The ultimate steganalysis benchmark?

We present a new benchmark for binary steganalysis methods, based on the asymptotic information (in the entropic sense) it gives about the presence of hidden data. The theoretical foundation is quite unlike ad hoc performance measures found in steganalysis literature that are based on false positive and negative rates. It is argued that this new metric is an application-independent long-run measure of true performance. There are some challenges to computing the benchmark empirically, and some suggested methods are presented, but no definitive answer emerges. As a simple case study, some steganalysis methods from the literature are evaluated using these techniques.

[1]  Qing Wang,et al.  Divergence estimation of continuous distributions based on data-dependent partitions , 2005, IEEE Transactions on Information Theory.

[2]  Ying Wang,et al.  Statistical modeling and steganalysis of DFT-based image steganography , 2006, Electronic Imaging.

[3]  S. Kullback,et al.  Information Theory and Statistics , 1959 .

[4]  Rainer Böhme,et al.  A two-factor error model for quantitative steganalysis , 2006, Electronic Imaging.

[5]  H. Cramér Mathematical methods of statistics , 1947 .

[6]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[7]  Trevor Hastie,et al.  Polynomial splines and their tensor products in extended linear modeling. Discussion and rejoinder , 1997 .

[8]  Andrew D. Ker Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.

[9]  Andrew D. Ker Derivation of Error Distribution in Least Squares Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.

[10]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[11]  Andrew D. Ker A General Framework for Structural Steganalysis of LSB Replacement , 2005, Information Hiding.

[12]  Xiangyang Luo,et al.  An Improved Sample Pairs Method for Detection of LSB Embedding , 2004, Information Hiding.

[13]  Andrew D. Ker Optimally weighted least-squares steganalysis , 2007, Electronic Imaging.

[14]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[15]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[16]  Sorina Dumitrescu,et al.  Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.

[17]  Solomon Kullback,et al.  Information Theory and Statistics , 1970, The Mathematical Gazette.

[18]  Young K. Truong,et al.  Polynomial splines and their tensor products in extended linearmodeling , 1997 .

[19]  Andrew D. Ker A Capacity Result for Batch Steganography , 2007, IEEE Signal Processing Letters.