Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3369412.3395075acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
short-paper

Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images

Published: 23 June 2020 Publication History

Abstract

This short paper presents a novel method for steganography in JPEG-compressed images, extended the so-called MiPOD scheme based on minimizing the detection accuracy of the most-powerful test using a Gaussian model of independent DCT coefficients. This method is also applied to address the problem of embedding into color JPEG images. The main issue in such case is that color channels are not processed in the same way and, hence, a statistically based approach is expected to bring significant improvements when one needs to consider heterogeneous channels together.
The results presented show that, on the one hand, the extension of MiPOD for JPEG domain, referred to as J-MiPOD, is very competitive as compared to current state-of-the-art embedding schemes. On the other hands, we also show that addressing the problem of embedding in JPEG color images is far from being straightforward and that future works are required to understand better how to deal with color channels in JPEG images.

References

[1]
P. Bas, T. Filler, and T. Pevný. 2011. Break Our Steganographic System -- the ins and outs of organizing BOSS. In 13th International Workshop. LNCS vol. 6958, Springer-Verlag, New York, Prague, Czech Republic, 59--70.
[2]
M. Boroumand, M. Chen, and J. Fridrich. 2018. Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, Vol. 14, 5 (2018), 1181--1193.
[3]
R. Cogranne, Q. Giboulot, and P. Bas. 2019. The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security (Paris, France) ACM, 125--137. https://doi.org/10.1145/3335203.3335726%
[4]
R. Cogranne, V. Sedighi, and J. Fridrich. 2017. Practical strategies for content-adaptive batch steganography and pooled steganalysis. In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 2122--2126. https://doi.org/10.1109/ICASSP.2017.7952531%
[5]
R. Cogranne, V. Sedighi, J. Fridrich, and Tomávs Pevný. 2015. Is Ensemble Classifier Needed for Steganalysis in High-Dimensional Feature Spaces?. In Information Forensics and Security (WIFS), IEEE 7th International Workshop on (Italy).
[6]
T. Denemark and J. Fridrich. 2017. Model based steganography with precover. Electronic Imaging, Vol. 2017, 7 (2017), 56--66.
[7]
T. Filler, J. Judas, and J. Fridrich. 2011. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes. Information Forensics and Security, IEEE Transactions on, Vol. 6, 3 (2011), 920--935. https://doi.org/10.1109/TIFS.2011.2134094
[8]
J. Fridrich and J. Kodovskỳ. 2012. Rich Models for Steganalysis of Digital Images. Information Forensics and Security, IEEE Transactions on, Vol. 7, 3 (june 2012), 868 --882. https://doi.org/10.1109/TIFS.2012.2190402
[9]
J. Fridrich and J. Kodovskỳ. 2013. Multivariate Gaussian model for designing additive distortion for steganography. In 2013 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 2949--2953.
[10]
Q. Giboulot, R. Cogranne, and P. Bas. 2020. JPEG Steganography with side Information from the Processing Pipeline. In International Conference on Acoustics, Speech, and Signal Processing (ICASSP), IEEE, Barcelone, Spain. https://hal-utt.archives-ouvertes.fr/hal-02470179% %
[11]
M. Goljan and J. Fridrich. 2015. CFA-aware features for steganalysis of color images. In Media Watermarking, Security, and Forensics 2015, Proc. SPIE, Vol. 9409.
[12]
L. Guo, J. Ni, W. Su, C. Tang, and Y.-Q. Shi. 2015. Using statistical image model for JPEG steganography: uniform embedding revisited. IEEE Transactions on Information Forensics and Security, Vol. 10, 12 (2015), 2669--2680.
[13]
V. Holub and J. Fridrich. 2015. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT. Information Forensics and Security, IEEE Transactions on, Vol. 10, 2 (Feb 2015), 219--228. https://doi.org/10.1109/TIFS.2014.2364918
[14]
V. Holub, J. Fridrich, and T. Denemark. 2014. Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security, Vol. 2014, 1 (2014), 1--13. https://doi.org/10.1186/1687--417X-2014--1
[15]
A. D. Ker, & al. 2013. Moving steganography and steganalysis from the laboratory into the real world. In Proceedings of the first ACM workshop on Information hiding and multimedia security (Montpellier, France). ACM, 45-58. https://doi.org/10.1145/2482513.2482965%
[16]
M. Kirchner and R. Böhme. 2014. "Steganalysis in Technicolor" Boosting WS detection of stego images from CFA-interpolated covers. In 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 3982--3986.
[17]
B. Li, M. Wang, J. Huang, and X. Li. 2014. A new cost function for spatial image steganography. In International Conference on Image Processing. IEEE, 4206--4210.
[18]
T. Pevný, P. Bas, and J. Fridrich. 2010. Steganalysis by Subtractive Pixel Adjacency Matrix. IEEE Trans. Inform. Forensics and Security, Vol. 5, 2 (2010), 215--224.
[19]
V. Sedighi, R. Cogranne, and J. Fridrich. 2016. Content-Adaptive Steganography by Minimizing Statistical Detectability. IEEE Transactions on Information Forensics and Security, Vol. 11, 2 (Feb 2016), 221--234. https://doi.org/10.1109/TIFS.2015.2486744
[20]
G. Simmons. 1983. The prisoners problem and the subliminal channel. CRYPTO (1983), 51--67.
[21]
T. Taburet, Louis Filstroff, Patrick Bas, and Wadih Sawaya. 2018. An empirical study of steganography and steganalysis of color images in the JPEG domain. In International Workshop on Digital Watermarking. Springer, 290--303.
[22]
Than Han Thai, Rémi Cogranne, and Florent Retraint. 2014. Camera Model Identification Based on the Heteroscedastic Noise Model. Image Processing, IEEE Transactions on, Vol. 23, 1 (2014), 250--263. https://doi.org/10.1109/TIP.2013.2290596
[23]
T. Taburet, P. Bas, W. Sawaya, and J. Fridrich. 2020. Natural Steganography in JPEG Domain with a Linear Development Pipeline. arXiv preprint arXiv:2001.02653 (2020).
[24]
S. Vahid, J. Fridrich, and R. Cogranne. 2015. Content-Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model. Media Watermarking, Security, and Forensics 2015, Proc. SPIE, Vol. 9409.
[25]
M. Yedroudj, F. Comby, and M. Chaumont. 2018. Yedroudj-net: An efficient CNN for spatial steganalysis. In Intl Conference on Acoustics, Speech and Signal Processing. IEEE.

Cited By

View all
  • (2024)Errorless robust JPEG steganography using steganographic polar codesEURASIP Journal on Information Security10.1186/s13635-024-00173-42024:1Online publication date: 4-Jul-2024
  • (2024)Image Steganography Approaches and Their Detection Strategies: A SurveyACM Computing Surveys10.1145/369496557:2(1-40)Online publication date: 10-Oct-2024
  • (2024)Single-image steganalysis in real-world scenarios based on classifier inconsistency detectionProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670911(1-6)Online publication date: 30-Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IH&MMSec '20: Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security
June 2020
177 pages
ISBN:9781450370509
DOI:10.1145/3369412
Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 June 2020

Permissions

Request permissions for this article.

Check for updates

Badges

  • Best Paper

Author Tags

  1. JPEG compression
  2. color images
  3. model-based embedding
  4. steganalysis
  5. steganography

Qualifiers

  • Short-paper

Funding Sources

Conference

IH&MMSec '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)36
  • Downloads (Last 6 weeks)8
Reflects downloads up to 01 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Errorless robust JPEG steganography using steganographic polar codesEURASIP Journal on Information Security10.1186/s13635-024-00173-42024:1Online publication date: 4-Jul-2024
  • (2024)Image Steganography Approaches and Their Detection Strategies: A SurveyACM Computing Surveys10.1145/369496557:2(1-40)Online publication date: 10-Oct-2024
  • (2024)Single-image steganalysis in real-world scenarios based on classifier inconsistency detectionProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670911(1-6)Online publication date: 30-Jul-2024
  • (2024)Are Deepfakes a Game-changer in Digital Images Steganography Leveraging the Cover-Source-Mismatch?Proceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670893(1-9)Online publication date: 30-Jul-2024
  • (2024)Toward Secure and Robust Steganography for Black-Box Generated ImagesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.336122019(3237-3250)Online publication date: 2024
  • (2024)Toward Hybrid Classical Deep Learning-Quantum Methods for SteganalysisIEEE Access10.1109/ACCESS.2024.338161512(45238-45252)Online publication date: 2024
  • (2024)Lightweight JPEG image steganalysis using dilated blind-spot networkJournal of Visual Communication and Image Representation10.1016/j.jvcir.2024.104182(104182)Online publication date: May-2024
  • (2024)DCANet: CNN model with dual-path network and improved coordinate attention for JPEG steganalysisMultimedia Systems10.1007/s00530-024-01433-630:4Online publication date: 1-Aug-2024
  • (2023)Side-Informed Steganography for JPEG Images by Modeling Decompressed ImagesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.326888418(2683-2695)Online publication date: 2023
  • (2023)Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust SteganographyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.322690418(501-516)Online publication date: 2023
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media