The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis

This paper presents ins and outs of the ALASKA challenge, a steganalysis challenge built to reflect the constraints of a forensic steganalyst. We motivate and explain the main differences w.r.t. the BOSS challenge (2010), specifically the use of a ranking metric prescribing high false positive rates, the analysis of a large diversity of different image sources and the use of a collection of steganographic schemes adapted to handle color JPEGs. The core of the challenge is also described, this includes the RAW image data-set, the implementations used to generate cover images and the specificities of the embedding schemes. The very first outcomes of the challenge are then presented, and the impacts of different parameters such as demosaicking, filtering, image size, JPEG quality factors and cover-source mismatch are analyzed. Eventually, conclusions are presented, highlighting positive and negative points together with future directions for the next challenges in practical steganalysis.

[1]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[2]  Andrew D. Ker The Square Root Law in Stegosystems with Imperfect Information , 2010, Information Hiding.

[3]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[4]  Jiwu Huang,et al.  A universal image forensic strategy based on steganalytic model , 2014, IH&MMSec '14.

[5]  Dirk Borghys Special Session 2: ALASKA steganalysis challenge 'Into the wild' , 2019 .

[6]  Yun Q. Shi,et al.  An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[7]  Fernando Pérez-González,et al.  The blind Newton sensitivity attack , 2006, Electronic Imaging.

[8]  Teddy Furon,et al.  Better security levels for broken arrows , 2010, Electronic Imaging.

[9]  Tomás Pevný,et al.  Towards dependable steganalysis , 2015, Electronic Imaging.

[10]  Davide Cozzolino,et al.  Noiseprint: A CNN-Based Camera Model Fingerprint , 2018, IEEE Transactions on Information Forensics and Security.

[11]  Tomás Pevný,et al.  The square root law of steganographic capacity , 2008, MM&Sec '08.

[12]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[13]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[14]  Jessica J. Fridrich,et al.  The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.

[15]  Andreas Westfeld A regression-based restoration technique for automated watermark removal , 2008, MM&Sec '08.

[16]  Rainer Böhme,et al.  “Steganalysis in Technicolor” Boosting WS detection of stego images from CFA-interpolated covers , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[17]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[18]  Jessica Fridrich,et al.  Payload Scaling for Adaptive Steganography: An Empirical Study , 2019, IEEE Signal Processing Letters.

[19]  Jessica J. Fridrich,et al.  Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.

[20]  Davide Cozzolino,et al.  Image forgery detection through residual-based local descriptors and block-matching , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[21]  Davide Cozzolino,et al.  Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[22]  Mauro Barni,et al.  The first BOWS contest: Break Our Watermarking System , 2007, Electronic Imaging.

[23]  Teddy Furon,et al.  Broken Arrows , 2008, EURASIP J. Inf. Secur..

[24]  Jessica J. Fridrich,et al.  Rich model for Steganalysis of color images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[25]  Tomás Pevný,et al.  Identifying a steganographer in realistic and heterogeneous data sets , 2012, Other Conferences.

[26]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[27]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[28]  Patrick Bas,et al.  An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain , 2018, IWDW.

[29]  Fatih Kurugollu,et al.  A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO) , 2011, Information Hiding.

[30]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[31]  Patrick Bas,et al.  Steganalysis into the Wild: How to Define a Source? , 2018, Media Watermarking, Security, and Forensics.

[32]  Jessica J. Fridrich,et al.  Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain , 2019, IH&MMSec.

[33]  Andrew D. Ker On the Relationship Between Embedding Costs and Steganographic Capacity , 2018, IH&MMSec.

[34]  Patrick Bas,et al.  Two key estimation techniques for the broken arrows watermarking scheme , 2009, MM&Sec '09.

[35]  Dirk Borghys,et al.  Facing the Cover-Source Mismatch on JPHide using Training-Set Design , 2018, IH&MMSec.

[36]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[37]  Jiangqun Ni,et al.  An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[38]  Michael Geiger 2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge , 2018 .

[39]  Jessica J. Fridrich,et al.  Toss that BOSSbase, Alice! , 2016, Media Watermarking, Security, and Forensics.

[40]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[41]  Tomás Pevný,et al.  Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[42]  Jessica J. Fridrich,et al.  Steganalyzing Images of Arbitrary Size with CNNs , 2018, Media Watermarking, Security, and Forensics.