Fuzzy Localization of Steganographic Flipped Bits via Modification Map

Adaptive steganography has become unprecedentedly prevalent compared with non-adaptive ones due to its remarkable performance when resisting modern steganalysis. It prefers hiding bits into pixels from texture regions as such modification is considerably difficult to detect. Current steganalysis capable of locating steganographic payload has only been investigated in the non-adaptive domain, while the works of locating hidden bits modified by adaptive steganographic algorithms have not been studied yet. In this paper, we propose a novel algorithm to locate flipped pixels modified by adaptive steganography in the spatial domain. By re-embedding randomly generated messages upon one single image, we observe that adaptive steganographic methods are prone to modify pixels in the same region, namely texture region. Such property straightforward inspires us to re-embed a random message at the same relative payload into the stego image to obtain the modification map. Then, we extend the modification map with a given margin to locate the modified pixels. The extensive experiments have verified the effectiveness of our designed algorithm in locating flipped pixels modified by the adaptive steganography in the spatial domain.

[1]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[2]  Mi Wen,et al.  Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles , 2016, IEEE Transactions on Information Forensics and Security.

[3]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[4]  Jessica J. Fridrich,et al.  Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.

[5]  Jiwu Huang,et al.  Adaptive Steganalysis Based on Embedding Probabilities of Pixels , 2016, IEEE Transactions on Information Forensics and Security.

[6]  Jessica J. Fridrich,et al.  Searching for the stego-key , 2004, IS&T/SPIE Electronic Imaging.

[7]  Jiwu Huang,et al.  Adaptive steganalysis against WOW embedding algorithm , 2014, IH&MMSec '14.

[8]  Florent Retraint,et al.  Statistical detection of Jsteg steganography using hypothesis testing theory , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[9]  Andrew D. Ker,et al.  Feature reduction and payload location with WAM steganalysis , 2009, Electronic Imaging.

[10]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[11]  Florent Retraint,et al.  Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters , 2014, IH&MMSec '14.

[12]  Florent Retraint,et al.  Steganalysis of JSteg algorithm using hypothesis testing theory , 2015, EURASIP J. Inf. Secur..

[13]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[14]  Weiming Zhang,et al.  On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..

[15]  Xiangyang Luo,et al.  Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[16]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[17]  Shahid Mumtaz,et al.  ECOSECURITY: Tackling Challenges Related to Data Exchange and Security: An Edge-Computing-Enabled Secure and Efficient Data Exchange Architecture for the Energy Internet , 2019, IEEE Consumer Electronics Magazine.

[18]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[19]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[20]  Zhenxing Qian,et al.  On Improving Distortion Functions for JPEG Steganography , 2018, IEEE Access.

[21]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[22]  Andrew D. Ker Locating steganographic payload via ws residuals , 2008, MM&Sec '08.

[23]  Yue Zhang,et al.  Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection , 2019, IEEE Access.

[24]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[25]  Xiaojiang Du,et al.  Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities , 2018, IEEE Communications Magazine.