Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition

Batch steganography refers to a steganography method where a user tries to hide confidential payload within a batch of images from social networks. It is significantly different from the traditional laboratory steganography where a user only considers an individual image. To apply batch steganography in social media networks, we are faced with two nontrivial problems: 1) how to assign payload to multiple images? and 2) how to recover the hidden payload if some images are lost during transmission? We tackle the problems by: 1) developing an optimal payload embedding strategy and 2) designing a special type of data decomposition. In the former, an optimal non-uniform payload distribution for multiple images is obtained by iterative feature back replacement. In the later, we employ special matrix operation to expand original data and split them into multiple shares. These shares are then embedded into different covers following the optimal non-uniform payload distribution. Our solution is robust in the sense that the recipient can recover the hidden data even if some images are intercepted or lost during delivery. Comprehensive experimental results show that our method outperforms the state-of-the-art in terms of anti-detectability and robustness.

[1]  Jessica Fridrich,et al.  Steganography With Multiple JPEG Images of the Same Scene , 2017, IEEE Transactions on Information Forensics and Security.

[2]  Bernhard Schölkopf,et al.  A Kernel Method for the Two-Sample-Problem , 2006, NIPS.

[3]  Jessica J. Fridrich,et al.  Model Based Steganography with Precover , 2017, Media Watermarking, Security, and Forensics.

[4]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[5]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[6]  Tomás Pevný,et al.  Batch steganography in the real world , 2012, MM&Sec '12.

[7]  Jessica J. Fridrich,et al.  Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.

[8]  Tomás Pevný,et al.  Optimizing pooling function for pooled steganalysis , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[9]  Andrew D. Ker Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.

[10]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[11]  Xinpeng Zhang,et al.  Spatial Steganalysis Using Contrast of Residuals , 2016, IEEE Signal Processing Letters.

[12]  Hai-Dong Yuan,et al.  Secret sharing with multi-cover adaptive steganography , 2014, Inf. Sci..

[13]  Victor-Emil Neagoe,et al.  Inversion of the Van der Monde matrix , 1996, IEEE Signal Processing Letters.

[14]  Changjun Liu,et al.  Embedding Strategy for Batch Adaptive Steganography , 2016, IWDW.

[15]  Tomás Pevný,et al.  The square root law of steganographic capacity , 2008, MM&Sec '08.

[16]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[17]  Mi Wen,et al.  Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles , 2016, IEEE Transactions on Information Forensics and Security.

[18]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[19]  Jessica Fridrich,et al.  Kernel methods in steganalysis , 2008 .

[20]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[21]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[22]  Jessica J. Fridrich,et al.  Practical strategies for content-adaptive batch steganography and pooled steganalysis , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[23]  Vojtöch Holub,et al.  CONTENT ADAPTIVE STEGANOGRAPHY - DESIGN AND DETECTION , 2014 .

[24]  Masoud Nikravesh,et al.  Feature Extraction - Foundations and Applications , 2006, Feature Extraction.

[25]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[26]  Changjun Liu,et al.  Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain , 2017, Multimedia Tools and Applications.

[27]  Tomás Pevný,et al.  A new paradigm for steganalysis via clustering , 2011, Electronic Imaging.

[28]  Amal Said Khalifa,et al.  Video steganography: a comprehensive review , 2015, Multimedia Tools and Applications.

[29]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[30]  Xian-Da Zhang,et al.  Matrix Analysis and Applications , 2017 .

[31]  Andrew D. Ker The Square Root Law of Steganography: Bringing Theory Closer to Practice , 2017, IH&MMSec.

[32]  Hedieh Sajedi,et al.  Adaptive batch steganography considering image embedding capacity , 2009 .

[33]  KokSheik Wong,et al.  An Overview of Information Hiding in H.264/AVC Compressed Video , 2014, IEEE Transactions on Circuits and Systems for Video Technology.

[34]  Andrew D. Ker,et al.  The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.

[35]  Weiming Zhang,et al.  Efficient steganography based on a data decomposition mechanism , 2008, 2008 Third International Conference on Communications and Networking in China.