Steganalysis of Overlapping Images

Similar documents
Feature Reduction and Payload Location with WAM Steganalysis

Revisiting Weighted Stego-Image Steganalysis

Resampling and the Detection of LSB Matching in Colour Bitmaps

Steganalysis in resized images

Improved Detection of LSB Steganography in Grayscale Images

Histogram Layer, Moving Convolutional Neural Networks Towards Feature-Based Steganalysis

arxiv: v2 [cs.mm] 12 Jan 2018

STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE. Tomáš Denemark, Student Member, IEEE, and Jessica Fridrich, Fellow, IEEE

COLOR IMAGE STEGANANALYSIS USING CORRELATIONS BETWEEN RGB CHANNELS. 1 Nîmes University, Place Gabriel Péri, F Nîmes Cedex 1, France.

Locating Steganographic Payload via WS Residuals

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

EFFECT OF SATURATED PIXELS ON SECURITY OF STEGANOGRAPHIC SCHEMES FOR DIGITAL IMAGES. Vahid Sedighi and Jessica Fridrich

arxiv: v1 [cs.mm] 16 Nov 2015

Steganalysis by Subtractive Pixel Adjacency Matrix

Break Our Steganographic System : The Ins and Outs of Organizing BOSS

Feature Reduction and Payload Location with WAM Steganalysis

Camera Model Identification Framework Using An Ensemble of Demosaicing Features

Application of Histogram Examination for Image Steganography

Detection of Adaptive Histogram Equalization Robust Against JPEG Compression

Higher-Order, Adversary-Aware, Double JPEG-Detection via Selected Training on Attacked Samples

Natural Steganography in JPEG Compressed Images

General-Purpose Image Forensics Using Patch Likelihood under Image Statistical Models

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

THE popularization of imaging components equipped in

INFORMATION about image authenticity can be used in

AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION

Convolutional Neural Network-based Steganalysis on Spatial Domain

An Implementation of LSB Steganography Using DWT Technique

According to the proposed AWB methods as described in Chapter 3, the following

Multimedia Forensics

PRIOR IMAGE JPEG-COMPRESSION DETECTION

Image Classification (Decision Rules and Classification)

PROFESSIONAL RESEARCH EXPERIENCE

Resampling and the Detection of LSB Matching in Colour Bitmaps

Introduction to Video Forgery Detection: Part I

Subjective evaluation of image color damage based on JPEG compression

Image Forgery Identification Using JPEG Intrinsic Fingerprints

TECHNICAL DOCUMENTATION

Learning to Predict Indoor Illumination from a Single Image. Chih-Hui Ho

An Enhanced Least Significant Bit Steganography Technique

CNN-BASED DETECTION OF GENERIC CONTRAST ADJUSTMENT WITH JPEG POST-PROCESSING

Global Contrast Enhancement Detection via Deep Multi-Path Network

Qäf) Newnes f-s^j^s. Digital Signal Processing. A Practical Guide for Engineers and Scientists. by Steven W. Smith

Exposing Image Forgery with Blind Noise Estimation

WITH the rapid development of image processing technology,

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery

Image Compression Supported By Encryption Using Unitary Transform

Vehicle Detection using Images from Traffic Security Camera

Building a dataset for image steganography

SECTION I - CHAPTER 2 DIGITAL IMAGING PROCESSING CONCEPTS

AUGMENTED CONVOLUTIONAL FEATURE MAPS FOR ROBUST CNN-BASED CAMERA MODEL IDENTIFICATION. Belhassen Bayar and Matthew C. Stamm

Information Forensics: An Overview of the First Decade

DYNAMIC CONVOLUTIONAL NEURAL NETWORK FOR IMAGE SUPER- RESOLUTION

HDR images acquisition

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge

Deep Learning for Detecting Processing History of Images

Thesis: Bio-Inspired Vision Model Implementation In Compressed Surveillance Videos by. Saman Poursoltan. Thesis submitted for the degree of

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online):

Digital Image Processing

USER GUIDE. NEED HELP? Call us on +44 (0)

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM

Summary of robot visual servo system

An Integrated Image Steganography System. with Improved Image Quality

HIMAWARI-8 COHERENT NOISE REDUCTION

>--- UnSorted Tag Reference [ExifTool -a -m -u -G -sort ] ExifTool Ver: 10.07

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

Color Transformations

The next table shows the suitability of each format to particular applications.

Convolutional neural networks

Determining the stego algorithm for JPEG images

Fragile Sensor Fingerprint Camera Identification

IMAGE PROCESSING PAPER PRESENTATION ON IMAGE PROCESSING

REVERSIBLE data hiding, or lossless data hiding, hides

Analysis of adversarial attacks against CNN-based image forgery detectors

CROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS. Kuan-Chuan Peng and Tsuhan Chen

Source Camera Model Identification Using Features from contaminated Sensor Noise

UltraCam Eagle Prime Aerial Sensor Calibration and Validation

Reversible Data Hiding in JPEG Images Based on Adjustable Padding

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

Photo Editing Workflow

A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches

A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION. Scott Deeann Chen and Pierre Moulin

Stochastic Approach to Secret Message Length Estimation in ±k Embedding Steganography

Forgery Detection using Noise Inconsistency: A Review

Sterilization of Stego-images through Histogram Normalization

CS 7643: Deep Learning

An Un-awarely Collected Real World Face Database: The ISL-Door Face Database

A Reversible Data Hiding Scheme Based on Prediction Difference

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³

PHOTOSHOP: 3.3 CAMERA RAW

PRACTICAL IMAGE AND VIDEO PROCESSING USING MATLAB

Source Camera Identification Forensics Based on Wavelet Features

A Simple and Effective Image-Statistics-Based Approach to Detecting Recaptured Images from LCD Screens

Lecture 23 Deep Learning: Segmentation

A New Steganographic Method for Palette-Based Images

Transcription:

Steganalysis of Overlapping Images Jimmy Whitaker JimmyMWhitaker @ gmail.com Andrew Ker adk@ cs.ox.ac.uk SPIE/IS&T Electronic Imaging, San Francisco, 11 February 2015

Real-world images

Real-world images

Real-world images

Real-world images Are very likely to include a cat. Probably contain multiple captures of similar scenes: overlapping images.

Steganalysis Fundamental difficulty: stego noise is an extremely small signal. Filtering Apply noise reduction filters, keeping only the residual noise. Use many diverse filters. Calibration Process a stego image to learn about the cover. - JPEG decompress-crop-recompress [Fridrich et al., 2002] - Spatial-domain calibration (unsuccessful) [Ker, 2005] - Contrast parts of an image likely to contain payload with other parts. [Denemark et al., 2014; Carnein et al., 2014]

Steganalysis process Fundamental difficulty: stego noise is an extremely small signal. Filtering Apply noise reduction filters, keeping only the residual noise. cover/stego image Use many diverse filters. features classifier features reference image Calibration Process a stego image to learn about the cover. - JPEG decompress-crop-recompress [Fridrich et al., 2002]

Steganalysis Fundamental difficulty: stego noise is an extremely small signal. Filtering Apply noise reduction filters, keeping only the residual noise. cover/stego image Use many diverse filters. features classifier features reference image Calibration Process a stego image to learn about the cover. - JPEG decompress-crop-recompress [Fridrich et al., 2002]

Investigation In laboratory conditions, given two images with overlapping content, - analyst has access to the cover source - stego method & payload size known - identical camera settings - one is known to be cover can one be used to calibrate the other? Study limited to uncompressed images.

Overlapping image dataset All taken with Canon G16.

Overlapping image dataset A All camera settings fixed for each scene.

Overlapping image dataset AB 100% overlap

Overlapping image dataset A C 75% overlap

Overlapping image dataset A 50% overlap D

Overlapping image dataset A E 25%

Overlapping image dataset A F

Overlapping image dataset A/B C D E F 5 500 images @ 3000 800 (2.4Mpix) in each set. Captured RAW, converted to grayscale using camera software.

Experiments Embedding HUGO @ 0.05/0.1 bpp LSBM @ 0.01/0.02 bpp Features SPAM Laplacian filter, residual co-occurrences [2009] SRM Diverse filters, residual co-occurrences [2012] PSRM Diverse filters, random convolutions, histograms [2013]

Experiments Embedding HUGO @ 0.05/0.1 bpp LSBM @ 0.01/0.02 bpp Features SPAM Laplacian filter, residual co-occurrences 686-dim SRM Diverse filters, residual co-occurrences 12753-dim PSRM Diverse filters, random convolutions, histograms 8070-dim

Experiments Calibration - no calibration (baseline) - classical calibration - cartesian calibration some based on normalized difference are in the paper or Jimmy s dissertation.

Experiments Calibration Classifier Kodovský s ensemble of FLDs. Chose best base learner subdimension 5-fold cross-validation optimizing OOB error, measuring mean testing error.

Cropping A C 75% overlap

Cropping A C 100% overlap

Results

Results

Results

Results

Robustness Mismatched payload Seems quite robust. Mismatched reference Robust if we use and a double-sided classifier. Mismatched amount of overlap Not very robust: scope for further work.

Distance A/B C D E F How far apart are these images, and how far is a stego object?

Distance Whitened (Mahalanobis-like) distance Apply PCA to pooled cover & stego features. Keep all numerically-significant components. Normalize each dimension, measure Euclidean distance. HUGO 0.05 bpp SRM features mean distance to stego image mean distance to cover, with overlap 100% 75% 50% 25% none Whitened distance: 0.034 0.063 0.281 0.445 0.564 0.650 Scaled so that mean distance between different covers is 1.

Distance Projected distance Train numerically-stabilized FLD on all cover & stego features. Project features onto separating vector. HUGO 0.05 bpp SRM features mean distance to stego image mean distance to cover, with overlap 100% 75% 50% 25% none Whitened distance: 0.034 0.063 0.281 0.445 0.564 0.650 Projected distance: 4.076 1.507 1.594 1.682 1.705 1.694 Scaled so that mean distance between different covers is 1.

Illustration covers

Illustration different captures of identical scene

Illustration stego images

Conclusions Images overlapping by 75% or more make classification better. Seems good detectors benefit more than bad ones. Should be a regressor for difference in payload? Turning it into a forensic tool: Automatically identifying overlap Checking camera settings Developing training data? Limitations: Controlled conditions. Stable camera. Only considered uncompressed images.

Conclusions Images overlapping by 75% or more make classification better. Seems good detectors benefit more than bad ones. Should be a regressor for difference in payload? Turning it into a forensic tool: Automatically identifying overlap Checking camera settings Developing training data? Pilot study on JPEG images (q.f. 80, nsf5 @ 0.02 bpnc, JRM features) Uncalibrated error 5.6% Calibrated by decompress-crop-recompress 4.9% Calibrated by 100% overlapping image 4.7%