Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2037252.2037266acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

On dangers of overtraining steganography to incomplete cover model

Published: 29 September 2011 Publication History

Abstract

A modern direction in steganography calls for embedding while minimizing a distortion function defined in a sufficiently complex model space. In this paper we show that, quite surprisingly, even a high-dimensional cover model does not automatically guarantee immunity to simple attacks. Moreover, the security can be compromised if the distortion is optimized to an incomplete cover model. We demonstrate these pitfalls with two recently proposed steganographic schemes and support our arguments experimentally. Finally, we discuss how the corresponding models might be modified to eliminate the security flaws.

References

[1]
R. Böhme. Improved Statistical Steganalysis Using Models of Heterogeneous Cover Signals. PhD thesis, Faculty of Computer Science, Technische Universitat Dresden, Germany, 2008.
[2]
C.-C. Chang and C.-J. Lin. LIBSVM: a library for support vector machines, 2001. Software available at http://www.csie.ntu.edu.tw/ cjlin/libsvm.
[3]
V. Chonev and A. D. Ker. Feature restoration and distortion metrics. In N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII, volume 7880, pages 0G01--0G14, San Francisco, CA, January 23--26, 2011.
[4]
T. Filler and J. Fridrich. Gibbs construction in steganography. IEEE Transactions on Information Forensics and Security, 5(4):705--720, 2010.
[5]
T. Filler and J. Fridrich. Design of adaptive steganographic schemes for digital images. In N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII, volume 7880, pages OF 1--14, San Francisco, CA, January 23--26, 2011.
[6]
T. Filler, J. Judas, and J. Fridrich. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security, 6(1):1--17, 2011.
[7]
T. Filler, T. Pevný, and P. Bas. BOSS (Break Our Steganography System). http://boss.gipsa-lab.grenoble-inp.fr, July 2010.
[8]
J. Fridrich, J. Kodovský, M. Goljan, and V. Holub. Breaking HUGO -- the process discovery. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, Prague, Czech Republic, May 18--20, 2011.
[9]
J. Fridrich, J. Kodovský, M. Goljan, and V. Holub. Steganalysis of content-adaptive steganography in spatial domain. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, Prague, Czech Republic, May 18--20, 2011.
[10]
J. Fridrich, T. Pevný, and J. Kodovský. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In J. Dittmann and J. Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3--14, Dallas, TX, September 20--21, 2007.
[11]
G. Gül and F. Kurugollu. A new methodology in steganalysis : Breaking highly undetactable steganograpy (HUGO). In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, Prague, Czech Republic, May 18--20, 2011.
[12]
A. D. Ker and R. Böhme. Revisiting weighted stego-image steganalysis. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 5 1--5 17, San Jose, CA, January 27--31, 2008.
[13]
Y. Kim, Z. Duric, and D. Richards. Modified matrix encoding technique for minimal distortion steganography. In J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 314--327, Alexandria, VA, July 10--12, 2006. Springer-Verlag, New York.
[14]
J. Kodovský and J. Fridrich. On completeness of feature spaces in blind steganalysis. In A. D. Ker, J. Dittmann, and J. Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 123--132, Oxford, UK, September 22--23, 2008.
[15]
J. Kodovský and J. Fridrich. Calibration revisited. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 63--74, Princeton, NJ, September 7--8, 2009.
[16]
J. Kodovský and J. Fridrich. Steganalysis in high dimensions: Fusing classifiers built on random subspaces. In N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII, volume 7880, pages OL 1--13, San Francisco, CA, January 23--26, 2011.
[17]
T. Pevný, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 5(2):215--224, June 2010.
[18]
T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Workshop, volume 6387 of Lecture Notes in Computer Science, pages 161--177, Calgary, Canada, June 28--30, 2010. Springer-Verlag, New York.
[19]
T. Pevný and J. Fridrich. Merging Markov and DCT features for multi-class JPEG steganalysis. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, pages 3 1--3 14, San Jose, CA, January 29--February 1, 2007.
[20]
V. Sachnev, H. J. Kim, and R. Zhang. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 131--140, Princeton, NJ, September 7--8, 2009.
[21]
Y. Q. Shi, C. Chen, and W. Chen. A Markov process based approach to effective attacking JPEG steganography. In J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 249--264, Alexandria, VA, July 10--12, 2006. Springer-Verlag, New York.

Cited By

View all
  • (2024)Image Steganography Approaches and Their Detection Strategies: A SurveyACM Computing Surveys10.1145/369496557:2(1-40)Online publication date: 10-Oct-2024
  • (2024)Steganography Embedding Cost Learning With Generative Multi-Adversarial NetworkIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.331893919(15-29)Online publication date: 2024
  • (2024)Dual-branch convolutional neural network for robust camera model identificationExpert Systems with Applications10.1016/j.eswa.2023.121828238(121828)Online publication date: Mar-2024
  • Show More Cited By

Index Terms

  1. On dangers of overtraining steganography to incomplete cover model

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM&Sec '11: Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
    September 2011
    140 pages
    ISBN:9781450308069
    DOI:10.1145/2037252
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 September 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cover model
    2. distortion
    3. hugo
    4. overtraining
    5. steganalysis

    Qualifiers

    • Research-article

    Conference

    MM&Sec '11
    Sponsor:
    MM&Sec '11: Multimedia and Security Workshop
    September 29 - 30, 2011
    New York, Buffalo, USA

    Acceptance Rates

    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 14 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Image Steganography Approaches and Their Detection Strategies: A SurveyACM Computing Surveys10.1145/369496557:2(1-40)Online publication date: 10-Oct-2024
    • (2024)Steganography Embedding Cost Learning With Generative Multi-Adversarial NetworkIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.331893919(15-29)Online publication date: 2024
    • (2024)Dual-branch convolutional neural network for robust camera model identificationExpert Systems with Applications10.1016/j.eswa.2023.121828238(121828)Online publication date: Mar-2024
    • (2023)A review of Content Adaptive Image Steganography methodsSignal and Data Processing10.61186/jsdp.20.3.14120:3(141-182)Online publication date: 1-Dec-2023
    • (2023)Lightweight image steganalysis with block-wise pruningScientific Reports10.1038/s41598-023-43386-213:1Online publication date: 26-Sep-2023
    • (2022)The infinite race between steganography and steganalysis in imagesSignal Processing10.1016/j.sigpro.2022.108711201:COnline publication date: 1-Dec-2022
    • (2022)Universal Image Steganalysis Based on Convolutional Neural Network with Global Covariance PoolingJournal of Computer Science and Technology10.1007/s11390-021-0572-037:5(1134-1145)Online publication date: 30-Sep-2022
    • (2021)Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture FeaturesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2020.3004708(1-1)Online publication date: 2021
    • (2020)Feature Aggregation Networks for Image SteganalysisProceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security10.1145/3369412.3395072(33-38)Online publication date: 22-Jun-2020
    • (2020)Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image SteganographyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2019.292944115(867-879)Online publication date: 2020
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media