Perfect vs. Imperfect Steganography Stegosystems can be divided into - - PowerPoint PPT Presentation

perfect vs imperfect steganography
SMART_READER_LITE
LIVE PREVIEW

Perfect vs. Imperfect Steganography Stegosystems can be divided into - - PowerPoint PPT Presentation

Fisher Information Determines Capacity of -secure Steganography Tom Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York 11th Information Hiding, Darmstadt, Germany, 2009 Perfect vs.


slide-1
SLIDE 1

Fisher Information Determines Capacity

  • f ε-secure Steganography

Tomáš Filler and Jessica Fridrich

  • Dept. of Electrical and Computer Engineering

SUNY Binghamton, New York

11th Information Hiding, Darmstadt, Germany, 2009

slide-2
SLIDE 2

Perfect vs. Imperfect Steganography

Stegosystems can be divided into two classes: Perfectly secure stegosyst. KL diverg. cover & stego DKL(P||Q) = 0 Detector does NOT exist. Secure capacity is linear. Communication rate is POSITIVE. Imperfect stegosyst. DKL(P||Q) = ε Detector DOES exist.

  • Sec. capacity is SUBlinear.

Communication rate is ZERO. perfectly secure stegosystems exist for artificial cover sources all known stegosystems for digital media are imperfect

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 2 of 18

slide-3
SLIDE 3

Secure Capacity of ε-secure Stegosystems

From Taylor expansion ... (nβ = # of changes) DKL

  • P(n)||Q(n)

β

  • = 1

2nβ 2I+O(β 3) = ε 1 2nβ 2I ≈ ε ⇒ nβ ≈

  • 1

I √ 2εn I ... Fisher information (rate) at β = 0. Capacity of ε-secure stegosystems scales as r√n. Root rate: (more refined measure of capacity) r ≈ 1 √ I

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 3 of 18

slide-4
SLIDE 4

Is Root Rate Useful?

Root rate: (more refined measure of capacity) r ≈ 1 √ I Fisher information rate can be expressed in a closed-form. Applications: BENCHMARKING - compare stegosystems by their root rates. STEGANOGRAPHY DESIGN - maximize root rate w.r.t. embedding operation for fixed cover source.

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 4 of 18

slide-5
SLIDE 5

Presentation Outline

1 ASSUMPTIONS

model of cover objects, model of embedding impact

2 STEGANOGRAPHIC CAPACITY & ROOT RATE

formal connection between detectability and root rate

3 APPLICATION

comparison of LSB and ±1 embedding in spatial domain

4 CONCLUSION

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 5 of 18

slide-6
SLIDE 6

(1)

ASSUMPTIONS

slide-7
SLIDE 7

Assumptions Summary

1 COVER SOURCE - Markov Chain

first order Markov Chain with tran. prob. mat. A = (aij)

2 EMBEDDING ALGORITHM - MI embedding

independent substitution of states (next slide)

3 STEGOSYSTEM - ε-secure (imperfect)

stegosystem is ε-SECURE MC HMC i i′ j j′ k k′ l l′ aij ajk akl ... cover stego embedding

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 7 of 18

slide-8
SLIDE 8

Mutually Independent Embedding Operation

Impact of embedding is modeled as probabilistic mapping acting on each cover element independently - MI embedding. Pr(Yl = j|Xl = i) = bij(β)

Xl ... l-th cover element Yl ... l-th stego element β ... change rate (rel. payload)

Matrix B = (bij) is “transition probability matrix” for β ≥ 0. LSB embedding:

= 1 −β = β

B =

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 8 of 18

slide-9
SLIDE 9

Mutually Independent Embedding Operation

Impact of embedding is modeled as probabilistic mapping acting on each cover element independently - MI embedding. Pr(Yl = j|Xl = i) = bij(β)

Xl ... l-th cover element Yl ... l-th stego element β ... change rate (rel. payload)

Matrix B = (bij) is “transition probability matrix” for β ≥ 0. LSB embedding:

= 1 −β = β

B = = I+βC = + β ·

= 1 = −1

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 8 of 18

slide-10
SLIDE 10

Mutually Independent Embedding Operation

Impact of embedding is modeled as probabilistic mapping acting on each cover element independently - MI embedding. Pr(Yl = j|Xl = i) = bij(β)

Xl ... l-th cover element Yl ... l-th stego element β ... change rate (rel. payload)

Matrix B = (bij) is “transition probability matrix” for β ≥ 0. ±1 embedding:

= 1 −β = β

2

= β

B = = I+βC = + β ·

= 1 = 0.5 = −1

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 8 of 18

slide-11
SLIDE 11

Mutually Independent Embedding Operation

Impact of embedding is modeled as probabilistic mapping acting on each cover element independently - MI embedding. Pr(Yl = j|Xl = i) = bij(β)

Xl ... l-th cover element Yl ... l-th stego element β ... change rate (rel. payload)

Matrix B = (bij) is “transition probability matrix” for β ≥ 0. F5 embedding:

= 1 −β = β = 1

B = = I+βC = + β ·

= −1

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 8 of 18

slide-12
SLIDE 12

Mutually Independent Embedding Operation

Impact of embedding is modeled as probabilistic mapping acting on each cover element independently - MI embedding. Pr(Yl = j|Xl = i) = bij(β)

Xl ... l-th cover element Yl ... l-th stego element β ... change rate (rel. payload)

Matrix B = (bij) is “transition probability matrix” for β ≥ 0. Assumption:

B(β) = I+βC

C describes the inner workings of the embedding algorithm.

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 8 of 18

slide-13
SLIDE 13

(2)

STEGANOGRAPHIC CAPACITY & √ RATE

slide-14
SLIDE 14

Square Root Law

1 If nβn

√n → 0 then the stegosyst. are asymptotically secure.

2 If nβn

√n → +∞ then arbitrarily accurate stego detectors

exist. For fixed level of security, nβn √n < C ⇒ βn → 0 as n → ∞.

[Filler, Ker, Fridrich, “The Square Root Law of Steganographic Capacity for Markov Covers”, Proc. SPIE, 2009]

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 10 of 18

slide-15
SLIDE 15

The Best Possible Steganalyzer

Hypothesis test: H0 : β = 0 decide cover H1 : β > 0 (known) decide stego. Detection statistics (log-likelihood ratio): L(n)

β (X) = 1

√n ln Q(n)

β (X)

P(n)(X) stego distribution with n elements cover distribution with n elements change rate

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 11 of 18

slide-16
SLIDE 16

The Root Rate

For small β, L(n)

β (X) is Gaussian (Local Asymptotic Normality).

−µ µ

σ2 σ2

cover stego µ = √nβ 2I/2 σ 2 = β 2I Fisher information rate I = limn→∞ 1

n d2 dβ 2 DKL

  • P(n)||Q(n)

β

  • β=0

Deflection coefficient: d2 = (−µ − µ)2/σ 2 = nβ 2I < ε nβ < r√εn r =

  • 1

I ROOT RATE

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 12 of 18

slide-17
SLIDE 17

Closed Form for Fisher Information Rate

Theorem (Fisher Information Rate)

Let A = (aij) define the MC cover model and B = I+βC represent MI embedding. Then, the Fisher information rate I exists and can be written as

I = cTFc.

c = (c11,...,cNN)T is column vector obtained directly from C. Matrix F ∈ RN2×N2, F = f (A) and does not depend on B. Maximizing root rate ⇒ minimizing I w.r.t. C. Closed form for I enables us to compare stegosystems maximize capacity w.r.t. embedding operation C.

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 13 of 18

slide-18
SLIDE 18

(3)

APPLICATIONS

slide-19
SLIDE 19

Markov Model of Spatial Domain Images

Image databases: CAMRAW, NRCS, NRCS-JPEG70. Spatial domain 8-bit grayscale images: A = (aij) ∈ R256×256 aij = 1 Zi e−(|i−j|/τ)γ

255 255 −5 −10 −15

CAMRAW - log aij

−10 −5 127 255 j

log a127,j

data model

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 15 of 18

slide-20
SLIDE 20

Convex Combination of LSB and ±1 Embedding

Use ±1 embedding in first λn pixels and LSB embedding in the rest.

1 2 0 - LSB 1 - ±1 NRCS NRCS-JPEG CAMRAW

λ r(λ)

Root rate r(λ): cλ = λc±1 +(1−λ)cLSB r(λ) =

  • 1

cT

λ Fcλ

Higher root rate = better method.

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 16 of 18

slide-21
SLIDE 21

Convex Combination of LSB and ±1 Embedding

Use ±1 embedding in first λn pixels and LSB embedding in the rest.

1 2 0 - LSB 1 - ±1 NRCS NRCS-JPEG CAMRAW

λ r(λ)

Pevný, Bass, Fridrich: Steganalysis by Subtractive Pixel Adjacency Matrix, submitted to ACM MM&SEC 2009, Princeton, NJ Higher root rate = better method.

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 16 of 18

slide-22
SLIDE 22

±1 is Asymptotically Optimal

What embedding method minimizes Fisher information rate and modifies cover by at most 1?

0.2 0.4 0.6 0.8 1 254 ±1 emb. NRCS

i vi

Class of embedding

  • perations:

1−v1 v1 1−v4 v4 ±1 embedding is asymptotically optimal as number of grayscales N → ∞.

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 17 of 18

slide-23
SLIDE 23

Conclusion and Future Directions

Steganographic capacity of ε-SECURE stegosystems ≈ r√n.

We coin a new term for constant r - the Root Rate. Root rate is determined by Fisher information rate. can be expressed in a closed-form amenable to

  • ptimization (under mentioned assumptions).

was used to compare spatial domain stegosystems. Future work: use this framework for JPEG images.

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 18 of 18

slide-24
SLIDE 24

Conclusion and Future Directions

Steganographic capacity of ε-SECURE stegosystems ≈ r√n.

We coin a new term for constant r - the Root Rate. Root rate is determined by Fisher information rate. can be expressed in a closed-form amenable to

  • ptimization (under mentioned assumptions).

was used to compare spatial domain stegosystems. Future work: use this framework for JPEG images.

Thank you!

tomas.filler@binghamton.edu

Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 18 of 18