on, pages 1--6, 2010.Google ScholarCross Ref
- T. Filler and J. Fridrich. Design of adaptive steganographic schemes for digital images. In N. D. Memon, J. Dittmann, A. M. Alattar, and E. J. Delp III, editors, Media Watermarking, Security, and Forensics XIV, volume 7880 of Proc. SPIE, page 78800F. SPIE, 2011.Google Scholar
- T. Filler, J. Judas, and J. Fridrich. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security, 6(3):920--935, 2011. Google ScholarDigital Library
- J. Fridrich, M. Goljan, and D. Soukal. Wet paper codes with improved embedding efficiency. IEEE Transactions on Information Forensics and Security, 1(1):102--110, 2006. Google ScholarDigital Library
- J. Fridrich, T. Pevný, and J. Kodovský. Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities. In Proc. 9th ACM Workshop on Multimedia and Security, MM&Sec, pages 3--14. ACM, 2007. Google ScholarDigital Library
- A. Gretton, K. M. Borgwardt, M. J. Rasch, B. Schölkopf, and A. J. Smola. A kernel method for the two-sample problem. pages 513--520, 2007.Google Scholar
- S. Hetzl. Implementation of the Steghide algorithm ver. 0.5.1 (released October 2003). http://steghide.sourceforge.net/, last accessed April 2012.Google Scholar
- S. Hetzl and P. Mutzel. A graph-theoretic approach to steganography. In Proc. 9th International Conference on Communications and Multimedia Security, CMS, pages 119--128. Springer, 2005. Google ScholarDigital Library
- A. D. Ker. Batch steganography and pooled steganalysis. In J. Camenisch, C. Collberg, N. Johnson, and P. Sallee, editors, Proc. 8th Information Hiding Workshop, volume 4437 of LNCS, pages 265--281. Springer, 2006. Google ScholarDigital Library
- A. D. Ker. Batch steganography and the threshold game. In E. Delp III and P. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505 of Proc. SPIE, pages 0401--0413. SPIE, 2007.Google Scholar
- A. D. Ker. Perturbation hiding and the batch steganography problem. In K. Solanki, K. Sullivan, and U. Madhow, editors, Proc. 10th Information Hiding Workshop, volume 5284 of LNCS, pages 45--59. Springer, 2008. Google ScholarDigital Library
- A. D. Ker and T. Pevný. A new paradigm for steganalysis via clustering. In N. Memon, J. Dittmann, A. Alattar, and E. Delp III, editors, Media Watermarking, Security, and Forensics XIII, volume 7880 of Proc. SPIE, pages 0U01--0U13. SPIE, 2011.Google Scholar
- A. D. Ker and T. Pevný. Identifying a steganographer in realistic and heterogeneous data sets. In N. Memon, A. Alattar, and E. Delp III, editors, Media Watermarking, Security, and Forensics XIV, volume 8303 of Proc. SPIE, pages 0N01--0N13. SPIE, 2012.Google Scholar
- J. Kodovský. simulator of the nsF5 algorithm with wet paper codes (released 2008). http://dde.binghamton.edu/download/nsf5simulator/, last accessed April 2012.Google Scholar
- A. Latham. Implementation of the JPHide and JPSeek algorithms ver 0.3 (released August 1999). http://linux01.gwdg.de/ alatham/stego.html, last accessed April 2012.Google Scholar
- T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In P. W. L. Fong, R. Böhme, and R. Safavi-Naini, editors, Proc. 12th Information Hiding Workshop, volume 6387 of LNCS, pages 161--177. Springer, 2010. Google ScholarDigital Library
- T. Pevný and J. Fridrich. Merging Markov and DCT features for multi-class JPEG steganalysis. In E. J. Delp III and P. W. Wong, editors, Media Watermarking, Security, and Forensics IX, volume 6505, pages 03--14. SPIE, 2007.Google Scholar
- T. Pevný, J. Fridrich, and A. D. Ker. From blind to quantitative steganalysis. Information Forensics and Security, IEEE Transactions on, 7(2):445--454, 2012.Google ScholarDigital Library
- N. Provos. Defending against statistical steganalysis. In Proc. 10th Conference on USENIX Security Symposium - Volume 10, SSYM, pages 323--335. USENIX Association, 2001. Google ScholarDigital Library
- N. Provos. Implementation of the OutGuess algorithm ver. 2.0 (released October 2001). http://www.outguess.org/, last accessed April 2012.Google Scholar
- D. Upham. Implementation of the JSteg steganographic algorithm. http://zooid.org/ paul/crypto/jsteg/, last accessed on April 2012.Google Scholar
- A. Westfeld. F5-a steganographic algorithm. In I. Moskowitz, editor, Proc. 4th Information Hiding Workshop, volume 2137 of LNCS, pages 289--302. Springer, 2001. Google ScholarDigital Library
- A. Westfeld. Implementation of the F5 steganographic algorithm (released May 2011). http://code.google.com/p/f5-steganography/, last accessed April 2012.Google Scholar
Index Terms
- Batch steganography in the real world
Recommendations
Reversible data hiding scheme with high payload for JPEG images
ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and CommunicationIn 2008 Lin et al. proposed a reversible steganographic method with a high payload for JPEG images. Because modifying the quantized DCT coefficients may lead to serious image distortion, Lin et al. embedded the secrets into the middle frequency of the ...
Developing an adaptive DCT-based steganography method using a genetic algorithm
AbstractSteganography is an appropriate approach to establish a secure connection between the sender and the receiver. Data embedding in Discrete Cosine Transform (DCT) coefficients for JPEG images is one of the most practical approaches nowadays. In this ...
Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation
This article describes how the existing distortion functions for JPEG steganography allot same cost for ±1 embedding changes. Because of the correlation of natural image, however, changes with different polarities make different influences on image. ...
Comments