Steganography via cover-source switching

This paper proposes a new steganographic scheme relying on the principle of “cover-source switching”, the key idea being that the embedding should switch from one cover-source to another. The proposed implementation, called Natural Steganography considers the sensor noise naturally present in the raw images and uses the principle that, by the addition of a specific noise the steganographic embedding tries to mimic a change of ISO sensitivity. The embedding methodology consists in 1) designing the stego-signal that enable to switch from one source to another the raw domain, 2) computing the statistical distribution of the stego-signal in the processed domain, 3) embedding the payload in the processed domain. We show that this methodology is easily tractable whenever the processes are known and enables to embed large and undetectable payloads.

[1]  Standard for Characterization of Image Sensors and Cameras Release 3 . 1 , 2010 .

[2]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[3]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[4]  Jessica J. Fridrich,et al.  Side-informed steganography with additive distortion , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[5]  K. Egiazarian,et al.  Noise Measurement for Raw-Data of Digital Imaging Sensors by Automatic Segmentation of Nonuniform Targets , 2007, IEEE Sensors Journal.

[6]  Elke Franz,et al.  Pre-processing for Adding Noise Steganography , 2005, Information Hiding.

[7]  Karen O. Egiazarian,et al.  Practical Poissonian-Gaussian Noise Modeling and Fitting for Single-Image Raw-Data , 2008, IEEE Transactions on Image Processing.

[8]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[9]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[10]  Marc Chaumont,et al.  Adaptive steganography by oracle (ASO) , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).

[11]  Patrick Bas Natural Steganography: cover-source switching for better steganography , 2016, ArXiv.

[12]  Jessica J. Fridrich,et al.  Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.

[13]  Xianfeng Zhao,et al.  Constructing Near-optimal Double-layered Syndrome-Trellis Codes for Spatial Steganography , 2016, IH&MMSec.

[14]  Jessica J. Fridrich,et al.  Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.

[15]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[16]  Florent Retraint,et al.  Source camera device identification based on raw images , 2015, 2015 IEEE International Conference on Image Processing (ICIP).

[17]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[18]  Florent Retraint,et al.  Camera Model Identification Based on the Heteroscedastic Noise Model , 2014, IEEE Transactions on Image Processing.

[19]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[20]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[21]  Andreas Pfitzmann,et al.  Steganography Secure against Cover-Stego-Attacks , 1999, Information Hiding.

[22]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[23]  John G. Proakis,et al.  Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..