Ensemble Steganography

Currently, selection-channel-aware (SCA) steganalysis is the most successful technique for detecting steganography. It estimates the modification probabilities to improve its performance. How to counter SCA steganalysis is one of the most challenging works in steganography. In this paper, we propose ensemble steganography which introduces random cost functions to disturb the estimation of the modification probabilities of cover elements. The experimental results imply that ensemble steganography improves the performance of HILL and UNIWARD in countering SCA steganalysis and the security of ensemble steganography increases with the number of cost functions and the differences among them.

[1]  Jessica J. Fridrich,et al.  Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.

[2]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[3]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[4]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[5]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[6]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[7]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[8]  Jiwu Huang,et al.  Adaptive Steganalysis Based on Embedding Probabilities of Pixels , 2016, IEEE Transactions on Information Forensics and Security.

[9]  FridrichJessica,et al.  Rich Models for Steganalysis of Digital Images , 2012 .

[10]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.

[11]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[12]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[13]  Jun Li,et al.  A game-theoretic method for designing distortion function in spatial steganography , 2017, Multimedia Tools and Applications.

[14]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[15]  Pedro Comesaña Alfaro,et al.  Improving Selection-Channel-Aware Steganalysis Features , 2016, Media Watermarking, Security, and Forensics.

[16]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[17]  Hang Zhou,et al.  Defining cost functions for adaptive steganography at the microscale , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[18]  Jiwu Huang,et al.  Adaptive steganalysis against WOW embedding algorithm , 2014, IH&MMSec '14.