Effect of Image Downsampling on Steganographic Security

The accuracy of steganalysis in digital images primarily depends on the statistical properties of neighboring pixels, which are strongly affected by the image acquisition pipeline as well as any processing applied to the image. In this paper, we study how the detectability of embedding changes is affected when the cover image is downsampled prior to embedding. This topic is important for practitioners because the vast majority of images posted on websites, image sharing portals, or attached to e-mails are downsampled. It is also relevant to researchers as the security of steganographic algorithms is commonly evaluated on databases of downsampled images. In the first part of this paper, we investigate empirically how the steganalysis results depend on the parameters of the resizing algorithm-the choice of the interpolation kernel, the scaling factor (resize ratio), antialiasing, and the downsampled pixel grid alignment. We report on several novel phenomena that appear valid universally across the tested cover sources, steganographic methods, and steganalysis features. This paper continues with a theoretical analysis of the simplest interpolation kernel - the box kernel. By fitting a Markov chain model to pixel rows, we analytically compute the Fisher information rate for any mutually independent embedding operation and derive the proper scaling of the secure payload with resizing. For least significant bit (LSB) matching and a limited range of downscaling, the theory fits experiments rather well, which indicates the existence of a new scaling law expressing the length of the secure payload when the cover size is modified by subsampling.

[1]  Yuan-Gen Wang,et al.  Security Analysis on Spatial $\pm$1 Steganography for JPEG Decompressed Images , 2011, IEEE Signal Processing Letters.

[2]  Sylvain Meignen,et al.  On the modeling of small sample distributions with generalized Gaussian density in a maximum likelihood framework , 2006, IEEE Transactions on Image Processing.

[3]  Matthew C. Stamm Digital Multimedia Forensics and Anti-Forensics , 2012 .

[4]  Jessica J. Fridrich,et al.  JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts , 2012, Information Hiding.

[5]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[6]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[7]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[8]  Jessica J. Fridrich,et al.  Effect of Cover Quantization on Steganographic Fisher Information , 2012, IEEE Transactions on Information Forensics and Security.

[9]  Jessica J. Fridrich,et al.  Steganalysis of LSB Replacement Using Parity-Aware Features , 2012, Information Hiding.

[10]  Jessica J. Fridrich,et al.  Optimizing pixel predictors for steganalysis , 2012, Other Conferences.

[11]  Jessica J. Fridrich,et al.  Fisher Information Determines Capacity of ε-Secure Steganography , 2009, Information Hiding.

[12]  S. Kullback,et al.  Information Theory and Statistics , 1959 .

[13]  R. Keys Cubic convolution interpolation for digital image processing , 1981 .

[14]  Rainer Böhme,et al.  Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.

[15]  Jessica J. Fridrich,et al.  The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.

[16]  Ingemar J. Cox,et al.  A comparative study of ± steganalyzers , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[17]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[18]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[19]  Mauro Barni,et al.  A Comparative Study of ±1 Steganalyzers , 2008 .

[20]  Andrew S. Glassner,et al.  Graphics Gems , 1990 .

[21]  Rainer Böhme,et al.  Weighted Stego-Image Steganalysis for JPEG Covers , 2008, Information Hiding.

[22]  Leonie Moench,et al.  Graphics Gems I , 2016 .

[23]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[24]  Miroslav Goljan,et al.  Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.

[25]  Tomás Pevný,et al.  The square root law of steganographic capacity , 2008, MM&Sec '08.

[26]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[27]  Jessica J. Fridrich,et al.  Steganalysis in resized images , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[28]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.