Secure Cover Selection for Steganography

Existing cover selection methods for steganography cannot resist pooled steganalysis. This paper proposes a secure cover selection method which is able to resist pooled steganalysis and single object steganalysis meanwhile. To resist pooled steganalysis, the maximum mean discrepancy (MMD) distance between the stego set and a clear arbitrary image set is kept not larger than a normal threshold during cover selection, where the threshold is the MMD distance between two clear arbitrary image sets. Under this constraint, a searching strategy is designed to select the minimal steganographic distortion images within the affordable computational complexity to resist single object steganalysis. With the selected covers, the security of steganography is guaranteed against both single object steganalysis and pooled steganalysis. The experimental results demonstrated the effectiveness of the proposed method.

[1]  Tomás Pevný,et al.  A new paradigm for steganalysis via clustering , 2011, Electronic Imaging.

[2]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[3]  Xinpeng Zhang,et al.  Towards Robust Image Steganography , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[4]  Andrew D. Ker,et al.  The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.

[5]  Mo Chen,et al.  Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.

[6]  Xinpeng Zhang,et al.  Lost in the Digital Wild: Hiding Information in Digital Activities , 2018, MPS@CCS.

[7]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[8]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[9]  Jessica J. Fridrich,et al.  Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.

[10]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[11]  Jiangqun Ni,et al.  Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.

[12]  Xinpeng Zhang,et al.  Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization , 2018, IEEE Signal Processing Letters.

[13]  Roman V. Meshcheryakov,et al.  Approach to the selection of the best cover image for information embedding in JPEG images based on the principles of the optimality , 2018, J. Decis. Syst..

[14]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[15]  Hedieh Sajedi,et al.  Cover Selection Steganography Method Based on Similarity of Image Blocks , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.

[16]  Zhenxing Qian,et al.  Diversity-Based Cascade Filters for JPEG Steganalysis , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[17]  Mi Wen,et al.  Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles , 2016, IEEE Transactions on Information Forensics and Security.

[18]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[19]  Bernhard Schölkopf,et al.  A Kernel Method for the Two-Sample-Problem , 2006, NIPS.

[20]  Hedieh Sajedi,et al.  Using contourlet transform and cover selection for secure steganography , 2010, International Journal of Information Security.

[21]  Yan Liu,et al.  What makes the stego image undetectable? , 2015, ICIMCS '15.

[22]  Xiangyang Luo,et al.  Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[23]  Tomás Pevný,et al.  Optimizing pooling function for pooled steganalysis , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[24]  Xinpeng Zhang,et al.  Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition , 2018, IEEE Access.

[25]  Tomás Pevný,et al.  Identifying a steganographer in realistic and heterogeneous data sets , 2012, Other Conferences.

[26]  Vijay H. Mankar,et al.  Curvelet transform and cover selection for secure steganography , 2018, Multimedia Tools and Applications.

[27]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[28]  Nasir D. Memon,et al.  Cover Selection for Steganographic Embedding , 2006, 2006 International Conference on Image Processing.

[29]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[30]  Bin Li,et al.  New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator , 2017, IEEE Transactions on Information Forensics and Security.

[31]  Xinpeng Zhang,et al.  Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images , 2019, IEEE Transactions on Image Processing.

[32]  Jiwu Huang,et al.  Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework , 2016, IEEE Transactions on Information Forensics and Security.

[33]  Zhenxing Qian,et al.  On Improving Distortion Functions for JPEG Steganography , 2018, IEEE Access.