Detection-and Information-Theoretic Analysis of Steganography and Fingerprinting

First, from a detection-theoretic perspective, we quantify the detectability of commonly used information-hiding techniques such as spread spectrum and distortion-compensated quantization index modulation, and also the detectability of block-based steganography. We devise a practical steganalysis method that exploits the peculiar block structure of block-DCT image steganography. To cope with the twin difficulties of unknown image statistics and unknown steganographic codes, we explore image steganalysis based on supervised learning and build an optimized classifier that outperforms previously proposed image steganalysis methods.

[1]  B. S. Manjunath,et al.  Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.

[2]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[3]  Mung Chiang,et al.  Duality between channel capacity and rate distortion with two-sided state information , 2002, IEEE Trans. Inf. Theory.

[4]  S. Katzenbeisser,et al.  A survey of steganographic techniques , .

[5]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[6]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[7]  B. S. Manjunath,et al.  Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.

[8]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[9]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[10]  Jessica J. Fridrich,et al.  Stochastic approach to secret message length estimation in ±k embedding steganography , 2005, IS&T/SPIE Electronic Imaging.

[11]  Ying Wang,et al.  Statistical modeling and steganalysis of DFT-based image steganography , 2006, Electronic Imaging.

[12]  Eero P. Simoncelli,et al.  Random Cascades on Wavelet Trees and Their Use in Analyzing and Modeling Natural Images , 2001 .

[13]  Neri Merhav,et al.  On the capacity game of private fingerprinting systems under collusion attacks , 2003, IEEE Transactions on Information Theory.

[14]  Pierre Moulin,et al.  The parallel-Gaussian watermarking game , 2004, IEEE Transactions on Information Theory.

[15]  Anil K. Jain Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.

[16]  Jessica J. Fridrich,et al.  Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.

[17]  Ying Wang,et al.  Error exponents for channel coding with side information , 2004, Information Theory Workshop.

[18]  Amos Lapidoth,et al.  The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.

[19]  Zixiang Xiong,et al.  Optimal number of features as a function of sample size for various classification rules , 2005, Bioinform..

[20]  Jelena Kovacevic,et al.  Wavelets and Subband Coding , 2013, Prentice Hall Signal Processing Series.

[21]  Chih-Jen Lin,et al.  A Practical Guide to Support Vector Classication , 2008 .

[22]  Pierre Moulin,et al.  Analysis of Multiresolution Image Denoising Schemes Using Generalized Gaussian and Complexity Priors , 1999, IEEE Trans. Inf. Theory.

[23]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[24]  Yun Q. Shi,et al.  JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.

[25]  Richard E. Blahut,et al.  Principles and practice of information theory , 1987 .

[26]  N. Merhav,et al.  On the capacity game of public watermarking systems , 2002, Proceedings IEEE International Symposium on Information Theory,.

[27]  N. Ushakov Selected Topics in Characteristic Functions , 1999 .

[28]  Yuichi Mori,et al.  Handbook of Computational Statistics , 2004 .

[29]  Josef Kittler,et al.  Floating search methods in feature selection , 1994, Pattern Recognit. Lett..

[30]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[31]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[32]  Ingemar J. Cox,et al.  Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[33]  Ying Wang,et al.  Steganalysis of block-structured stegotext , 2004, IS&T/SPIE Electronic Imaging.

[34]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[35]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[36]  Michael T. Orchard,et al.  Image coding based on mixture modeling of wavelet coefficients and a fast estimation-quantization framework , 1997, Proceedings DCC '97. Data Compression Conference.

[37]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[38]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[39]  Ying Wang,et al.  Steganalysis of block-DCT image steganography , 2003, IEEE Workshop on Statistical Signal Processing, 2003.

[40]  Anil K. Jain,et al.  Feature Selection: Evaluation, Application, and Small Sample Performance , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[41]  Chengyun Yang,et al.  Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.

[42]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[43]  David L. Donoho,et al.  Implications for Image Watermarking of Recent Work in Image Analysis and Representation , 2002, IWDW.

[44]  Abbas El Gamal,et al.  On the capacity of computer memory with defects , 1983, IEEE Trans. Inf. Theory.

[45]  Jessica J. Fridrich,et al.  Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.

[46]  Jeffrey H. Shapiro Bounds on the area under the ROC curve , 1999 .

[47]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[48]  R. Zamir,et al.  On lattice quantization noise , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[49]  B. S. Manjunath,et al.  Determining Achievable Rates for Secure, Zero Divergence, Steganography , 2006, 2006 International Conference on Image Processing.

[50]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[51]  Pierre Moulin,et al.  New results on steganographic capacity , 2004 .

[52]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[53]  Ece Dept,et al.  A STOCHASTIC QIM ALGORITHM FOR ROBUST, UNDETECTABLE IMAGE WATERMARKING , 2004 .

[54]  Kannan Ramchandran,et al.  Duality between source coding and channel coding and its extension to the side information case , 2003, IEEE Trans. Inf. Theory.

[55]  Jean Dickinson Gibbons,et al.  Nonparametric Statistical Inference , 1972, International Encyclopedia of Statistical Science.

[56]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[57]  Shlomo Shamai,et al.  Nested linear/Lattice codes for structured multiterminal binning , 2002, IEEE Trans. Inf. Theory.

[58]  Gregory W. Wornell,et al.  The duality between information embedding and source coding with side information and some applications , 2003, IEEE Trans. Inf. Theory.

[59]  B. S. Manjunath,et al.  Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration , 2006, 2006 International Conference on Image Processing.

[60]  Sorina Dumitrescu,et al.  Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.

[61]  Eero P. Simoncelli,et al.  On Advances in Statistical Modeling of Natural Images , 2004, Journal of Mathematical Imaging and Vision.

[62]  Neri Merhav,et al.  On the error exponent and capacity games of private watermarking systems , 2003, IEEE Trans. Inf. Theory.

[63]  Eero P. Simoncelli Higher-order statistical models of visual images , 1999, Proceedings of the IEEE Signal Processing Workshop on Higher-Order Statistics. SPW-HOS '99.

[64]  Robert V. Brill,et al.  Applied Statistics and Probability for Engineers , 2004, Technometrics.

[65]  Prakash Narayan,et al.  Reliable communication under channel uncertainty (invited paper) , 2000 .

[66]  Neri Merhav,et al.  Achievable Error Exponents for the Private Fingerprinting Game , 2007, IEEE Transactions on Information Theory.

[67]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[68]  Moshe Ben-Bassat,et al.  35 Use of distance measures, information measures and error bounds in feature evaluation , 1982, Classification, Pattern Recognition and Reduction of Dimensionality.

[69]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[70]  Jessica J. Fridrich,et al.  Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain , 2005, IS&T/SPIE Electronic Imaging.

[71]  Neri Merhav,et al.  On the random coding error exponents of the single-user and the multiple-access Gel'fand-Pinsker channels , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[72]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[73]  B. Picinbono Introduction to Detection and Estimation , 1977 .

[74]  Gregory Kipper,et al.  Investigator's Guide to Steganography , 2003 .

[75]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[76]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[77]  David G. Stork,et al.  Pattern Classification , 1973 .

[78]  Stéphane Mallat,et al.  A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..

[79]  Toby Sharp,et al.  An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.

[80]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[81]  Min Wu,et al.  Collusion-resistant fingerprinting for multimedia , 2004 .

[82]  Mauro Barni,et al.  Effectiveness of exhaustive search and template matching against watermark desynchronization , 2005, IEEE Signal Processing Letters.

[83]  Katalin Marton,et al.  A coding theorem for the discrete memoryless broadcast channel , 1979, IEEE Trans. Inf. Theory.

[84]  E. Lukács CERTAIN ENTIRE CHARACTERISTIC FUNCTIONS , 2005 .

[85]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[86]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[87]  Grigory Kabatiansky,et al.  Steganography via covering codes , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..