Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration

In this paper, we present a framework for the design of steganographic schemes that can provide provable security by achieving zero Kullback-Leibler divergence between the cover and the stego signal distributions, while hiding at high rates. The approach is to reserve a number of host symbols for statistical restoration: host statistics perturbed by data embedding are restored by suitably modifying the symbols from the reserved set. A dynamic embedding approach is proposed, which avoids hiding in low probability regions of the host distribution. The framework is applied to design practical schemes for image steganography, which are evaluated using supervised learning on a set of about 1000 natural images. For the presented JPEG steganography scheme, it is seen that the detector is indeed reduced to random guessing.

[1]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[2]  Elke Franz Steganography Preserving Statistical Properties , 2002, Information Hiding.

[3]  B. S. Manjunath,et al.  Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.

[4]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[5]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[6]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[7]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[8]  Pierre Moulin,et al.  A stochastic QIM algorithm for robust, undetectable image watermarking , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[9]  B. S. Manjunath,et al.  Determining Achievable Rates for Secure, Zero Divergence, Steganography , 2006, 2006 International Conference on Image Processing.

[10]  Rainer Böhme,et al.  Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics , 2004, ESORICS.

[11]  D. W. Scott On optimal and data based histograms , 1979 .

[12]  B. S. Manjunath,et al.  Statistical restoration for robust and secure steganography , 2005, IEEE International Conference on Image Processing 2005.

[13]  Pierre Duhamel,et al.  Applied public-key steganography , 2002, IS&T/SPIE Electronic Imaging.

[14]  Jessica J. Fridrich,et al.  Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.

[15]  Bernd Girod,et al.  Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.

[16]  TomasiCarlo,et al.  The Earth Mover's Distance as a Metric for Image Retrieval , 2000 .