Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3531536.3532955acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Fighting the Reverse JPEG Compatibility Attack: Pick your Side

Published: 23 June 2022 Publication History

Abstract

In this work we aim to design a steganographic scheme undetectable by the Reverse JPEG Compatibility Attack (RJCA). The RJCA, while only effective for JPEG images compressed with quality factors 99 and 100, was shown to work mainly due to change in variance of the rounding errors after decompression of the DCT coefficients, which is induced by embedding changes incompatible with the JPEG format. One remedy to preserve the aforementioned format is utilizing during the embedding the rounding errors created during the JPEG compression, but no steganographic method is known to be resilient to RJCA without this knowledge. Inspecting the effect of embedding changes on variance and also mean of decompression rounding errors, we propose a steganographic method allowing resistance against RJCA without any side-information. To resist RJCA, we propose a distortion metric making all embedding changes within a DCT block dependent, resulting in a lattice-based embedding. Then it turns out it is enough to cleverly pick the side of the (binary) embedding changes through inspection of their effect on the variance of decompression rounding errors and simply use uniform costs in order to enforce their sparsity across DCT blocks. To increase security against detectors in the spatial (pixel) domain, we show an easy way of combining the proposed methodology with steganography designed for spatial domain security, further improving the undetectability for quality factor 99. The improvements over existing non-informed steganography are up to 40% in terms of detector's accuracy.

References

[1]
P. Bas, T. Filler, and T. Pevný. Break our steganographic system -- the ins and outs of organizing BOSS. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Conference, volume 6958 of Lecture Notes in Computer Science, pages 59--70, Prague, Czech Republic, May 18--20, 2011.
[2]
S. Bernard, P. Bas, J. Klein, and T. Pevný. Explicit optimization of min max steganographic game. IEEE Transactions on Information Forensics and Security, 16:812--823, 2021.
[3]
S. Bernard, P. Bas, T. Pevný, and J. Klein. Optimizing additive approximations of non-additive distortion functions. In D. Borghys and P. Bas, editors, The 9th ACM Workshop on Information Hiding and Multimedia Security, Brussels, Belgium, June 21--25, 2021. ACM Press.
[4]
S. Bernard, T. Pevný, P. Bas, and J. Klein. Exploiting adversarial embeddings for better steganography. In R. Cogranne and L. Verdoliva, editors, The 7th ACM Workshop on Information Hiding and Multimedia Security, Paris, France, July 3--5, 2019. ACM Press.
[5]
M. Boroumand, M. Chen, and J. Fridrich. Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 14(5):1181--1193, May 2019.
[6]
J. Butora and J. Fridrich. Reverse JPEG compatibility attack. IEEE Transactions on Information Forensics and Security, 15:1444--1454, 2020.
[7]
J. Butora, Y. Yousfi, and J. Fridrich. Turning cost-based steganography into model-based. In C. Riess and F. Schirrmacher, editors, The 8th ACM Workshop on Information Hiding and Multimedia Security, Denver, CO, June 22--25, 2020. ACM Press.
[8]
J. Butora, Y. Yousfi, and J. Fridrich. How to pretrain for steganalysis. In The 9th ACM Workshop on Information Hiding and Multimedia Security, Brussels, Belgium, June 21--25, 2021.
[9]
K. Chubachi. An ensemble model using CNNs on different domains for ALASKA2 image steganalysis. In IEEE International Workshop on Information Forensics and Security, New York, NY, December 6--11, 2020.
[10]
R. Cogranne. Selection-channel-aware reverse JPEG compatibility for highly reliable steganalysis of JPEG images. In Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing, pages 2772--2776, Barcelona, Spain, May 4--8, 2020.
[11]
R. Cogranne, Q. Giboulot, and P. Bas. The ALASKA steganalysis challenge: A first step towards steganalysis "Into the wild". In R. Cogranne and L. Verdoliva, editors, The 7th ACM Workshop on Information Hiding and Multimedia Security, Paris, France, July 3--5, 2019. ACM Press.
[12]
R. Cogranne, Q. Giboulot, and P. Bas. ALASKA--2: Challenging academic research on steganalysis with realistic images. In IEEE International Workshop on Information Forensics and Security, New York, NY, December 6--11, 2020.
[13]
R. Cogranne, Q. Giboulot, and P. Bas. Steganography by minimizing statistical detectability: The cases of jpeg and color images. In C. Riess and F. Schirrmacher, editors, The 8th ACM Workshop on Information Hiding and Multimedia Security, Denver, CO, 2020. ACM Press.
[14]
J. Deng, W. Dong, R. Socher, L. Li, K. Li, and L. Fei-Fei. ImageNet: A large-scale hierarchical image database. In IEEE conference on computer vision and pattern recognition, pages 248--255, June 20--25, 2009.
[15]
T. Filler and J. Fridrich. Fisher information determines capacity of ?-secure steganography. In S. Katzenbeisser and A.-R. Sadeghi, editors, Information Hiding, 11th International Conference, volume 5806 of Lecture Notes in Computer Science, pages 31--47, Darmstadt, Germany, June 7--10, 2009. Springer-Verlag, New York.
[16]
J. Fridrich, M. Goljan, D. Soukal, and P. Lisonek. Writing on wet paper. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 328--340, San Jose, CA, January 16--20, 2005.
[17]
J. Fridrich and J. Kodovský. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 7(3):868--882, June 2011.
[18]
J. Fridrich and J. Kodovský. Multivariate Gaussian model for designing additive distortion for steganography. In Proc. IEEE ICASSP, Vancouver, BC, May 26--31, 2013.
[19]
L. Guo, J. Ni, W. Su, C. Tang, and Y. Shi. Using statistical image model for JPEG steganography: Uniform embedding revisited. IEEE Transactions on Information Forensics and Security, 10(12):2669--2680, 2015.
[20]
V. Holub and J. Fridrich. Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Transactions on Information Forensics and Security, 10(2):219--228, February 2015.
[21]
V. Holub, J. Fridrich, and T. Denemark. Universal distortion design for steganography in an arbitrary domain. EURASIP Journal on Information Security, Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop, 2014:1, 2014.
[22]
A. D. Ker. Estimating steganographic fisher information in real images. In S. Katzenbeisser and A.-R. Sadeghi, editors, Information Hiding, 11th International Conference, volume 5806 of Lecture Notes in Computer Science, pages 73--88, Darmstadt, Germany, June 7--10, 2009. Springer-Verlag, New York.
[23]
A. D. Ker, T. Pevný, and P. Bas. Rethinking optimal embedding. In F. Perez-Gonzales, F. Cayre, and P. Bas, editors, The 4th ACM Workshop on Information Hiding and Multimedia Security, pages 93--102, Vigo, Spain, June 20--22, 2016. ACM Press.
[24]
J. Kodovský and J. Fridrich. Steganalysis of JPEG images using rich models. In A. Alattar, N. D. Memon, and E. J. Delp, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2012, volume 8303, pages 0A 1--13, San Francisco, CA, January 23--26, 2012.
[25]
B. Li, M. Wang, and J. Huang. A new cost function for spatial image steganography. In Proceedings IEEE, International Conference on Image Processing, ICIP, Paris, France, October 27--30, 2014.
[26]
T. Mingxing and V. L. Quoc. EfficientNet: Rethinking model scaling for convolutional neural networks. In Proceedings of the 36th International Conference on Machine Learning, ICML, volume 97, pages 6105--6114, June 9--15, 2019.
[27]
V. Sedighi, R. Cogranne, and J. Fridrich. Content-adaptive steganography by minimizing statistical detectability. IEEE Transactions on Information Forensics and Security, 11(2):221--234, 2015.
[28]
X. Song, F. Liu, C. Yang, X. Luo, and Y. Zhang. Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In P. Comesana, J. Fridrich, and A. Alattar, editors, 3rd ACM IH&MMSec. Workshop, Portland, Oregon, June 17--19, 2015.
[29]
W. Tang, B. Li, S. Tan, M. Barni, and J. Huang. CNN-based adversarial embedding for image steganography. IEEE Transactions on Information Forensics and Security, 14(8):2074--2087, 2019.
[30]
G. Xu, H. Z. Wu, and Y. Q. Shi. Structural design of convolutional neural networks for steganalysis. IEEE Signal Processing Letters, 23(5):708--712, May 2016.
[31]
J. Ye, J. Ni, and Y. Yi. Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security, 12(11):2545--2557, November 2017.
[32]
M. Yedroudj, F. Comby, and M. Chaumont. Yedroudj-net: An efficient CNN for spatial steganalysis. In IEEE ICASSP, pages 2092--2096, Alberta, Canada, April 15--20, 2018.
[33]
Y. Yousfi, J. Butora, Q. Giboulot, and J. Fridrich. Breaking ALASKA: Color separation for steganalysis in JPEG domain. In R. Cogranne and L. Verdoliva, editors, The 7th ACM Workshop on Information Hiding and Multimedia Security, Paris, France, July 3--5, 2019. ACM Press.
[34]
Y. Yousfi, J. Butora, E. Khvedchenya, and J. Fridrich. Imagenet pre-trained cnns for jpeg steganalysis. In IEEE International Workshop on Information Forensics and Security, New York, NY, December 6--11, 2020.

Cited By

View all
  • (2024)Size-Independent Reliable CNN for RJCA SteganalysisIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.337984919(4420-4431)Online publication date: 2024
  • (2023)Side-Informed Steganography for JPEG Images by Modeling Decompressed ImagesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.326888418(2683-2695)Online publication date: 1-Jan-2023
  • (2023)A New Approach for JPEG Steganalysis with a Cognitive Evolving Ensembler and Robust Feature SelectionCognitive Computation10.1007/s12559-022-10087-315:2(751-764)Online publication date: 9-Jan-2023

Index Terms

  1. Fighting the Reverse JPEG Compatibility Attack: Pick your Side

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IH&MMSec '22: Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security
      June 2022
      177 pages
      ISBN:9781450393553
      DOI:10.1145/3531536
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 23 June 2022

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. RJCA
      2. binary embedding
      3. rounding errors
      4. steganography

      Qualifiers

      • Research-article

      Conference

      IH&MMSec '22
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 128 of 318 submissions, 40%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)11
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 18 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Size-Independent Reliable CNN for RJCA SteganalysisIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.337984919(4420-4431)Online publication date: 2024
      • (2023)Side-Informed Steganography for JPEG Images by Modeling Decompressed ImagesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.326888418(2683-2695)Online publication date: 1-Jan-2023
      • (2023)A New Approach for JPEG Steganalysis with a Cognitive Evolving Ensembler and Robust Feature SelectionCognitive Computation10.1007/s12559-022-10087-315:2(751-764)Online publication date: 9-Jan-2023

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media