Influence of Embedding Strategies on Security of Steganographic - - PowerPoint PPT Presentation

influence of embedding strategies on security of
SMART_READER_LITE
LIVE PREVIEW

Influence of Embedding Strategies on Security of Steganographic - - PowerPoint PPT Presentation

Influence of Steganographic Design Elements Steganalysis of YASS Summary Influence of Embedding Strategies on Security of Steganographic Methods in the JPEG Domain Jan Kodovsk Jessica Fridrich January 28, 2008 / Electronic Imaging 2008


slide-1
SLIDE 1

Influence of Steganographic Design Elements Steganalysis of YASS Summary

Influence of Embedding Strategies on Security of Steganographic Methods in the JPEG Domain

Jan Kodovský Jessica Fridrich January 28, 2008 / Electronic Imaging 2008

Kodovský, Fridrich JPEG Domain Embedding Strategies 1/12

slide-2
SLIDE 2

Influence of Steganographic Design Elements Steganalysis of YASS Summary Introduction Influence of Embedding Operation Adaptive Selection Channels

Three Approaches to JPEG Steganography

Direct DCT coefficients manipulation

Input: JPEG image Embedding operation (how we flip) Selection channel (where we flip) Syndrome coding (matrix embedding, wet paper codes)

Embedding with side information

Input: RAW uncompressed image Selection channel Syndrome coding

Robust embedding in alternative domain

Input: RAW or JPEG image YASS (Solanki et al. 2007)

Kodovský, Fridrich JPEG Domain Embedding Strategies 2/12

slide-3
SLIDE 3

Influence of Steganographic Design Elements Steganalysis of YASS Summary Introduction Influence of Embedding Operation Adaptive Selection Channels

Three Approaches to JPEG Steganography

Direct DCT coefficients manipulation

Input: JPEG image Embedding operation (how we flip) Selection channel (where we flip) Syndrome coding (matrix embedding, wet paper codes)

Embedding with side information

Input: RAW uncompressed image Selection channel Syndrome coding

Robust embedding in alternative domain

Input: RAW or JPEG image YASS (Solanki et al. 2007)

Kodovský, Fridrich JPEG Domain Embedding Strategies 2/12

slide-4
SLIDE 4

Influence of Steganographic Design Elements Steganalysis of YASS Summary Introduction Influence of Embedding Operation Adaptive Selection Channels

Evaluating Security

Blind steganalyzer (Pevný et al., SPIE 2007)

SVM machine with Gaussian kernel 274 merged extended DCT and Markov features 6000 images, single compressed greyscale 80% JPEGs On average 3.2 MPixels, cca 540, 000 nz DCT coeffs 3500 training images & 2500 testing images

Minimal total detection error PE = min

1 2 · (PFA + PMD)

Kodovský, Fridrich JPEG Domain Embedding Strategies 3/12

slide-5
SLIDE 5

Influence of Steganographic Design Elements Steganalysis of YASS Summary Introduction Influence of Embedding Operation Adaptive Selection Channels

Influence of Embedding Operation

Three types of embedding operations involved: F5 embedding operation ±1 embedding –F5 embedding operation F5 ±1 –F5

Kodovský, Fridrich JPEG Domain Embedding Strategies 4/12

slide-6
SLIDE 6

Influence of Steganographic Design Elements Steganalysis of YASS Summary Introduction Influence of Embedding Operation Adaptive Selection Channels

Influence of Embedding Operation

Three types of embedding operations involved: F5 embedding operation ±1 embedding –F5 embedding operation Detection error PE nsF5 payload (bpac) 0.05 0.10 0.15 0.20 Change rate β 0.008 0.016 0.028 0.040 F5 26.31 11.17 5.01 2.29 ±1 10.16 2.09 0.46 0.12 –F5 4.01 0.32 0.12 0.06

nsF5 (Fridrich et al. ACM 2007)

distortion budget nsF5 would do when embedding 0.10 bpac

✁ ✁ ✁ ✁ ✁ ✁ ☛

Kodovský, Fridrich JPEG Domain Embedding Strategies 4/12

slide-7
SLIDE 7

Influence of Steganographic Design Elements Steganalysis of YASS Summary Introduction Influence of Embedding Operation Adaptive Selection Channels

Influence of Embedding Operation

Three types of embedding operations involved: F5 embedding operation ±1 embedding –F5 embedding operation Detection error PE nsF5 payload (bpac) 0.05 0.10 0.15 0.20 Change rate β 0.008 0.016 0.028 0.040 F5 26.31 11.17 5.01 2.29 ±1 10.16 2.09 0.46 0.12 –F5 4.01 0.32 0.12 0.06

nsF5 (Fridrich et al. ACM 2007)

Kodovský, Fridrich JPEG Domain Embedding Strategies 4/12

slide-8
SLIDE 8

Influence of Steganographic Design Elements Steganalysis of YASS Summary Introduction Influence of Embedding Operation Adaptive Selection Channels

Influence of Embedding Operation

Three types of embedding operations involved: F5 embedding operation ±1 embedding –F5 embedding operation Theorem In the absence of any information about the unquantized DCT coefficients, the F5 embedding operation minimizes the total distortion due to quantization and embedding.

Kodovský, Fridrich JPEG Domain Embedding Strategies 4/12

slide-9
SLIDE 9

Influence of Steganographic Design Elements Steganalysis of YASS Summary Introduction Influence of Embedding Operation Adaptive Selection Channels

Influence of Texture

Drawbacks of adaptive selection channels: Less powerful matrix embedding Vulnerability to targeted attacks

Kodovský, Fridrich JPEG Domain Embedding Strategies 5/12

slide-10
SLIDE 10

Influence of Steganographic Design Elements Steganalysis of YASS Summary Introduction Influence of Embedding Operation Adaptive Selection Channels

Influence of Texture

Drawbacks of adaptive selection channels: Less powerful matrix embedding Vulnerability to targeted attacks Our block based measure of texture → t(B) =

(1 − δ(zi, zj)) B . . . 8 × 8 block of pixels zi . . . pixel value at position i Ω . . . set of all the neighbouring pixel pairs (zi, zj) δ . . . indicator function δ(x, y) = 0 for x = y δ(x, x) = 1

Spatial Domain

Kodovský, Fridrich JPEG Domain Embedding Strategies 5/12

slide-11
SLIDE 11

Influence of Steganographic Design Elements Steganalysis of YASS Summary Introduction Influence of Embedding Operation Adaptive Selection Channels

Influence of Texture

Drawbacks of adaptive selection channels: Less powerful matrix embedding Vulnerability to targeted attacks Our block based measure of texture → t(B) =

(1 − δ(zi, zj)) Detection error PE Change rate β 0.008 0.016 0.028 0.040 10% most textured blocks 26.32 11.57 5.27 3.23 25% most textured blocks 25.34 10.57 4.69 2.65 50% most textured blocks 25.88 11.71 4.63 2.51 Regardless the texture 26.31 12.21 5.01 2.29

Kodovský, Fridrich JPEG Domain Embedding Strategies 5/12

slide-12
SLIDE 12

Influence of Steganographic Design Elements Steganalysis of YASS Summary Introduction Influence of Embedding Operation Adaptive Selection Channels

Influence of Spatial Frequency

1 2 2 3 4 5 3 6 4 5 6 3 4 5 6 4 5 6 5 6 6

8 × 8 DCT block

Kodovský, Fridrich JPEG Domain Embedding Strategies 6/12

slide-13
SLIDE 13

Influence of Steganographic Design Elements Steganalysis of YASS Summary Introduction Influence of Embedding Operation Adaptive Selection Channels

Influence of Spatial Frequency

Detection error PE Change rate β 0.008 0.016 0.028 0.040 Diagonals 1-3 26.46 13.59 6.50 3.11 Diagonals 2-4 25.96 11.87 5.19 2.53 Diagonals 3-5 20.45 7.40 2.43 0.92 Diagonals 4-6 14.86 5.81 2.83 0.92 Matrix embedding vs spatial frequency ?

Kodovský, Fridrich JPEG Domain Embedding Strategies 6/12

slide-14
SLIDE 14

Influence of Steganographic Design Elements Steganalysis of YASS Summary Introduction Influence of Embedding Operation Adaptive Selection Channels

Influence of Spatial Frequency

Detection error PE Change rate β 0.008 0.016 0.028 0.040 Diagonals 1-3 26.46 13.59 6.50 3.11 Diagonals 2-4 25.96 11.87 5.19 2.53 Diagonals 3-5 20.45 7.40 2.43 0.92 Diagonals 4-6 14.86 5.81 2.83 0.92 Real embedding schemes Payload (bpac) 0.05 0.10 0.15 0.20 nsF5 in 1-3 25.18 11.93 6.26 5.25 nsF5 in 1-4 27.77 13.85 7.22 3.25 nsF5 in 1-5 26.68 13.27 6.94 2.93 nsF5 (everywhere) 26.31 11.17 5.01 2.29

Kodovský, Fridrich JPEG Domain Embedding Strategies 6/12

slide-15
SLIDE 15

Influence of Steganographic Design Elements Steganalysis of YASS Summary Experimental Results Comparison with Other Methods Additional Features

How YASS Works

  • Kodovský, Fridrich

JPEG Domain Embedding Strategies 7/12

slide-16
SLIDE 16

Influence of Steganographic Design Elements Steganalysis of YASS Summary Experimental Results Comparison with Other Methods Additional Features

How YASS Works

  • !"#

"#

  • $$#

%&$

Kodovský, Fridrich JPEG Domain Embedding Strategies 7/12

slide-17
SLIDE 17

Influence of Steganographic Design Elements Steganalysis of YASS Summary Experimental Results Comparison with Other Methods Additional Features

Experimental Results

0.05 0.1 0.15 0.2 0.1 0.2 0.3 0.4 0.5 PNG JPEG 100% JPEG 90% JPEG 75% QFh=75 QFh=70 QFh=65

Detection error PE Relative payload (bpac)

Kodovský, Fridrich JPEG Domain Embedding Strategies 8/12

slide-18
SLIDE 18

Influence of Steganographic Design Elements Steganalysis of YASS Summary Experimental Results Comparison with Other Methods Additional Features

Experimental Results

0.05 0.1 0.15 0.2 0.1 0.2 0.3 0.4 0.5 PNG JPEG 100% JPEG 90% JPEG 90% − covers single JPEG 75% JPEG 75% − covers single QFh=75 QFh=70 QFh=65

Detection error PE Relative payload (bpac)

Kodovský, Fridrich JPEG Domain Embedding Strategies 8/12

slide-19
SLIDE 19

Influence of Steganographic Design Elements Steganalysis of YASS Summary Experimental Results Comparison with Other Methods Additional Features

Comparison with Other Methods

0.05 0.1 0.15 0.2 0.1 0.2 0.3 0.4 0.5 YASS − PNG YASS − JPEG 100% MMx nsF5

Detection error PE Relative payload (bpac)

MMx (Kim et al. IHW 2006) uses uncompressed images as side information, minimizes emb. distortion in combination with matrix embedding, using Hamming codes

Kodovský, Fridrich JPEG Domain Embedding Strategies 9/12

slide-20
SLIDE 20

Influence of Steganographic Design Elements Steganalysis of YASS Summary Experimental Results Comparison with Other Methods Additional Features

Additional Features

27 WAM features (Goljan et al., SPIE 2006) Higher order absolute moments of the noise residual calculated in wavelet domain 15 Diagonal features (DF) Normalized histogram of DCT coefficients from 15 diagonal bands

Kodovský, Fridrich JPEG Domain Embedding Strategies 10/12

slide-21
SLIDE 21

Influence of Steganographic Design Elements Steganalysis of YASS Summary Experimental Results Comparison with Other Methods Additional Features

Additional Features

JPEG 100%

0.05 0.1 0.15 0.2 0.1 0.15 0.2 0.25 0.3 274 274 + WAM 274 + DF 274 + WAM + DF

Detection error PE Relative payload (bpac)

Kodovský, Fridrich JPEG Domain Embedding Strategies 11/12

slide-22
SLIDE 22

Influence of Steganographic Design Elements Steganalysis of YASS Summary

Summary

F5 embedding operation minimizes combined distortion due to quantization and embedding Adaptive embedding into textured regions is relatively non-influential Syndrome coding is the most important design element Steganalysis of YASS reported

Kodovský, Fridrich JPEG Domain Embedding Strategies 12/12