Modern Steganalysis Can Detect YASS Jan Kodovsk, Tom Pevn, Jessica - - PowerPoint PPT Presentation

modern steganalysis can detect yass
SMART_READER_LITE
LIVE PREVIEW

Modern Steganalysis Can Detect YASS Jan Kodovsk, Tom Pevn, Jessica - - PowerPoint PPT Presentation

Modern Steganalysis Can Detect YASS Jan Kodovsk, Tom Pevn, Jessica Fridrich January 18, 2010 / SPIE Modern Steganalysis Can Detect YASS 1 / 13 YASS Curriculum Vitae Birth Location: University of California, Santa Barbara Birth


slide-1
SLIDE 1

Modern Steganalysis Can Detect YASS

Jan Kodovský, Tomáš Pevný, Jessica Fridrich January 18, 2010 / SPIE

1 / 13 Modern Steganalysis Can Detect YASS

slide-2
SLIDE 2

YASS – Curriculum Vitae

Birth Location: University of California, Santa Barbara Birth Date: More than 2 years ago [Solanki-2007], [Sarkar-2008] Deviation from the paradigm of minimizing embedding impact Steganalysis of 2007 failed to detect YASS reliably Two challenges for steganalysts:

Embedding in key-dependent domain Embedding masked by JPEG compression

2 / 13 Modern Steganalysis Can Detect YASS

slide-3
SLIDE 3

What Is This Talk About

YASS is indeed detectable (even for small images and payloads) Tool: state-of-the-art blind steganalysis

Several different general-purpose feature-sets No utilization of implementation flaws of YASS

Extended versions of YASS involved in tests as well Performance comparison to other methods

YASS = embedding paradigm

3 / 13 Modern Steganalysis Can Detect YASS

slide-4
SLIDE 4

Selected Existing Attacks

[Solanki-2007], [Sarkar-2008] – first blind attacks

YASS outperforms Outguess, Steghide and F5

[Li-2008] – accurate targeted attack

YASS is not randomized enough

[Huang-2008] – important insight

YASS effectively disables calibration MB1 outperforms YASS

[Kodovský-2009] – calibration revisited

Improved way of calibration – Cartesian product Steganography minimizing emb. impact (MME3 and nsF5) is more secure than YASS

4 / 13 Modern Steganalysis Can Detect YASS

slide-5
SLIDE 5

Mechanism of YASS

Sender Receiver Input image Message

RA-encoding

Stego image (JPEG) QFa Message

RA-decoding

Robust Embedding in Key-dependent Domain

5 / 13 Modern Steganalysis Can Detect YASS

slide-6
SLIDE 6

Mechanism of YASS

Sender Receiver Input image Message

RA-encoding

Stego image (JPEG) QFa Message

RA-decoding

Robust Embedding in Key-dependent Domain

YASS

8×8 8×8 8×8

Quantization Index Modulation

QFh B > 8

5 / 13 Modern Steganalysis Can Detect YASS

slide-7
SLIDE 7

Mechanism of YASS

Sender Receiver Input image Message

RA-encoding

Stego image (JPEG) QFa Message

RA-decoding

Robust Embedding in Key-dependent Domain rep

YASS

8×8 8×8 8×8

Quantization Index Modulation

QFh B > 8 Extension 1: repetitive embedding

5 / 13 Modern Steganalysis Can Detect YASS

slide-8
SLIDE 8

Mechanism of YASS

Sender Receiver Input image Message

RA-encoding

Stego image (JPEG) QFa Message

RA-decoding

Robust Embedding in Key-dependent Domain rep

YASS

8×8 8×8 8×8

Quantization Index Modulation

QFh B > 8 Extension 1: repetitive embedding Extension 2: mixture of QFh

5 / 13 Modern Steganalysis Can Detect YASS

slide-9
SLIDE 9

Different Setup Used in Our Tests

Setting Extension B rep QFh DBs Bpac YASS 1 2 9 65,70,75 3,7 0.110 YASS 2 none 9 75

  • 0.051

YASS 3 1 9 1 75

  • 0.187

YASS 4 2 9 65,70,75 2,5 0.118 YASS 5 2 9 50,55,60,65,70 3,7,12,17 0.159 YASS 6 none 10 75

  • 0.031

YASS 7 2 10 65,70,75 3,7 0.078 YASS 8 1 10 1 75

  • 0.138

YASS 9 both 9 2 65,70,75 3,7 0.237 YASS 10 1 10 2 75

  • 0.159

YASS 11 1 11 1 75

  • 0.114

YASS 12 2 11 65,70,75 3,7 0.077 QFa = 75, Input image format: RAW (uncompressed)

6 / 13 Modern Steganalysis Can Detect YASS

slide-10
SLIDE 10

Determining The Payload

Original Message size n Encoded Message size x=q·n RA-encoding

5 20 35 50 65 80 95 200 400 600 800 1,000 Value of q Histogram YASS 1 YASS 2 YASS 5 YASS 6 YASS 8

Difficulties:

YASS embeds only full payload YASS outputs x instead of n

Existing approaches to this issue:

Do not report payload or report RA-encoded payload x Report x/q for some value of q (fixed/random) Report lower and upper bounds x/q1 and x/q2 Determine q for every image directly

Use estimate of q [Sarkar-2008] Use repetitive embedding to determine the value of q

7 / 13 Modern Steganalysis Can Detect YASS

slide-11
SLIDE 11

Determining The Payload

Original Message size n Encoded Message size x=q·n RA-encoding

5 20 35 50 65 80 95 200 400 600 800 1,000 Value of q Histogram YASS 1 YASS 2 YASS 5 YASS 6 YASS 8

Difficulties:

YASS embeds only full payload YASS outputs x instead of n

Existing approaches to this issue:

Do not report payload or report RA-encoded payload x Report x/q for some value of q (fixed/random) Report lower and upper bounds x/q1 and x/q2 Determine q for every image directly

Use estimate of q [Sarkar-2008] Use repetitive embedding to determine the value of q

x, q ⇒ calculate n, take average over all images

7 / 13 Modern Steganalysis Can Detect YASS

slide-12
SLIDE 12

Steganalysis Feature Sets

MP (486) – Markov Process

Sample transition probability matrices of 1st order Markov chains

  • f DCT coefficients (within and between DCT blocks)

Introduced in [Chen-2008]

CC-PEV (2×274=548) – Cartesian calibrated Pevný features

Basis: 274 features [Pevný-2007] Introduced in [Kodovský-2009]

SPAM (686) – Subtractive Pixel Adjacency Model

Differences between pixels modeled as 2

nd order Markov chains

Introduced in [Pevný-2009]

CDF (1,234) – Cross-Domain Features

Merged CC-PEV and SPAM features

8 / 13 Modern Steganalysis Can Detect YASS

slide-13
SLIDE 13

Steganalysis Methodology

Testing database

6,500 images acquired in the raw format Converted to 8-bit grayscale, resized to 512 pixels

Classification tool

Soft-margin SVM with Gaussian Kernel Hyperparameters (C, γ) optimized over a fixed grid of values Five-fold cross-validation

Measure of security

Minimal probability of misclassification PE Equal prior probabilities of cover and stego

PFA 1 − PMD ROC curve

PE = min 1

2 (PFA + PMD)

9 / 13 Modern Steganalysis Can Detect YASS

slide-14
SLIDE 14

Experimental Results

MP CC-PEV SPAM ← feature set Algorithm bpac (486) (548) (686) ← dimension YASS 1 0.110 0.110 0.123 0.140 YASS 2 0.051 0.155 0.164 0.152 YASS 3 0.187 0.117 0.086 0.111 YASS 4 0.118 0.098 0.112 0.130 YASS 5 0.159 0.054 0.069 0.094 YASS 6 0.031 0.270 0.260 0.145 YASS 7 0.078 0.237 0.222 0.133 YASS 8 0.138 0.232 0.180 0.121 YASS 9 0.237 0.068 0.046 0.093 YASS 10 0.159 0.202 0.141 0.119 YASS 11 0.114 0.186 0.159 0.178 YASS 12 0.077 0.179 0.194 0.179

10 / 13 Modern Steganalysis Can Detect YASS

slide-15
SLIDE 15

Experimental Results

MP CC-PEV SPAM CDF ← feature set Algorithm bpac (486) (548) (686) (1,234) ← dimension YASS 1 0.110 0.110 0.123 0.140 0.070 YASS 2 0.051 0.155 0.164 0.152 0.097 YASS 3 0.187 0.117 0.086 0.111 0.055 YASS 4 0.118 0.098 0.112 0.130 0.064 YASS 5 0.159 0.054 0.069 0.094 0.037 YASS 6 0.031 0.270 0.260 0.145 0.124 YASS 7 0.078 0.237 0.222 0.133 0.106 YASS 8 0.138 0.232 0.180 0.121 0.095 YASS 9 0.237 0.068 0.046 0.093 0.028 YASS 10 0.159 0.202 0.141 0.119 0.084 YASS 11 0.114 0.186 0.159 0.178 0.109 YASS 12 0.077 0.179 0.194 0.179 0.135

10 / 13 Modern Steganalysis Can Detect YASS

slide-16
SLIDE 16

Experimental Results, cont’d

0.05 0.10 0.15 0.20 0.00 0.05 0.10 0.15 Average payload (bpac) Detection error PE CDF

11 / 13 Modern Steganalysis Can Detect YASS

slide-17
SLIDE 17

Experimental Results, cont’d

0.05 0.10 0.15 0.20 0.00 0.05 0.10 0.15 Average payload (bpac) Detection error PE CDF

Original YASS Extension 1 – repetition Extension 2 – mixture of QFh Both Extensions

11 / 13 Modern Steganalysis Can Detect YASS

slide-18
SLIDE 18

Comparison to Other Methods

0.05 0.10 0.15 0.20 0.1 0.2 0.3 0.4 0.5 Relative payload (bpac) Detection error PE YASS MME3 nsF5

12 / 13 Modern Steganalysis Can Detect YASS

slide-19
SLIDE 19

Conclusions

Modern steganalysis can detect YASS reliably PE < 15% even for small payloads No implementation weakness employed ⇒ detectability of further modifications Minimization of embedding impact seems like more secure steganographic strategy

[ jan.kodovsky@binghamton.edu ]

13 / 13 Modern Steganalysis Can Detect YASS