Pooled Steganalysis in JPEG: how to deal with the spreading strategy?

In image pooled steganalysis, a steganalyst, Eve, aims to detect if a set of images sent by a steganographer, Alice, to a receiver, Bob, contains a hidden message. We can reasonably assess that the steganalyst does not know the strategy used to spread the payload across images. To the best of our knowledge, in this case, the most appropriate solution for pooled steganalysis is to use a Single-Image Detector (SID) to estimate/quantify if an image is cover or stego, and to average the scores obtained on the set of images.In such a scenario, where Eve does not know the spreading strategies, we experimentally show that if Eve can discriminate among few well-known spreading strategies, she can improve her steganalysis performances compared to a simple averaging or maximum pooled approach. Our discriminative approach allows obtaining steganalysis efficiencies comparable to those obtained by a clairvoyant, Eve, who knows the Alice spreading strategy. Another interesting observation is that DeLS spreading strategy behaves really better than all the other spreading strategies.Those observations results in the experimentation with six different spreading strategies made on Jpeg images with J-UNIWARD, a state-of-the-art Single-Image-Detector, and a discriminative architecture that is invariant to the individual payload in each image, invariant to the size of the analyzed set of images, and build on a binary detector (for the pooling) that is able to deal with various spreading strategies.

[1]  Jessica J. Fridrich,et al.  Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain , 2019, IH&MMSec.

[2]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[3]  Tomás Pevný,et al.  Optimizing pooling function for pooled steganalysis , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[4]  Andrew D. Ker,et al.  The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.

[5]  Yi Zhang,et al.  Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.

[6]  Jessica J. Fridrich,et al.  Minimizing the embedding impact in steganography , 2006, MM&Sec '06.

[7]  Jessica Fridrich,et al.  Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Tomás Pevný,et al.  Batch steganography in the real world , 2012, MM&Sec '12.

[9]  Tomás Pevný,et al.  A new paradigm for steganalysis via clustering , 2011, Electronic Imaging.

[10]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[11]  Jessica J. Fridrich,et al.  Steganalyzing Images of Arbitrary Size with CNNs , 2018, Media Watermarking, Security, and Forensics.

[12]  Marc Chaumont,et al.  Quantitative and Binary Steganalysis in JPEG: A Comparative Study , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[13]  Andrew D. Ker,et al.  Going from small to large data in steganalysis , 2012, Other Conferences.

[14]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[15]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[16]  Jessica J. Fridrich,et al.  Practical strategies for content-adaptive batch steganography and pooled steganalysis , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[17]  WOW S-UNIWARD,et al.  Deep Learning Regressors for Quantitative Steganalysis , 2018 .

[18]  Andrew D. Ker Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.

[19]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[20]  Jessica J. Fridrich,et al.  Quantitative steganalysis using rich models , 2013, Electronic Imaging.

[21]  Rémi Cogranne,et al.  A sequential method for online steganalysis , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[22]  Ingemar J. Cox,et al.  A comparative study of ± steganalyzers , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[23]  Marc Chaumont,et al.  Steganalysis with cover-source mismatch and a small learning database , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).

[24]  Jessica J. Fridrich,et al.  Nonlinear Feature Normalization in Steganalysis , 2017, IH&MMSec.