Practical strategies for content-adaptive batch steganography and pooled steganalysis

This paper investigates practical strategies for distributing payload across images with content-adaptive steganography and for pooling outputs of a single-image detector for steganalysis. Adopting a statistical model for the detector's output, the steganographer minimizes the power of the most powerful detector of an omniscient Warden, while the Warden, informed by the payload spreading strategy, detects with the likelihood ratio test in the form of a matched filter. Experimental results with state-of-the-art content-adaptive additive embedding schemes and rich models are included to show the relevance of the results.

[1]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[2]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[3]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[4]  Tomás Pevný,et al.  Batch steganography in the real world , 2012, MM&Sec '12.

[5]  Rainer Böhme,et al.  A two-factor error model for quantitative steganalysis , 2006, Electronic Imaging.

[6]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[7]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[8]  Andrew D. Ker Perturbation Hiding and the Batch Steganography Problem , 2008, Information Hiding.

[9]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[10]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[11]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[12]  Jessica J. Fridrich,et al.  Effect of saturated pixels on security of steganographic schemes for digital images , 2016, 2016 IEEE International Conference on Image Processing (ICIP).

[13]  Andrew D. Ker,et al.  The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.

[14]  Rémi Cogranne,et al.  A sequential method for online steganalysis , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[15]  Andrew D. Ker Batch steganography and the threshold game , 2007, Electronic Imaging.

[16]  Tomás Pevný,et al.  Optimizing pooling function for pooled steganalysis , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[17]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[18]  Tomás Pevný,et al.  Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[19]  Jessica Fridrich,et al.  Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory , 2015, IEEE Transactions on Information Forensics and Security.

[20]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[21]  Andrew D. Ker Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.

[22]  Tomás Pevný,et al.  Rethinking Optimal Embedding , 2016, IH&MMSec.