StegoAppDB: a Steganography Apps Forensics Image Database

In this paper, we present a new reference dataset simulating digital evidence for image steganography. Steganography detection is a digital image forensic topic that is relatively unknown in practical forensics, although stego app use in the wild is on the rise. This paper introduces the first database consisting of mobile phone photographs and stego images produced from mobile stego apps, including a rich set of side information, offering simulated digital evidence. StegoAppDB, a steganography apps forensics image database, contains over 810,000 innocent and stego images using a minimum of 10 different phone models from 24 distinct devices, with detailed provenanced data comprising a wide range of ISO and exposure settings, EXIF data, message information, embedding rates, etc. We develop a camera app, Cameraw, specifically for data acquisition, with multiple images per scene, saving simultaneously in both DNG and high-quality JPEG formats. Stego images are created from these original images using selected mobile stego apps through a careful process of reverse engineering. StegoAppDB contains cover-stego image pairs including for apps that resize the stego dimensions. We retainthe original devices and continue to enlarge the database, and encourage the image forensics community to use StegoAppDB. While designed for steganography, we discuss uses of this publicly available database to other digital image forensic topics.

[1]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[2]  Li Lin,et al.  Tackling Android Stego Apps in the Wild , 2018, 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).

[3]  Hal S. Stern Statistical Issues in Forensic Science , 2017 .

[4]  Li Lin,et al.  Domain Adaptation in Steganalysis for the Spatial Domain , 2018, Media Watermarking, Security, and Forensics.

[5]  Giulia Boato,et al.  RAISE: a raw images dataset for digital image forensics , 2015, MMSys.

[6]  Rainer Böhme,et al.  The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.

[7]  Jill Slay,et al.  Digital Forensics: Validation and Verification in a Dynamic Work Environment , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[8]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[9]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[10]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[11]  Rainer Böhme,et al.  The Dresden Image Database for Benchmarking Digital Image Forensics , 2010, J. Digit. Forensic Pract..

[12]  Jessica J. Fridrich,et al.  Toss that BOSSbase, Alice! , 2016, Media Watermarking, Security, and Forensics.

[13]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[14]  Li Lin,et al.  The Impact of Exposure Settings in Digital Image Forensics , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).

[15]  Niels Provos,et al.  Detecting Steganographic Content on the Internet , 2002, NDSS.

[16]  Alice J. O'Toole,et al.  FRVT 2006 and ICE 2006 Large-Scale Experimental Results , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[17]  R. Crandall,et al.  Some Notes on Steganography , 1999 .

[18]  Li Lin,et al.  Forensic Analysis of Android Steganography Apps , 2018, IFIP Int. Conf. Digital Forensics.

[19]  Rainer Böhme,et al.  An Epistemological Approach to Steganography , 2009, Information Hiding.

[20]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[21]  Gary C. Kessler,et al.  An Overview of Steganography for the Computer Forensics Examiner , 2004 .

[22]  Timothy K Lu,et al.  Encryption and steganography of synthetic gene circuits , 2018, Nature Communications.

[23]  Jessica J. Fridrich,et al.  Steganalysis of JPEG images using rich models , 2012, Other Conferences.

[24]  Rob The Complete Works of William Shakespeare (Abridged) , 2013 .

[25]  Frank Adelstein,et al.  FAUST: Forensic artifacts of uninstalled steganography tools , 2009, Digit. Investig..

[26]  C. Barden,et al.  Proficiency Testing Trends Following the 2009 National Academy of Sciences Report, “Strengthening Forensic Science in the United States: A Path Forward” , 2016 .

[27]  Anil K. Jain,et al.  Unconstrained face recognition: Establishing baseline human performance via crowdsourcing , 2014, IEEE International Joint Conference on Biometrics.

[28]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.