Breaking Steganography: Slight Modification with Distortion Minimization

This article describes how to overcome the shortage of steganalysis for small capacity-based embedding.Aslightmodificationmethodisproposedtobreaksteganography.Foragivenimage, traditionalsteganalysismethodsarefirstusedtoachieveapreliminaryresult.Forthe“clear”image judgedbysteganalysis,itisstillsuspiciousbecauseoftheincompletenessofsteganalysisforsmall capacity. Thus, slight modifications are made to break the possibility of covert communication. Themodificationsaremadeonthelocationswithminimaldistortiontoguaranteehighqualityof themodifiedimage.Tothisend,aproposeddistortionminimizationbasedalgorithmusingslight modification.Experimentalresultsshowthattheerrorrateofsecretdataextractionisaround50% afterimplementation,whichindicatesthatthecovertcommunicationofsteganographyisdestroyed completely. KeywoRDS Distortion Minimizing, Modification, Steganalysis, Steganography

[1]  Yi Zhang,et al.  Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.

[2]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Jessica J. Fridrich,et al.  Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.

[4]  A. Bovik,et al.  A universal image quality index , 2002, IEEE Signal Processing Letters.

[5]  Jessica J. Fridrich,et al.  Steganalysis Features for Content-Adaptive JPEG Steganography , 2016, IEEE Transactions on Information Forensics and Security.

[6]  Marwan Omar,et al.  Insider Threats: Detecting and Controlling Malicious Insiders , 2015 .

[7]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[8]  Jessica J. Fridrich,et al.  Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.

[9]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[10]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[11]  Weiming Zhang,et al.  Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes , 2008, Information Hiding.

[12]  Xinpeng Zhang,et al.  Spatial Steganalysis Using Contrast of Residuals , 2016, IEEE Signal Processing Letters.

[13]  Xinpeng Zhang,et al.  Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain , 2018 .

[14]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[15]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[16]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[17]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.

[18]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[19]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[20]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[21]  Johnny Nhan,et al.  Policing of Movie and Music Piracy: The Utility of a Nodal Governance Security Framework , 2011 .

[22]  Jiwu Huang,et al.  Adaptive Steganalysis Based on Embedding Probabilities of Pixels , 2016, IEEE Transactions on Information Forensics and Security.

[23]  Fusheng Yang,et al.  An Overview on Passive Image Forensics Technology for Automatic Computer Forgery , 2016, Int. J. Digit. Crime Forensics.

[24]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[25]  Xinpeng Zhang,et al.  Hybrid distortion function for JPEG steganography , 2016, J. Electronic Imaging.

[26]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[27]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[28]  Yun Q. Shi,et al.  Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.