Pooled Steganalysis in JPEG: how to deal with the spreading strategy?

被引:5
|
作者
Zakaria, Ahmad [1 ]
Chaumont, Marc [2 ]
Subsol, Gerard [1 ]
机构
[1] Univ Montpellier, LIRMM, CNRS, Montpellier, France
[2] Univ Montpellier, LIRMM, CNRS, Univ Nimes, Montpellier, France
关键词
D O I
10.1109/wifs47025.2019.9035096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In image pooled steganalysis, a steganalyst, Eve, aims to detect if a set of images sent by a steganographer, Alice, to a receiver, Bob, contains a hidden message. We can reasonably assess that the steganalyst does not know the strategy used to spread the payload across images. To the best of our knowledge, in this case, the most appropriate solution for pooled steganalysis is to use a Single-Image Detector (SID) to estimate/quantify if an image is cover or stego, and to average the scores obtained on the set of images. In such a scenario, where Eve does not know the spreading strategies, we experimentally show that if Eve can discriminate among few well-known spreading strategies, she can improve her steganalysis performances compared to a simple averaging or maximum pooled approach. Our discriminative approach allows obtaining steganalysis efficiencies comparable to those obtained by a clairvoyant, Eve, who knows the Alice spreading strategy. Another interesting observation is that DeLS spreading strategy behaves really better than all the other spreading strategies. Those observations results in the experimentation with six different spreading strategies made on Jpeg images with J-UNIWARD, a state-of-the-art Single-Image-Detector, and a discriminative architecture that is invariant to the individual payload in each image, invariant to the size of the analyzed set of images, and build on a binary detector (for the pooling) that is able to deal with various spreading strategies.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] A Study on Improved JPEG Steganography Algorithm to Prevent Steganalysis
    Kim, Jun Tae
    Kim, Sangwon
    Kim, Keechoen
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 960 - 963
  • [42] An Intriguing Struggle of CNNs in JPEG Steganalysis and the OneHot Solution
    Yousfi, Yassine
    Fridrich, Jessica
    IEEE SIGNAL PROCESSING LETTERS, 2020, 27 : 830 - 834
  • [43] Kernel Fisher discriminant for steganalysis of JPEG hiding methods
    Harmsen, JJ
    Pearlman, WA
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 13 - 22
  • [44] Steganalysis of JPEG images by block texture based segmentation
    Wang, Ran
    Xu, Mankun
    Ping, Xijian
    Zhang, Tao
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (15) : 5725 - 5746
  • [45] An Efficient JPEG Steganalysis Model Based on Deep Learning
    Gan, Lin
    Cheng, Yang
    Yang, Yu
    Shen, Linfeng
    Dong, Zhexuan
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 729 - 742
  • [46] Weighted Stego-Image Steganalysis for JPEG Covers
    Boehme, Rainer
    INFORMATION HIDING, 2008, 5284 : 178 - 194
  • [47] Toward Reliable JPEG Steganalysis (at QF100)
    Levecque, Etienne
    Klein, John
    Bas, Patrick
    Butora, Jan
    2022 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2022,
  • [48] JPEG Steganalysis Using Estimated Image and Markov Model
    Zhang, Shuai
    Zhang, Hongbin
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, 2010, 93 : 281 - 287
  • [49] Improving Steganalysis by Fusing SVM Classifiers for JPEG Images
    Liu, Peiqing
    Liu, Fenlin
    Yang, Chunfang
    Song, Xiaofeng
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND MECHANICAL AUTOMATION (CSMA), 2015, : 185 - 190
  • [50] Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain
    Yousfi, Yassine
    Butora, Jan
    Fridrich, Jessica
    Giboulot, Quentin
    IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2019, : 138 - 149