Towards Improved Steganalysis: When Cover Selection is Used in Steganography

This paper proposes an improved steganalytic method when cover selection is used in steganography. We observed that the covers selected by existing cover selection methods normally have different characteristics from normal ones, and propose a steganalytic method to capture such differences. As a result, the detection accuracy of steganalysis is increased. In our method, we consider a number of images collected from one or more target (suspected but not known) users, and use an unsupervised learning algorithm such as $k$ -means to adapt the performance of a pre-trained classifier towards the cover selection operation of the target user(s). The adaptation is done via pseudo-labels from the suspected images themselves, thus allowing the re-trained classifier more aligned with the cover selection operation of the target user(s). We give experimental results to show that our method can indeed help increase the detection accuracy, especially when the percentage of stego images is between 0.3 and 0.7.

[1]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[2]  Jessica J. Fridrich,et al.  Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.

[3]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[4]  Xinpeng Zhang,et al.  Secure Cover Selection for Steganography , 2019, IEEE Access.

[5]  Vijay H. Mankar,et al.  Curvelet transform and cover selection for secure steganography , 2018, Multimedia Tools and Applications.

[6]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[7]  Xinpeng Zhang,et al.  Hybrid distortion function for JPEG steganography , 2016, J. Electronic Imaging.

[8]  Zhenxing Qian,et al.  Diversity-Based Cascade Filters for JPEG Steganalysis , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[9]  Xinpeng Zhang,et al.  Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images , 2019, IEEE Transactions on Image Processing.

[10]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[11]  Yun Q. Shi,et al.  Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.

[12]  Mi Wen,et al.  Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles , 2016, IEEE Transactions on Information Forensics and Security.

[13]  Yang Ren-e Cover selection for image steganography based on image characteristics , 2014 .

[14]  Hedieh Sajedi,et al.  Cover Selection Steganography Method Based on Similarity of Image Blocks , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.

[15]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[16]  Adrian G. Bors,et al.  Selection of robust features for the Cover Source Mismatch problem in 3D steganalysis , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).

[17]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[18]  Yan Liu,et al.  What makes the stego image undetectable? , 2015, ICIMCS '15.

[19]  Fei Peng,et al.  Robust Coverless Image Steganography Based on DCT and LDA Topic Classification , 2018, IEEE Transactions on Multimedia.

[20]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[21]  Xinpeng Zhang,et al.  Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization , 2018, IEEE Signal Processing Letters.

[22]  Andrew D. Ker,et al.  Steganalysis with mismatched covers: do simple classifiers help? , 2012, MM&Sec '12.

[23]  Hedieh Sajedi,et al.  Using contourlet transform and cover selection for secure steganography , 2010, International Journal of Information Security.

[24]  Nasir D. Memon,et al.  Cover Selection for Steganographic Embedding , 2006, 2006 International Conference on Image Processing.

[25]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[26]  Marc Chaumont,et al.  Steganalysis with cover-source mismatch and a small learning database , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).

[27]  Zhenxing Qian,et al.  Single Actor Pooled Steganalysis , 2018, ICGEC.

[28]  Bin Li,et al.  New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator , 2017, IEEE Transactions on Information Forensics and Security.

[29]  Tomás Pevný,et al.  A new paradigm for steganalysis via clustering , 2011, Electronic Imaging.

[30]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[31]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[32]  Jiangqun Ni,et al.  Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.

[33]  Andrew D. Ker,et al.  The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.

[34]  Mo Chen,et al.  Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.

[35]  Jing Dong,et al.  SSGAN: Secure Steganography Based on Generative Adversarial Networks , 2017, PCM.

[36]  Roman V. Meshcheryakov,et al.  Approach to the selection of the best cover image for information embedding in JPEG images based on the principles of the optimality , 2018, J. Decis. Syst..

[37]  Jiwu Huang,et al.  Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework , 2016, IEEE Transactions on Information Forensics and Security.

[38]  Jessica J. Fridrich,et al.  Study of cover source mismatch in steganalysis and ways to mitigate its impact , 2014, Electronic Imaging.

[39]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[40]  Tomás Pevný,et al.  Optimizing pooling function for pooled steganalysis , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[41]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[42]  Marc Chaumont,et al.  Technical points about adaptive steganography by oracle (ASO) , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).