Pooled Steganalysis in JPEG: how to deal with the spreading strategy?

被引:5
|
作者
Zakaria, Ahmad [1 ]
Chaumont, Marc [2 ]
Subsol, Gerard [1 ]
机构
[1] Univ Montpellier, LIRMM, CNRS, Montpellier, France
[2] Univ Montpellier, LIRMM, CNRS, Univ Nimes, Montpellier, France
关键词
D O I
10.1109/wifs47025.2019.9035096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In image pooled steganalysis, a steganalyst, Eve, aims to detect if a set of images sent by a steganographer, Alice, to a receiver, Bob, contains a hidden message. We can reasonably assess that the steganalyst does not know the strategy used to spread the payload across images. To the best of our knowledge, in this case, the most appropriate solution for pooled steganalysis is to use a Single-Image Detector (SID) to estimate/quantify if an image is cover or stego, and to average the scores obtained on the set of images. In such a scenario, where Eve does not know the spreading strategies, we experimentally show that if Eve can discriminate among few well-known spreading strategies, she can improve her steganalysis performances compared to a simple averaging or maximum pooled approach. Our discriminative approach allows obtaining steganalysis efficiencies comparable to those obtained by a clairvoyant, Eve, who knows the Alice spreading strategy. Another interesting observation is that DeLS spreading strategy behaves really better than all the other spreading strategies. Those observations results in the experimentation with six different spreading strategies made on Jpeg images with J-UNIWARD, a state-of-the-art Single-Image-Detector, and a discriminative architecture that is invariant to the individual payload in each image, invariant to the size of the analyzed set of images, and build on a binary detector (for the pooling) that is able to deal with various spreading strategies.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Universal JPEG steganalysis in the compressed frequency domain
    Barbier, Johann
    Filiol, Eric
    Mayoura, Kichenakoumar
    DIGITAL WATERMARKING, PROCEEDINGS, 2006, 4283 : 253 - 267
  • [32] Conditional Probability Based Steganalysis for JPEG Steganography
    Wahab, Ainuddin Wahid
    Briffa, Johann A.
    Schaathun, Hans Georg
    Ho, Anthony T. S.
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 205 - 209
  • [33] Steganalysis of JPEG Images Using Rich Models
    Kodovsky, Jan
    Fridrich, Jessica
    MEDIA WATERMARKING, SECURITY, AND FORENSICS 2012, 2012, 8303
  • [34] Nature inspired metaheuristics for improved JPEG steganalysis
    Multimedia Tools and Applications, 2018, 77 : 13701 - 13720
  • [35] Optimizing Pooling Function for Pooled Steganalysis
    Pevny, Tomas
    Nikolaev, Ivan
    2015 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2015,
  • [36] Nature inspired metaheuristics for improved JPEG steganalysis
    Christaline, Anita J.
    Ramesh, R.
    Gomathy, C.
    Vaishali, D.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (11) : 13701 - 13720
  • [37] A steganographic embedding undetectable by JPEG compatibility steganalysis
    Newman, RE
    Moskowitz, IS
    Chang, LW
    Brahmadesam, MM
    INFORMATION HIDING, 2003, 2578 : 258 - 277
  • [38] Pooled Steganalysis via Model Discrepancy
    Yu, Jiang
    Zhang, Jing
    Li, Fengyong
    MATHEMATICS, 2024, 12 (04)
  • [39] JPEG Steganalysis Using Leaked Cover Thumbnails
    Benes, Martin
    Lorch, Benedikt
    Boehme, Rainer
    2023 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY, WIFS, 2023,
  • [40] JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images
    Chen, Mo
    Sedighi, Vahid
    Boroumand, Mehdi
    Fridrich, Jessica
    IH&MMSEC'17: PROCEEDINGS OF THE 2017 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2017, : 75 - 84