Download presentation
Presentation is loading. Please wait.
Published byRussell Small Modified over 8 years ago
1
YASS Yet Another Steganographic Scheme that Resists Blind Steganalysis K. Solanki*, A. Sarkar +, and B. Manjunath + + + Vision Research Laboratory Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 93106, USA http://vision.ece.ucsb.edu * * Mayachitra, Inc. 5266 Hollister Ave. Santa Barbara, CA-93111, USA http://www.mayachitra.com
2
Steganography: Art and science of covert communication Steganographic security: Cachin’s criteria Kullback-Leibler divergence smaller than epsilon Inherently assumes availability of “natural” distributions Statistical steganalysis Suspected stego signal evaluated against assumed or computed cover distribution June 11, 2007 2
3
Steganalysis: Winning the battle? Blind Statistical steganalysis Uses supervised learning on specific image features Self-calibration mechanism used to ensure that features capture changes due to embedding only. E.g. Cropping a few pixel rows and/or columns Recent results close to perfect [Pevny and Fridrich ‘07]: can reliably determine which stego scheme was used (out of 5) with >95% accuracy June 11, 2007 3
4
YASS: “Stirmark of Steganography” Idea: Desynchronize the steganalyst by randomizing the embedding locations Disables the self-calibration process But, must advertize or ship the image in a standard format (such as JPEG) Causes errors in the recovered bits Use erasures and errors correcting codes Previously employed for high-volume hiding June 11, 2007 4 A recipe for resisting blind steganalysis
5
A peek at the Results Can resist several recent steganalysis techniques JPEG steganalysis with self-calibration Pevny and Fridrich’s 23-dim features (SPIE’06) and their more recent 276-dim feature (SPIE’07) Farid’s 72-dim features DCT histogram-based features Spatial domain steganalysis Xuan et al’s 39-dim features based on wavelet characteristic functions (IH ‘05) JPEG steganalysis based on above features Chen et al’s 324-dim features (ICIP ‘06) June 11, 2007 5
6
Outline Introduction Related Work Resisting Blind Steganalysis YASS for JPEG Steganography Results Discussion Future Work June 11, 2007 6
7
Outline Introduction Related Work Steganography Steganalysis Resisting Blind Steganalysis YASS for JPEG Steganography Results Discussion Future Work June 11, 2007 7
8
Related work JPEG Steganography: Schemes that match or restore marginal statistics Sallee’s model based methods (MB1 and MB2) Fridrich et al’s Perturbed Quantization (PQ) Solanki et al’s Statistical Restoration schemes OutGuess, StegHide Matrix embedding schemes (such as F5) Steganalysis schemes Many related schemes already listed earlier June 11, 2007 8
9
Outline Introduction Related Work Resisting Blind Steganalysis How blind steganalysis schemes work Can we defeat them? How? YASS for JPEG Steganography Results Discussion Future Work June 11, 2007 9
10
Blind Steganalysis: Key Ingredients 1.Self-calibration mechanism Used to estimate the cover image statistics from the stego image For JPEG steganography: Crop a few pixel rows or columns and recompress 2.Features capturing cover memory Most stego scheme hide data on a per-symbol basis Higher order dependencies harder to match or restore 3.Powerful machine learning Ensures that even the slightest statistical variation in the features is learned by the machine June 11, 2007 10
11
Blind steganalysis is quite successful Self-calibration process is perhaps the most important ingredient Derived features are insensitive to image content, but quite sensitive to embedding changes Steganalysis successful in spite of unavailability of universal image models Results presented in [Pevny and Fridrich, SPIE ‘07] are close to perfect! June 11, 2007 11
12
So, What can the steganographer do? Preserve all the features of the image… Is this practically feasible? How does it affect the embedding rate? But, lets not forget: The steganalyst must depend on the stego image to estimate the cover image statistics Way out: Embed data in a way that distorts the steganalyst’s estimate of the cover image statistics June 11, 2007 12
13
Distorting Steganalyst’s Estimate Hiding with high embedding strength Cover image statistics can no longer be reliably derived from the available stego image Also observed and reported in recent work by Kharrazi, Sencar, and Memon (ICIP ‘06) Randomized hiding The algorithm to estimate the cover statistics can be effectively disabled Can randomize the hiding location, the choice of transform domain, the coefficient, or even the hiding method June 11, 2007 13 Disadvantages 1.Likelihood of high perceptual distortion 2.Possibility of data being detected by universal image models Our Choice! Simple implementation explored in this work: Hide in random locations
14
Outline Introduction Related Work Resisting Blind Steganalysis YASS for JPEG Steganography Results Discussion Future Work June 11, 2007 14
15
YASS for JPEG Steganography Idea: Embed data in randomized block locations The blocks do not coincide with the JPEG 8x8 grid Errors caused due to initial JPEG compression after embedding data Use erasures and errors correcting codes June 11, 2007 15
16
YASS Embedding: JPEG Grid June 11, 2007 16 8 pixels
17
YASS Embedding June 11, 2007 17 B x B block Here, B=10 B is called “big block size” Example grid used in embedding Randomized block location
18
Reduction in Embedding Rate Wasted real estate of the image Due to choice of bigger blocks Can reduce this wastage by putting more than one blocks in larger bigger blocks Eg 16 blocks in 34x34 sized block Errors due to initial JPEG compression Use erasures and errors correcting codes Previously employed in [Solanki et al, Trans. Image Pro. Dec 2004] June 11, 2007 18
19
Advantages of Coding Framework Robustness against initial JPEG compression Enabling active steganography by providing robustness against distortion constrained attacks Allows choice of embedding locations to reduce perceptual distortion Do not hide in zero valued DCT coefficients June 11, 2007 19
20
Outline Introduction Related Work Resisting Blind Steganalysis YASS for JPEG Steganography Results Discussion Future Work June 11, 2007 20
21
Results Experimental Set-up Embedding volume Performance against steganalysis Comparison with competing methods Control experiment: Comparison with standard hiding at same rate June 11, 2007 21
22
Experimental Set-up June 11, 2007 22 Database of > 2000 images Hide Data Training Testing Use Supervised learning for steganalysis Two Datasets: TIFF images JPEG images
23
Results Experimental Set-up Embedding volume Performance against steganalysis Comparison with competing methods Control experiment: Comparison with standard hiding at same rate June 11, 2007 23
24
Embedding volume June 11, 2007 24 Embedding volume for some standard 512x512 images: QF h = design quality factor used for embedding QF a = output JPEG quality factor Number of bits are the number of information bits providing error-free recovery
25
Hiding Rate for Lenna Image June 11, 2007 25 bpnc = bits per non-zero coefficients
26
Results Experimental Set-up Embedding volume Performance against steganalysis Comparison with competing methods Control experiment: Comparison with standard hiding at same rate June 11, 2007 26
27
Steganalysis schemes Farid: 72-dimensional feature vector based on moments in the wavelet domain PF-23: Pevny and Fridrich’s 23-dimensional DCT feature vector PF-274: Pevny and Fridrich’s 274-dimensional feature vector that merges Markov and DCT features DCT hist.: Histogram of DCT coefficients from a low- frequency band Xuan-39: Spatial domain steganalysis proposed by Xuan et al Chen-324: JPEG steganalysis based on statistical moments of wavelet characteristic functions June 11, 2007 27
28
JPEG dataset June 11, 2007 28
29
June 11, 2007 29 TIFF dataset: Similar results
30
Results Experimental Set-up Embedding volume Performance against steganalysis Comparison with competing methods Control experiment: Comparison with standard hiding at same rate June 11, 2007 30
31
Comparison with competing methods Compared the method with OutGuess and StegHide Ensured that the hiding rates are equivalent Not straightforward since YASS uses error correcting codes The code rate 1/q determines the embedding rate Tested for q=10 and q=40 June 11, 2007 31
32
Comparison with OutGuess and StegHide June 11, 2007 32 YASS is undetectable for most configurations for these steganalysis schemes, while competing methods are detectable at the same hiding rates! F5, using matrix embedding, performs equivalent to YASS at equivalent hiding rates
33
Results Experimental Set-up Embedding volume Performance against steganalysis Comparison with competing methods Control experiment: Comparison with standard hiding at same rate June 11, 2007 33
34
Control experiment: Standard hiding Is the good performance of YASS simply due to lowered embedding rate? Control experiment: Compare with naïve hiding scheme Hide in random frequency locations (termed RF scheme) Trivial embedding efficiency of 2 bits/coefficient Tested hiding rates 2 bits per 64 (8x8 block), 1 bit per 64, and 1 per 128 coefficients June 11, 2007 34
35
YASS verses RF June 11, 2007 35 It can be seen that the naive RF scheme performs quite well, however, the performance of YASS is consistently better.
36
Outline Introduction Related Work Resisting Blind Steganalysis YASS for JPEG Steganography Results Discussion Future Work June 11, 2007 36
37
Change Rate and Embedding Efficiency Change rate: Number of coefficients modified during the embedding process Embedding efficiency: Number of bits hidden per coefficient changed Change rate is encoder’s budget; it can be “used” To provide robustness by using redundancy and giving up some embedding efficiency To improve the embedding efficiency via matrix embedding but causing an increase in the fragility of the system YASS goes the first way… June 11, 2007 37
38
YASS and Matrix Embedding The hiding rate of YASS is relatively low At these hiding rates, equivalent level of steganographic security can be achieved by using matrix embedding An advantage of YASS is that it can provide robustness against distortion constrained attacks June 11, 2007 38
39
Outline Introduction Related Work Resisting Blind Steganalysis YASS for JPEG Steganography Results Discussion Future Work June 11, 2007 39
40
Future Work Improve the embedding rate Test for an active steganographic framework Explore other avenues of randomization Embedding method Transform domain How can this scheme be detected? June 11, 2007 40
41
Thank you MATLAB code available at http://vision.ece.ucsb.edu
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.