Synchronizing Embedding Changes in Side-Informed Steganography

Historically, two different strategies have been proposed for improving steganographic security by allowing each cover element to be modified by +1 or −1 with unequal probabilities: side-informed steganography and methods that cluster the polarity of neighboring changes. In the first strategy, the sender typically uses the knowledge of quantization errors when developing / processing the cover before embedding. In the latter, embedding on disjoint sub-lattices employs heuristic rules to increase the probability that the polarities of neighboring changes align. In this paper, we propose a method for combining both strategies and experimentally show an improvement in empirical security for several types of side information on two datasets when steganalyzing with rich models as well as convolutional neural networks. Motivation Steganography is a mode of covert communication in which messages are embedded in inconspicuous cover objects to hide the very presence of the communicated secret. Digital images are particularly suitable cover sources because they can hold large amounts of data and are commonly shared on social networks and attached to emails. Moreover, there are thousands of applications available to potential users.1 Since statistical detectability increases sharply with the amplitude of embedding changes, steganographic schemes typically modify the individual cover elements, which encode the luminance or DCT coefficients using integer values, by at most ±1. The vast majority of embedding algorithms do so with equal probabilities as this maximizes the entropy (payload) embedded at each pixel [23, 22, 29, 35]. Two exceptions to this rule of thumb include sideinformed steganography [23, 20, 6, 19, 34, 17, 15, 14, 7] and steganography that encourages neighboring embedding changes to share the same polarity [30, 5, 24]. Since both strategies have been shown to improve empirical security, in this paper we investigate whether they can be combined to further boost the resistance to steganalysis. Side-informed (SI) steganography is a general term used for embedding schemes in which the sender makes use of the so-called precover [26] that is subjected to some sort of processing, development, or format conversion be1N. Johnson, “IoT Forensic Considerations and Steganography Beyond Images.” Invited talk presented in the Network and Cloud Forensics Workshop, IEEE Conference on Communications and Network Security, October 9–11, 2017, Las Vegas, Nevada, USA. fore embedding the secret message. Since the last step of the processing pipeline is typically quantization, the sender has access to the rounding errors and uses them to modulate the costs of changes by 1 and −1. SI steganography generally prefers changing those cover elements whose rounding errors are close to ±1/2 because such elements are the most sensitive to small perturbations. For example, a cover element with a non-rounded value 2.57, which would round to 3, is allowed to be modified during embedding to 2 with a small cost while changing the cover value 3 to 4 incurs a proportionally larger cost. The first side-informed scheme was the embeddingwhile-dithering steganography [15], in which the secret message was embedded by perturbing the process of color quantization and dithering when converting a true-color image to a palette format. In perturbed quantization [16], the cover JPEG is recompressed to create side-information. The embedding prefers modifying DCT coefficients that fall close to the middle of the quantization bins during the second compression. The same idea can be applied when the cover image is uncompressed and the sender embeds her message in its JPEG form. The rounding errors of DCT coefficients can again be used to adjust the costs of polarities of embedding changes [27, 34, 39, 25]. This methodology was later further advanced using the paradigm of minimal-distortion steganography with advanced source coding [23, 20, 6]. While not studied in this paper, the authors wish to point out that side-information can have many other forms than rounding errors. In particular, when the sender has access to an acquisition oracle (e.g., a camera or a scanner [11, 13, 12]), she can acquire multiple exposures of the same scene to estimate the preferred polarity of embedding changes for cover elements that are most susceptible to small noise, and thus better mimic the embedding changes as acquisition noise [8]. In the so-called Natural Steganography [1, 2, 38], also recognized as steganography by cover source switching, the sender has access to the RAW image capture and embeds the message in the developed domain by making the stego image look as if it was acquired with a higher ISO setting. When the developing pipeline is modelable, extremely large payloads can be embedded with virtually perfect security. In general, since side-information is only available to the sender, it can improve empirical security by a rather large margin. In [14], the author has shown that the precover compensates for the lack of the cover model. In particular, for a Gaussian model of acquisition noise, precover-informed rounding is more secure than embed-

[1]  Jessica J. Fridrich,et al.  Effect of saturated pixels on security of steganographic schemes for digital images , 2016, 2016 IEEE International Conference on Image Processing (ICIP).

[2]  Hyoung Joong Kim,et al.  Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding , 2009, MM&Sec '09.

[3]  Patrick Bas,et al.  Steganography via cover-source switching , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[4]  Jiwu Huang,et al.  New Channel Selection Rule for JPEG Steganography , 2012, IEEE Transactions on Information Forensics and Security.

[5]  Patrick Bas,et al.  An embedding mechanism for natural steganography after down-sampling , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[6]  Vojtöch Holub,et al.  CONTENT ADAPTIVE STEGANOGRAPHY - DESIGN AND DETECTION , 2014 .

[7]  Jessica J. Fridrich,et al.  Side-informed steganography with additive distortion , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[8]  Tomás Pevný,et al.  Exploring Non-Additive Distortion in Steganography , 2018, IH&MMSec.

[9]  Mo Chen,et al.  Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.

[10]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[11]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[12]  Jessica J. Fridrich,et al.  Steganography with two JPEGs of the same scene , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[13]  Jiangqun Ni,et al.  Model-based image steganography using asymmetric embedding scheme , 2018, J. Electronic Imaging.

[14]  Jessica J. Fridrich,et al.  Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.

[15]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[16]  Patrick Bas,et al.  A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain , 2019, Media Watermarking, Security, and Forensics.

[17]  Andrew D. Ker A Fusion of Maximum Likelihood and Structural Steganalysis , 2007, Information Hiding.

[18]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[19]  Elke Franz Steganography Preserving Statistical Properties , 2002, Information Hiding.

[20]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[21]  Jessica J. Fridrich,et al.  On the role of side information in steganography in empirical covers , 2013, Electronic Imaging.

[22]  Marc Chaumont,et al.  Yedroudj-Net: An Efficient CNN for Spatial Steganalysis , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[23]  Jiangqun Ni,et al.  Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.

[24]  Jiangqun Ni,et al.  An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[25]  Jessica J. Fridrich,et al.  Model Based Steganography with Precover , 2017, Media Watermarking, Security, and Forensics.

[26]  Bin Li,et al.  A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.

[27]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.

[28]  Dana S. Richards,et al.  Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.

[29]  Jessica J. Fridrich,et al.  Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.

[30]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[31]  Marc Chaumont,et al.  How to augment a small learning set for improving the performances of a CNN-based steganalyzer? , 2018, Media Watermarking, Security, and Forensics.

[32]  Jiri Fridrich,et al.  Secure Steganographic Methods for Palette Images , 1999, Information Hiding.

[33]  Jessica J. Fridrich,et al.  Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.

[34]  Patrick Bas,et al.  The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis , 2019, IH&MMSec.

[35]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[36]  Jessica J. Fridrich,et al.  Improving Steganographic Security by Synchronizing the Selection Channel , 2015, IH&MMSec.

[37]  Yun Q. Shi,et al.  An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[38]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[39]  Jessica J. Fridrich,et al.  Perturbed quantization steganography , 2005, Multimedia Systems.

[40]  Elke Franz,et al.  Pre-processing for Adding Noise Steganography , 2005, Information Hiding.

[41]  Elke Franz Embedding considering dependencies between pixels , 2008, Electronic Imaging.