Pooled Steganalysis in JPEG: how to deal with the spreading strategy?

被引:5
|
作者
Zakaria, Ahmad [1 ]
Chaumont, Marc [2 ]
Subsol, Gerard [1 ]
机构
[1] Univ Montpellier, LIRMM, CNRS, Montpellier, France
[2] Univ Montpellier, LIRMM, CNRS, Univ Nimes, Montpellier, France
关键词
D O I
10.1109/wifs47025.2019.9035096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In image pooled steganalysis, a steganalyst, Eve, aims to detect if a set of images sent by a steganographer, Alice, to a receiver, Bob, contains a hidden message. We can reasonably assess that the steganalyst does not know the strategy used to spread the payload across images. To the best of our knowledge, in this case, the most appropriate solution for pooled steganalysis is to use a Single-Image Detector (SID) to estimate/quantify if an image is cover or stego, and to average the scores obtained on the set of images. In such a scenario, where Eve does not know the spreading strategies, we experimentally show that if Eve can discriminate among few well-known spreading strategies, she can improve her steganalysis performances compared to a simple averaging or maximum pooled approach. Our discriminative approach allows obtaining steganalysis efficiencies comparable to those obtained by a clairvoyant, Eve, who knows the Alice spreading strategy. Another interesting observation is that DeLS spreading strategy behaves really better than all the other spreading strategies. Those observations results in the experimentation with six different spreading strategies made on Jpeg images with J-UNIWARD, a state-of-the-art Single-Image-Detector, and a discriminative architecture that is invariant to the individual payload in each image, invariant to the size of the analyzed set of images, and build on a binary detector (for the pooling) that is able to deal with various spreading strategies.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] JPEG Image Steganalysis from Imbalanced Data
    Fu, Jia
    Feng, Guorui
    Ren, Yanli
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (11) : 2518 - 2521
  • [22] Quantitative and Binary Steganalysis in JPEG: A Comparative Study
    Zakaria, Ahmad
    Chaumont, Marc
    Subsol, Gerard
    2018 26TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2018, : 1422 - 1426
  • [23] Steganalysis of JPEG Images with Joint Transform Features
    Khan, Zohaib
    Bin Mansoor, Atif
    ADVANCES IN IMAGE AND VIDEO TECHNOLOGY, PROCEEDINGS, 2009, 5414 : 965 - 975
  • [24] Finding Incompatible Blocks for Reliable JPEG Steganalysis
    Levecque, Etienne
    Butora, Jan
    Bas, Patrick
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9467 - 9479
  • [25] Quantized Gaussian JPEG Steganography and Pool Steganalysis
    Aloraini, Mohammed
    Sharifzadeh, Mehdi
    Schonfeld, Dan
    IEEE ACCESS, 2022, 10 : 38031 - 38044
  • [26] Improving CoatNet for Spatial and JPEG Domain Steganalysis
    Li, Hao
    Luo, Xiangyang
    Zhang, Yi
    2023 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, ICME, 2023, : 1241 - 1246
  • [27] Feature-Based Steganalysis for JPEG Images
    Li, Zhuo
    Lu, Kuijun
    Zeng, Xianting
    Pan, Xuezeng
    ICDIP 2009: INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING, PROCEEDINGS, 2009, : 76 - 80
  • [28] STEGANALYSIS OF ADAPTIVE JPEG STEGANOGRAPHY BASED ON RESDET
    Huang, Xiaosa
    Wang, Shilin
    Sun, Tanfeng
    Liu, Gongshen
    Lin, Xiang
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 549 - 553
  • [29] Quantitative Steganalysis of LSB Embedding in JPEG Domain
    Kodovsky, Jan
    Fridrich, Jessica
    MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 187 - 197
  • [30] Steganalysis for JPEG Images Based on Manifold Learning
    Quan, Xiaomei
    Zhang, Hongbin
    2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 707 - 712