Pooled Steganalysis in JPEG: how to deal with the spreading strategy?

被引:5
|
作者
Zakaria, Ahmad [1 ]
Chaumont, Marc [2 ]
Subsol, Gerard [1 ]
机构
[1] Univ Montpellier, LIRMM, CNRS, Montpellier, France
[2] Univ Montpellier, LIRMM, CNRS, Univ Nimes, Montpellier, France
关键词
D O I
10.1109/wifs47025.2019.9035096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In image pooled steganalysis, a steganalyst, Eve, aims to detect if a set of images sent by a steganographer, Alice, to a receiver, Bob, contains a hidden message. We can reasonably assess that the steganalyst does not know the strategy used to spread the payload across images. To the best of our knowledge, in this case, the most appropriate solution for pooled steganalysis is to use a Single-Image Detector (SID) to estimate/quantify if an image is cover or stego, and to average the scores obtained on the set of images. In such a scenario, where Eve does not know the spreading strategies, we experimentally show that if Eve can discriminate among few well-known spreading strategies, she can improve her steganalysis performances compared to a simple averaging or maximum pooled approach. Our discriminative approach allows obtaining steganalysis efficiencies comparable to those obtained by a clairvoyant, Eve, who knows the Alice spreading strategy. Another interesting observation is that DeLS spreading strategy behaves really better than all the other spreading strategies. Those observations results in the experimentation with six different spreading strategies made on Jpeg images with J-UNIWARD, a state-of-the-art Single-Image-Detector, and a discriminative architecture that is invariant to the individual payload in each image, invariant to the size of the analyzed set of images, and build on a binary detector (for the pooling) that is able to deal with various spreading strategies.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Steganalysis of JPEG steganography with complementary embedding strategy
    Huang, F.
    Luo, W.
    Huang, J.
    IET INFORMATION SECURITY, 2011, 5 (01) : 10 - 18
  • [2] Steganalysis based on JPEG compatibility
    Fridrich, J
    Goljan, M
    Du, R
    MULTIMEDIA SYSTEMS AND APPLICATIONS IV, 2001, 4518 : 275 - 280
  • [3] Data Augmentation for JPEG Steganalysis
    Itzhaki, Tomer
    Yousfi, Yassine
    Fridrich, Jessica
    2021 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2021, : 98 - 103
  • [4] Improving EfficientNet for JPEG Steganalysis
    Yous, Yassine
    Butora, Jan
    Fridrich, Jessica
    Tsang, Clement Fuji
    PROCEEDINGS OF THE 2021 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH&MMSEC 2021, 2021, : 149 - 157
  • [5] Steganalysis with JPEG and GIF images
    Du, R
    Guthrie, LE
    Buchy, D
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 98 - 104
  • [6] JPEG Steganography and Steganalysis - A Review
    Banerjee, Siddhartha
    Ghosh, Bibek Ranjan
    Roy, Pratik
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 175 - 187
  • [7] Calibration based universal JPEG steganalysis
    HUANG FangJun1
    2 Guangdong Key Lab. of Information Security Technology
    Science China(Information Sciences), 2009, (02) : 260 - 268
  • [8] Steganalysis on JPEG Decompressed Bitmaps Revisited
    Cao, Weiquan
    Han, Jiesi
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 878 - 881
  • [9] Steganalysis based on double JPEG compression
    Dai, Meng
    Lin, Jia-Jun
    Mao, Jia-Fa
    Huadong Ligong Daxue Xuebao /Journal of East China University of Science and Technology, 2007, 33 (05): : 722 - 725
  • [10] Batch steganography and pooled steganalysis
    Ker, Andrew D.
    INFORMATION HIDING, 2007, 4437 : 265 - 281