YASS Yet Another Steganographic Scheme that Resists Blind Steganalysis K. Solanki*, A. Sarkar +, and B. Manjunath + + + Vision Research Laboratory Department.

Slides:



Advertisements
Similar presentations
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Advertisements

Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
F5 A Steganographic Algorithm
Feature-Based Steganalysis for JPEG images and its applications for future design of steganographic schemes. - Jessica Fridrich Submitted by: Praveena.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, ICT '09. TAREK OUNI WALID AYEDI MOHAMED ABID NATIONAL ENGINEERING SCHOOL OF SFAX New Low Complexity.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Error detection and concealment for Multimedia Communications Senior Design Fall 06 and Spring 07.
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li Shanghai Jiao.
1 A Markov Process Based Approach to Effective Attacking JPEG Steganography By Y. Q. Shi, Chunhua Chen, Wen Chen NJIT Presented by Hanlin Hu and Xiao Zhang.
ECE643 DIGITAL IMAGE PROCESSING Steganalysis versus Splicing detection Paper by: Yun Q. Shi, Chunhua Chen, Guorong Xuan and Wei Su By: Nehal Patel Siddharth.
Fifth International Conference on Information
Adaptive MPEG-2 Video Data Hiding Scheme Anindya Sarkar, Upmanyu Madhow, Shivkumar Chandrasekaran, B. S. Manjunath Presented by: Anindya Sarkar Vision.
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Further Study on YASS: Steganography Based on Randomized Embedding to Resists Blind Steganalysis A. Sarkar +, K. Solanki*, and B. Manjunath Vision.
Yun CAO Xianfeng ZHAO Dengguo FENG Rennong SHENG Video Steganography with Perturbed Motion Estimation.
A Review on: Spread Spectrum Watermarking Techniques
Digital Watermarking Parag Agarwal
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
Compression video overview 演講者:林崇元. Outline Introduction Fundamentals of video compression Picture type Signal quality measure Video encoder and decoder.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Introduction to Steganalysis Schemes Multimedia Security.
Detection of Image Alterations Using Semi-fragile Watermarks
Benchmarking steganographic and steganalysis techniques Electronic Imaging of SPIE 2005 Authors:Kharrazi, Mehdi, Husrev T. Sencar, and Nasir Memon Department.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Advanced Science and Technology Letters Vol.35(Security 2013), pp Image Steganograpy via Video Using Lifting.
1 A Markov Process Based Approach to Effective Attacking JPEG Steganography By Y. Q. Shi, Chunhua Chen, Wen Chen NJIT Presented by Ashish Ratnakar and.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
DEPARTMENT OF ECE, BEC, BAGALKOT
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Vishal Monga, Divyanshu Vats and Brian L. Evans
Wavelets : Introduction and Examples
Model-based Steganography
Visit for more Learning Resources
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Steganography with Digital Images
Deep Learning Hierarchical Representations for Image Steganalysis
A Digital Watermarking Scheme Based on Singular Value Decomposition
Steganography in digital images
Parag Agarwal Digital Watermarking Parag Agarwal
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Multimedia Data Hiding: What, Why, and How?
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Data Hiding Scheme Based Upon Block Truncation Coding
JPEG Steganalysis Statistical Offset Tests
Department of Computer Science, University of Central Florida ,Orlando
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

YASS Yet Another Steganographic Scheme that Resists Blind Steganalysis K. Solanki*, A. Sarkar +, and B. Manjunath Vision Research Laboratory Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 93106, USA * * Mayachitra, Inc Hollister Ave. Santa Barbara, CA-93111, USA

Steganography: Art and science of covert communication  Steganographic security: Cachin’s criteria  Kullback-Leibler divergence smaller than epsilon  Inherently assumes availability of “natural” distributions  Statistical steganalysis  Suspected stego signal evaluated against assumed or computed cover distribution June 11,

Steganalysis: Winning the battle?  Blind Statistical steganalysis  Uses supervised learning on specific image features  Self-calibration mechanism used to ensure that features capture changes due to embedding only. E.g. Cropping a few pixel rows and/or columns  Recent results close to perfect  [Pevny and Fridrich ‘07]: can reliably determine which stego scheme was used (out of 5) with >95% accuracy June 11,

YASS: “Stirmark of Steganography”  Idea: Desynchronize the steganalyst by randomizing the embedding locations  Disables the self-calibration process  But, must advertize or ship the image in a standard format (such as JPEG)  Causes errors in the recovered bits  Use erasures and errors correcting codes  Previously employed for high-volume hiding June 11, A recipe for resisting blind steganalysis

A peek at the Results Can resist several recent steganalysis techniques  JPEG steganalysis with self-calibration  Pevny and Fridrich’s 23-dim features (SPIE’06) and their more recent 276-dim feature (SPIE’07)  Farid’s 72-dim features  DCT histogram-based features  Spatial domain steganalysis  Xuan et al’s 39-dim features based on wavelet characteristic functions (IH ‘05)  JPEG steganalysis based on above features  Chen et al’s 324-dim features (ICIP ‘06) June 11,

Outline  Introduction  Related Work  Resisting Blind Steganalysis  YASS for JPEG Steganography  Results  Discussion  Future Work June 11,

Outline  Introduction  Related Work  Steganography  Steganalysis  Resisting Blind Steganalysis  YASS for JPEG Steganography  Results  Discussion  Future Work June 11,

Related work  JPEG Steganography: Schemes that match or restore marginal statistics  Sallee’s model based methods (MB1 and MB2)  Fridrich et al’s Perturbed Quantization (PQ)  Solanki et al’s Statistical Restoration schemes  OutGuess, StegHide  Matrix embedding schemes (such as F5)  Steganalysis schemes  Many related schemes already listed earlier June 11,

Outline  Introduction  Related Work  Resisting Blind Steganalysis  How blind steganalysis schemes work  Can we defeat them? How?  YASS for JPEG Steganography  Results  Discussion  Future Work June 11,

Blind Steganalysis: Key Ingredients 1.Self-calibration mechanism  Used to estimate the cover image statistics from the stego image  For JPEG steganography: Crop a few pixel rows or columns and recompress 2.Features capturing cover memory  Most stego scheme hide data on a per-symbol basis  Higher order dependencies harder to match or restore 3.Powerful machine learning  Ensures that even the slightest statistical variation in the features is learned by the machine June 11,

Blind steganalysis is quite successful  Self-calibration process is perhaps the most important ingredient  Derived features are insensitive to image content, but quite sensitive to embedding changes  Steganalysis successful in spite of unavailability of universal image models  Results presented in [Pevny and Fridrich, SPIE ‘07] are close to perfect! June 11,

So, What can the steganographer do?  Preserve all the features of the image…  Is this practically feasible?  How does it affect the embedding rate?  But, lets not forget: The steganalyst must depend on the stego image to estimate the cover image statistics  Way out: Embed data in a way that distorts the steganalyst’s estimate of the cover image statistics June 11,

Distorting Steganalyst’s Estimate  Hiding with high embedding strength  Cover image statistics can no longer be reliably derived from the available stego image  Also observed and reported in recent work by Kharrazi, Sencar, and Memon (ICIP ‘06)  Randomized hiding  The algorithm to estimate the cover statistics can be effectively disabled  Can randomize the hiding location, the choice of transform domain, the coefficient, or even the hiding method June 11, Disadvantages 1.Likelihood of high perceptual distortion 2.Possibility of data being detected by universal image models Our Choice! Simple implementation explored in this work: Hide in random locations

Outline  Introduction  Related Work  Resisting Blind Steganalysis  YASS for JPEG Steganography  Results  Discussion  Future Work June 11,

YASS for JPEG Steganography  Idea: Embed data in randomized block locations  The blocks do not coincide with the JPEG 8x8 grid  Errors caused due to initial JPEG compression after embedding data  Use erasures and errors correcting codes June 11,

YASS Embedding: JPEG Grid June 11, pixels

YASS Embedding June 11, B x B block Here, B=10 B is called “big block size” Example grid used in embedding Randomized block location

Reduction in Embedding Rate  Wasted real estate of the image  Due to choice of bigger blocks  Can reduce this wastage by putting more than one blocks in larger bigger blocks Eg 16 blocks in 34x34 sized block  Errors due to initial JPEG compression  Use erasures and errors correcting codes  Previously employed in [Solanki et al, Trans. Image Pro. Dec 2004] June 11,

Advantages of Coding Framework  Robustness against initial JPEG compression  Enabling active steganography by providing robustness against distortion constrained attacks  Allows choice of embedding locations to reduce perceptual distortion  Do not hide in zero valued DCT coefficients June 11,

Outline  Introduction  Related Work  Resisting Blind Steganalysis  YASS for JPEG Steganography  Results  Discussion  Future Work June 11,

Results  Experimental Set-up  Embedding volume  Performance against steganalysis  Comparison with competing methods  Control experiment: Comparison with standard hiding at same rate June 11,

Experimental Set-up June 11, Database of > 2000 images Hide Data Training Testing Use Supervised learning for steganalysis Two Datasets: TIFF images JPEG images

Results  Experimental Set-up  Embedding volume  Performance against steganalysis  Comparison with competing methods  Control experiment: Comparison with standard hiding at same rate June 11,

Embedding volume June 11, Embedding volume for some standard 512x512 images: QF h = design quality factor used for embedding QF a = output JPEG quality factor Number of bits are the number of information bits providing error-free recovery

Hiding Rate for Lenna Image June 11, bpnc = bits per non-zero coefficients

Results  Experimental Set-up  Embedding volume  Performance against steganalysis  Comparison with competing methods  Control experiment: Comparison with standard hiding at same rate June 11,

Steganalysis schemes  Farid: 72-dimensional feature vector based on moments in the wavelet domain  PF-23: Pevny and Fridrich’s 23-dimensional DCT feature vector  PF-274: Pevny and Fridrich’s 274-dimensional feature vector that merges Markov and DCT features  DCT hist.: Histogram of DCT coefficients from a low- frequency band  Xuan-39: Spatial domain steganalysis proposed by Xuan et al  Chen-324: JPEG steganalysis based on statistical moments of wavelet characteristic functions June 11,

JPEG dataset June 11,

June 11, TIFF dataset: Similar results

Results  Experimental Set-up  Embedding volume  Performance against steganalysis  Comparison with competing methods  Control experiment: Comparison with standard hiding at same rate June 11,

Comparison with competing methods  Compared the method with OutGuess and StegHide  Ensured that the hiding rates are equivalent  Not straightforward since YASS uses error correcting codes  The code rate 1/q determines the embedding rate  Tested for q=10 and q=40 June 11,

Comparison with OutGuess and StegHide June 11, YASS is undetectable for most configurations for these steganalysis schemes, while competing methods are detectable at the same hiding rates! F5, using matrix embedding, performs equivalent to YASS at equivalent hiding rates

Results  Experimental Set-up  Embedding volume  Performance against steganalysis  Comparison with competing methods  Control experiment: Comparison with standard hiding at same rate June 11,

Control experiment: Standard hiding  Is the good performance of YASS simply due to lowered embedding rate?  Control experiment: Compare with naïve hiding scheme  Hide in random frequency locations (termed RF scheme)  Trivial embedding efficiency of 2 bits/coefficient  Tested hiding rates  2 bits per 64 (8x8 block), 1 bit per 64, and 1 per 128 coefficients June 11,

YASS verses RF June 11, It can be seen that the naive RF scheme performs quite well, however, the performance of YASS is consistently better.

Outline  Introduction  Related Work  Resisting Blind Steganalysis  YASS for JPEG Steganography  Results  Discussion  Future Work June 11,

Change Rate and Embedding Efficiency  Change rate: Number of coefficients modified during the embedding process  Embedding efficiency: Number of bits hidden per coefficient changed  Change rate is encoder’s budget; it can be “used”  To provide robustness by using redundancy and giving up some embedding efficiency  To improve the embedding efficiency via matrix embedding but causing an increase in the fragility of the system  YASS goes the first way… June 11,

YASS and Matrix Embedding  The hiding rate of YASS is relatively low  At these hiding rates, equivalent level of steganographic security can be achieved by using matrix embedding  An advantage of YASS is that it can provide robustness against distortion constrained attacks June 11,

Outline  Introduction  Related Work  Resisting Blind Steganalysis  YASS for JPEG Steganography  Results  Discussion  Future Work June 11,

Future Work  Improve the embedding rate  Test for an active steganographic framework  Explore other avenues of randomization  Embedding method  Transform domain  How can this scheme be detected? June 11,

Thank you MATLAB code available at