1 A Markov Process Based Approach to Effective Attacking JPEG Steganography By Y. Q. Shi, Chunhua Chen, Wen Chen NJIT Presented by Hanlin Hu and Xiao Zhang.

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
Steganography Sami Dokheekh.
Object Specific Compressed Sensing by minimizing a weighted L2-norm A. Mahalanobis.
Image classification Given the bag-of-features representations of images from different classes, how do we learn a model for distinguishing them?
F5 A Steganographic Algorithm
F5 a Steganographic algorithm - andreas westfeld
Feature-Based Steganalysis for JPEG images and its applications for future design of steganographic schemes. - Jessica Fridrich Submitted by: Praveena.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Machine learning continued Image source:
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack 42 nd Hawaii International Conference on System Sciences, Electrical.
ECE643 DIGITAL IMAGE PROCESSING Steganalysis versus Splicing detection Paper by: Yun Q. Shi, Chunhua Chen, Guorong Xuan and Wei Su By: Nehal Patel Siddharth.
Discriminative and generative methods for bags of features
Image classification Given the bag-of-features representations of images from different classes, how do we learn a model for distinguishing them?
Support Vector Machines (SVMs) Chapter 5 (Duda et al.)
Reduced Support Vector Machine
Texture Classification Using QMF Bank-Based Sub-band Decomposition A. Kundu J.L. Chen Carole BakhosEvan Kastner Dave AbramsTommy Keane Rochester Institute.
Basic Concepts and Definitions Vector and Function Space. A finite or an infinite dimensional linear vector/function space described with set of non-unique.
CMPT 365 Multimedia Systems
Further Study on YASS: Steganography Based on Randomized Embedding to Resists Blind Steganalysis A. Sarkar +, K. Solanki*, and B. Manjunath Vision.
Image and Video Compression
Still Image Conpression JPEG & JPEG2000 Yu-Wei Chang /18.
Yun CAO Xianfeng ZHAO Dengguo FENG Rennong SHENG Video Steganography with Perturbed Motion Estimation.
Lossy Compression Based on spatial redundancy Measure of spatial redundancy: 2D covariance Cov X (i,j)=  2 e -  (i*i+j*j) Vertical correlation   
A Review on: Spread Spectrum Watermarking Techniques
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
Identifying Computer Graphics Using HSV Model And Statistical Moments Of Characteristic Functions Xiao Cai, Yuewen Wang.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 8 – JPEG Compression (Part 3) Klara Nahrstedt Spring 2012.
Linear hyperplanes as classifiers Usman Roshan. Hyperplane separators.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
ECE 8443 – Pattern Recognition LECTURE 03: GAUSSIAN CLASSIFIERS Objectives: Normal Distributions Whitening Transformations Linear Discriminants Resources.
CSE 473/573 Computer Vision and Image Processing (CVIP) Ifeoma Nwogu Lecture 24 – Classifiers 1.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Texture. Texture is an innate property of all surfaces (clouds, trees, bricks, hair etc…). It refers to visual patterns of homogeneity and does not result.
1 SUPPORT VECTOR MACHINES İsmail GÜNEŞ. 2 What is SVM? A new generation learning system. A new generation learning system. Based on recent advances in.
Kernel Methods A B M Shawkat Ali 1 2 Data Mining ¤ DM or KDD (Knowledge Discovery in Databases) Extracting previously unknown, valid, and actionable.
Indiana University Purdue University Fort Wayne Hongli Luo
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Classifiers Given a feature representation for images, how do we learn a model for distinguishing features from different classes? Zebra Non-zebra Decision.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines Siwei Lyu and Hany Farid Department of Computer Science, Dartmouth.
Introduction to Steganalysis Schemes Multimedia Security.
Support Vector Machines Project מגישים : גיל טל ואורן אגם מנחה : מיקי אלעד נובמבר 1999 הטכניון מכון טכנולוגי לישראל הפקולטה להנדסת חשמל המעבדה לעיבוד וניתוח.
Linear hyperplanes as classifiers Usman Roshan. Hyperplane separators.
1/18 New Feature Presentation of Transition Probability Matrix for Image Tampering Detection Luyi Chen 1 Shilin Wang 2 Shenghong Li 1 Jianhua Li 1 1 Department.
Benchmarking steganographic and steganalysis techniques Electronic Imaging of SPIE 2005 Authors:Kharrazi, Mehdi, Husrev T. Sencar, and Nasir Memon Department.
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition Objectives: Elements of a Discrete Model Evaluation.
Page 11/28/2016 CSE 40373/60373: Multimedia Systems Quantization  F(u, v) represents a DCT coefficient, Q(u, v) is a “quantization matrix” entry, and.
Feature Selction for SVMs J. Weston et al., NIPS 2000 오장민 (2000/01/04) Second reference : Mark A. Holl, Correlation-based Feature Selection for Machine.
A Kernel Approach for Learning From Almost Orthogonal Pattern * CIS 525 Class Presentation Professor: Slobodan Vucetic Presenter: Yilian Qin * B. Scholkopf.
Linear hyperplanes as classifiers Usman Roshan. Hyperplane separators.
1 A Markov Process Based Approach to Effective Attacking JPEG Steganography By Y. Q. Shi, Chunhua Chen, Wen Chen NJIT Presented by Ashish Ratnakar and.
Incremental Reduced Support Vector Machines Yuh-Jye Lee, Hung-Yi Lo and Su-Yun Huang National Taiwan University of Science and Technology and Institute.
The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Classification COMP Seminar BCB 713 Module Spring 2011.
YASS Yet Another Steganographic Scheme that Resists Blind Steganalysis K. Solanki*, A. Sarkar +, and B. Manjunath Vision Research Laboratory Department.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
4C8 Dr. David Corrigan Jpeg and the DCT. 2D DCT.
Image Processing Architecture, © Oleh TretiakPage 1Lecture 5 ECEC 453 Image Processing Architecture Lecture 5, 1/22/2004 Rate-Distortion Theory,
CS 9633 Machine Learning Support Vector Machines
Model-based Steganography
An Enhanced Support Vector Machine Model for Intrusion Detection
CMPT 365 Multimedia Systems
Watermarking for Image Authentication ( Fragile Watermarking )
Computer Vision Lecture 16: Texture II
Deep Learning Hierarchical Representations for Image Steganalysis
Steganography in digital images
Image Coding and Compression
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
Department of Computer Science, University of Central Florida ,Orlando
Presentation transcript:

1 A Markov Process Based Approach to Effective Attacking JPEG Steganography By Y. Q. Shi, Chunhua Chen, Wen Chen NJIT Presented by Hanlin Hu and Xiao Zhang

2 Steganalysis: A Markov Process Based Approach Steganography, Different Approaches & Techniques Steganalysis & Previous Work on Steganalysis Markov Process Feature Construction Experiments and Results Discussion and Conclusion

3 What is Steganography ? Art and science of invisible communication to conceive the very existence of hidden messages Images convey large size of message Because of non-stationarity, Image Steganography is hard to attack JPEG is popularly used format for Staganography as it is possible to compress JPEG images up to 1:10 ratio without significant loss

Modern Stego Techniques Outguess F5 MB(model -based)

5 Modern Stego Techniques Outguess  Stego framework is created by embedding hidden data using redundancy of cover image.  Outguess preserves statistics of the BDCT coefficients histogram  Stego takes two measures before embedding data - Redundant BDCT coefficients, which has least effect on cover image. - Adjusts the untouched coefficients.

6 Modern Stego Techniques (cont’d.) F5 Works on JPEG format only. Two main security actions against steganalysis attacks: - Straddling: scatters message uniformly over the cover image - Matrix Embedding: Improves embedding efficiency (no. of bits/ change of BDCT coeff.)

7 Modern Stego Techniques (cont’d.) MB (Model-based Steganography) Correlates embedded data with cover image Splits cover image into two parts - Models parameter of distribution of second given first part - Encodes second part using model and hidden message - Combine these two parts to form stego image MB1 operates on JPEG images, uses Cauchy distribution to model JPEG histogram

8 Steganalysis: A Markov Process Based Approach Steganography, Different Approaches & Techniques Steganalysis & Previous Work on Steganalysis Markov Process Feature Construction Experiments and Results Discussion and Conclusion

9 Steganalysis Art of detecting hidden messages from stego images

10 Previous Work on Steganalysis Universal Steganalyzer - proposed by Farid Based on Image’s higher order statistics Universal Steganalysis – proposed by Shi et al Based on statistical moments of characteristic functions of image, its prediction-error image and their DWT subbands

11 Previous Work on Steganalysis Fridrich proposed set of distinguishing features from BDCT and spatial domain for detecting messages embedded in JPEG images. Specific Steganalysis with spread spectrum – by Sullivan et al - Inter-pixel dependencies used and Markov chain model is adopted. - Some loss is inevitable due to random feature selection - Markov chains used only in horizontal direction

12 Steganalysis: A Markov Process Based Approach Steganography, Different Approaches & Techniques Steganalysis & Previous Work on Steganalysis Markov Process Feature Construction Experiments and Results Discussion and Conclusion

13 Markov Processes – Wikipedia Named after mathematician Markov for random evolution of memoryless system Definition: A stochastic process whose state at time t is X(t), for t>0 and whose history of states is given by x(s) for times s<t is a Markov process if Probability of its having state y at time t+h conditioned on having particular state x(t) at time t, is equal to conditional probability of its having that same state y but conditioned on its value for all previous times before t, presenting future state is independent of its past states.

14 Steganalysis: A Markov Process Based Approach Steganography, Different Approaches & Techniques Steganalysis & Previous Work on Steganalysis Markov Process Feature Construction Experiments and Results Discussion and Conclusion

15 Feature Construction for Steganalysis To classify as stego or non-stego image In this Steganalysis scheme, second order statistics are used to detect JPEG steganographic method. Steps: - Defining JPEG 2-D array - Introducing Difference JPEG 2-D array in different directions - Modeling this difference array using Markov random process (Transition Probability Matrix) - Thresholding technique to reduce computational cost.

16 Defining JPEG 2-D array Generation of features from 8 x 8 BDCT domain to attack steganography 2-D array of same size as given image with each 8 x 8 block filled up with corresponding JPEG quantized 8 x 8 BDCT coeff. Absolute value is taken resulting array as shown

17 Difference JPEG 2-D array Disturbance caused by Steganographic methods in JPEG images can be enlarged by observing difference between an element and one of its neighbors. 4 JPEG 2-D difference arrays are generated. F h (u, v) = F(u, v) – F(u+1, v) F v (u, v) = F(u, v) – F(u, v+1) F d (u, v) = F(u, v) – F(u+1, v+1) F md (u, v) = F(u+1, v) – F(u, v+1)

18 Defining JPEG 2-D array (Cont’d.) We choose absolute value of coefficients - BDCT coefficients do not obey Gaussian distribution - Power of 8 x 8 block of DCT coefficients is highly concentrated in DC and low freq. - These coefficients are non-increasing along zig-zag order. they are correlated. - difference of absolute values of two immediate neighbors is highly concentrated around 0 having Laplacian-like distibution.

19 Difference JPEG 2-D array Distribution of difference array elements is Laplacian with most values close to 0 Most of the elements is difference array are in [-T, T] as long as T is large enough.

20 Transition Probability Matrix We use Markov Random Process with one-step transition probability matrix. Second order statistics are used in order to reduce computational complexity dramatically In order to reduce complexity further, thresholding technique is used. Hence dimensionality of matrix is reduced to (2T+1)X(2T+1) By choosing proper ‘T’ value, good steganalysis capability with manageable computational complexity is achieved.

21 Transition Probability Matrix (Cont’d.) From equations beside, we have 4 X (2T+1) X (2T+1) elements Choosing proper value of T gives steganalysis capability with manageable computational complexity

22 Feature Formation Procedure

23 Support Vector Machine Classifier for pattern Recognition. Easy to use than Neural Networks of Image analysis and Performance is comparable. SVM is based on idea hyperplane classifier. Optimal separation hyperplane is calculated by Langrangian multipliers. SVM can be used for both linear and nonlinear separable case. In linear case SVM, looks for Hyperplane (H) and two planes (H1 & H2 M) parallel to H. It maximizes distance b &w these two planes With no data points in between. In nonlinear case SVM uses kernels ( Polynomial kernel) functions to locate linear hyperplane.

24 Steganalysis: A Markov Process Based Approach Steganography, Different Approaches & Techniques Steganalysis & Previous Work on Steganalysis Markov Process Feature Construction Experiments and Results Discussion and Conclusion

25 Experiments and Results Images used were 7560 JPEGs with QF ranging from Each one is cropped to 768*512 or 512*768 dimension Chrominance set to zero and Luminance untouched before embedding.

26 Experiments and Results (Cont’d.) Stego Images Generation Embedding rate is ratio of message length to non-zero elements in JPEG 2-D array measured in bpc Considered embedding rates are - For OutGuess: 0.05, 0.1, 0.2 bpc and stego images generated are 7498, 7452, 7215 resp. - For F5 and MB1: 0.05, 0.1, 0.2, 0.4 bpc and 7560 stego images are generated. Step size equal to two for MB1

27 Results obtained using SVM Half of non-stego and stego image pairs selected to train SVM classifier and others are using trained classifier 4 steganalysis schemes compared as shown to detect OutGuess, F5 and MB Result: The proposed steganalyzer outperforms the prior-arts by significant margin F5 has low detection rate on same embedding rate than MB1

28 Result with features from one direction at a time Contributions made from horizontal and vertical direction are more than that from main and minor diagonal directions. Contribution Contribution made from main diagonal larger than that from the minor diagonal direction.

29 Steganalysis: A Markov Process Based Approach Steganography, Different Approaches & Techniques Steganalysis & Previous Work on Steganalysis Markov Process Feature Construction Experiments and Results Discussion and Conclusion

30 Discussion Taking absolute values in JPEG 2-D array is an advantage - Not taking absolute value degrades performance - Dynamic range of JPEG 2-D array will be increased - Following table shows performance comparison with and without absolute values for MB1

31 Discussion (Cont’d.) Detection Rates of F5 Detection rates for MB1 are higher than F5 for same embedding rates Reasons: - F5 reduces magnitude of non-zero DCT AC coefficients by 1 in order to embed a bit and has larger probability to keep difference JPEG 2-D array elements unchanged after data embedding - Following statistics show that at low rates F5 changes fewer DCT co-eff. Than MB1 but reverse case for higher rate.

32 Conclusion Taking absolute value in JPEG 2-D array reduces computation complexity and raises analysis capability Difference JPEG 2-D Arrays along horizontal, vertical, diagonal and minor diagonal directions have enlarged changes caused by Steganographic methods Thresholding technique greatly reduces dimensionality of feature vectors to a manageable extent Markov process to model difference JPEG 2-D arrays and using all elements in transition probability matrices as features, the second order statistics have been used

33 References C. J. C. Burges. “A tutorial on support vector machines for pattern recognition”, Data Mining and Knowledge Discovery, 2(2): , 1998 H. Farid, “Detecting hidden messages using higher-order statistical models”, International Conference on Image Processing, Rochester, NY, USA, 2002 Y. Q. Shi, G. Xuan, D. Zou, J. Gao, C. Yang, Z. Zhang, P. Chai, W. Chen, and C. Chen,“Steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network,” International Conference on Multimedia and Expo, Amsterdam, Netherlands,