Resampling and the Detection of LSB Matching in Colour Bitmaps

Similar documents
Improved Detection of LSB Steganography in Grayscale Images

Resampling and the Detection of LSB Matching in Colour Bitmaps

Feature Reduction and Payload Location with WAM Steganalysis

Revisiting Weighted Stego-Image Steganalysis

Locating Steganographic Payload via WS Residuals

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

Steganalysis of Overlapping Images

An Implementation of LSB Steganography Using DWT Technique

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

COLOR IMAGE STEGANANALYSIS USING CORRELATIONS BETWEEN RGB CHANNELS. 1 Nîmes University, Place Gabriel Péri, F Nîmes Cedex 1, France.

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

An Integrated Image Steganography System. with Improved Image Quality

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

PRIOR IMAGE JPEG-COMPRESSION DETECTION

Steganalysis in resized images

A New Steganographic Method for Palette-Based Images

STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

Stochastic Approach to Secret Message Length Estimation in ±k Embedding Steganography

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

Application of Histogram Examination for Image Steganography

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

Undercover Communication Using Image and Text as Disguise and. Countermeasures 1

FPGA implementation of LSB Steganography method

Sterilization of Stego-images through Histogram Normalization

A Study on Steganography to Hide Secret Message inside an Image

Steganalytic methods for the detection of histogram shifting data-hiding schemes

Steganography using LSB bit Substitution for data hiding

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION

Feature Reduction and Payload Location with WAM Steganalysis

Hiding Image in Image by Five Modulus Method for Image Steganography

Different Steganography Methods and Performance Analysis

A Reversible Data Hiding Scheme Based on Prediction Difference

A New Image Steganography Depending On Reference & LSB

RGB Intensity Based Variable-Bits Image Steganography

Information Hiding: Steganography & Steganalysis

A Secure Robust Gray Scale Image Steganography Using Image Segmentation

Investigation of Various Image Steganography Techniques in Spatial Domain

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Steganalysis by Subtractive Pixel Adjacency Matrix

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Block Wise Data Hiding with Auxilliary Matrix

A Proposed Technique For Hiding Data Into Video Files

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

A Comprehensive Review on Secure Image Steganography

Steganography is the art of secret communication.

Convolutional Neural Network-based Steganalysis on Spatial Domain

An Enhanced Least Significant Bit Steganography Technique

Analysis of Secure Text Embedding using Steganography

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme *

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

EFFECT OF SATURATED PIXELS ON SECURITY OF STEGANOGRAPHIC SCHEMES FOR DIGITAL IMAGES. Vahid Sedighi and Jessica Fridrich

LSB Encoding. Technical Paper by Mark David Gan

Detection of Steganography using Metadata in Jpeg Files

Break Our Steganographic System : The Ins and Outs of Organizing BOSS

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM

A New Steganographic Method Based on the Run Length of the Stego-Message. Eyas El-Qawasmeh and Alaa Alomari

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

Concealing Data for Secure Transmission and Storage

Steganalysis of compressed speech to detect covert voice over Internet protocol channels

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

Colored Digital Image Watermarking using the Wavelet Technique

Effective and Secure Method of Color Image Steganography

New High Capacity Secure Steganography Technique

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

A Novel Approach for Hiding Huge Data in Image

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

ELTYEB E. ABED ELGABAR

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

A Real Time Image Steganalysis by Chi-Square Test (CTSI) Method

Enhance Image using Dynamic Histogram and Data Hiding Technique

An Improvement for Hiding Data in Audio Using Echo Modulation

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

A Brief Introduction to Information Theory and Lossless Coding

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

Image Perception & 2D Images

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Simple Additive LSB Steganography in Losslessly Encoded Images

The Need for Data Compression. Data Compression (for Images) -Compressing Graphical Data. Lossy vs Lossless compression

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

An Overview of Image Steganography Techniques

Keywords Audio Steganography, Compressive Algorithms, SNR, Capacity, Robustness. (Figure 1: The Steganographic operation) [10]

Transform Domain Technique in Image Steganography for Hiding Secret Information

Image Compression Supported By Encryption Using Unitary Transform

Keywords Secret data, Host data, DWT, LSB substitution.

Digital Investigation

DESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE

Integer Wavelet Bit-Plane Complexity Segmentation Image Steganography

Guide to Computer Forensics and Investigations Third Edition. Chapter 10 Chapter 10 Recovering Graphics Files

Computer Graphics. Si Lu. Fall er_graphics.htm 10/02/2015

Meta-data based secret image sharing application for different sized biomedical

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Transcription:

Resampling and the Detection of LSB Matching in Colour Bitmaps Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory SPIE EI 05 17 January 2005

LSB Matching a.k.a. plus/minus 1 Consider cover in pseudorandom order Increment or decrement cover samples at random so that the LSBs match the hidden bit stream Differs from the standard LSB Replacement algorithm in that other bit planes may be changed. 2i-1 2i 2i+1

LSB Matching Why study a spatial-domain embedding method? Because it can be performed without steganography software

LSB Matching Why study a spatial-domain embedding method? Because it can be performed without steganography software perl -n0777 <cover-image.ppm >stego-image.ppm -e'split/(\s+)/,<stdin>,5;@z=map ord,split"",pop@_;srand key; for(0..$#z){@p[$k,$_]=($_,$p[$k=int rand$_]);} map{$z[$q=shift@p]+=($z[$q]-ord()&1)*(rand 2<=>1)} split"",unpack"b*",$_;print@_,map chr,@z;' payload

LSB Matching Why study a spatial-domain embedding method? Because it can be performed without steganography software perl -n0777 <cover-image.ppm >stego-image.ppm -e'split/(\s+)/,<stdin>,5;@z=map ord,split"",pop@_;srand key; for(0..$#z){@p[$k,$_]=($_,$p[$k=int rand$_]);} map{$z[$q=shift@p]+=($z[$q]-ord()&1)*(rand 2<=>1)} split"",unpack"b*",$_;print@_,map chr,@z;' payload impossible to prevent use of this mini-program if used carefully, probably undetectable

Harmsen s HCF COM Detector Steganalysis of Additive Noise Modelable Information Hiding [SPIE EI 03] Model steganography as additive noise and examine the effects on the image histogram.

cover image stego noise stego image + = Histogram 1 * 0.75 0.5 0.25 = 0-1 0 +1 256-pt DFT (first 128 points) HCF =

cover image stego noise stego image + = 3D Histogram * = -2-1 0 +1 +2 256 3 -pt 3D DFT (first 128 3 points) HCF = 3D HCF COM (77, 77, 77) (55, 54, 54)

HCF COM Detector Slogan Steganography reduces the COM (& longer messages reduce the COM by more than shorter messages)

cover image stego noise stego image + = 3D Histogram * = -2-1 0 +1 +2 256 3 -pt 3D DFT (first 128 3 points) HCF = 3D HCF COM (77, 77, 77) (55, 54, 54)

cover image stego noise stego image + = 3D Histogram * = unknown to detector -2-1 0 +1 +2 256 3 -pt 3D DFT (first 128 3 points) HCF = 3D HCF COM (77, 77, 77) (55, 54, 54)

Potential Problems 1. The detector cannot see the cover image the COM cannot be compared with the cover COM. 2. This detector is detecting (any type of) noise, not just steganography. 3. Methods which use only the histogram of the image are throwing away a lot of data.

Reliability observed for 10000 colour bitmaps previously subject to moderate JPEG compression. 1 0.8 100% capacity 50% capacity 20% capacity 10% capacity Probability of detection 0.6 0.4 0.2 0 0 0.2 0.4 0.6 0.8 1 Probability of false positive

Calibration

Calibration

cover image HCF COM = (77, 77, 77) HCF COM = (76, 77, 77)

cover image stego image HCF COM = (77, 77, 77) HCF COM = (55, 54, 54) HCF COM = (76, 77, 77)

cover image stego image HCF COM = (77, 77, 77) HCF COM = (55, 54, 54) HCF COM = (76, 77, 77) HCF COM = (64, 64, 64)

stego image unknown to detector HCF COM = (55, 54, 54) HCF COM = (64, 64, 64)

Improved Detector i) When a cover image is halved in size the HCF COM is largely unchanged. ii) Steganography reduces the full-size image HCF COM by more than the halfsize image. ( Downsampling tends to reduce the effect of noise ). Given a suspect image, downsample it: If the HCF COM increases, suspect steganography. (use multidimensional classifier on 3D vector: COM divided by downsampled image COM)

Improved Detector i) When a cover image is halved in size the HCF COM is largely unchanged. ii) Steganography reduces the full-size image HCF COM by more than the halfsize image. ( Downsampling tends to reduce the effect of noise ). Given a suspect image, downsample it: If the HCF COM increases, suspect steganography. (use multidimensional classifier on 3D vector: COM divided by downsampled image COM) Experimental Results Generally an improvement over the standard HCF COM detector, but occasional major failures

cover image stego image (50% embedding) HCF COM=(69, 69, 69) HCF COM=(58, 57, 57) HCF COM=(69, 69, 69) HCF COM=(54, 54, 53)

Why Did This Happen? If proportion p of the maximal message is embedded, the stego noise is 1 p 2 p 4 p 4-1 0 +1 The downsampling procedure is a b ( a + b + c + d) 4 c d

Lemma Assuming that the sums of groups of 4 original pixels are uniformly distributed mod 4, the effect on the downsampled image is to add noise with histogram 1 q 2 q 4 q 4-1 0 +1 where q < p i.e. downsampling reduces stego noise (so increases the HCF COM when steganography is present)

Lemma Assuming that the sums of groups of 4 original pixels are uniformly distributed mod 4, the effect on the downsampled image is to add noise with histogram 1 q 2 q 4 q 4-1 0 +1 where q < p i.e. downsampling reduces stego noise (so increases the HCF COM when steganography is present)

Better Calibration Don t round down. a b a + b

Better Calibration Don t round down. a b a + b In the smeared image, pixel values have twice the range, 0..511 NB: must still use only the lowest 128 frequencies in the COM calculation When an image is smeared and the HCF COM observed to increase, suspect steganography.

Further Improvements HCF COM calibrated by smearing requires a DFT on 512 3 points Don t treat RGB values as a 3D vector add up the components r+g+b. The sum has three times as much noise due to steganography. DFT on 768 points Form a 2D adjacency histogram (co-occurrence matrix) and calibrate using the smeared image DFT on 1536 2 points Faster and more reliable

Reliability observed for 10000 colour bitmaps previously subject to moderate JPEG compression. 1 0.8 30% capacity 10% capacity 5% capacity Probability of detection 0.6 0.4 0.2 0 0 0.2 0.4 0.6 0.8 1 Probability of false positive

Detectors for LSB Matching JPEG Compatability [Fridrich, SPIE ITCom 01] Close Colour Pairs [Westfeld, IHW 02] HCF COM [Harmsen, SPIE EI 03]

Detectors for LSB Matching JPEG Covers Resampled JPEG Covers Uncompressed Covers JPEG Compatability [Fridrich, SPIE ITCom 01] Close Colour Pairs [Westfeld, IHW 02] Different types of cover image can give very different results HCF COM [Harmsen, SPIE EI 03]

Detectors for LSB Matching JPEG Covers Resampled JPEG Covers Uncompressed Covers JPEG Compatability [Fridrich, SPIE ITCom 01]? Close Colour Pairs [Westfeld, IHW 02] >1% capacity HCF COM [Harmsen, SPIE EI 03] >50% capacity >50-75% capacity 100% capacity

Detectors for LSB Matching JPEG Covers Resampled JPEG Covers Uncompressed Covers JPEG Compatability [Fridrich, SPIE ITCom 01]? Close Colour Pairs [Westfeld, IHW 02] >1% capacity HCF COM [Harmsen, SPIE EI 03] >50% capacity >50-75% capacity 100% capacity Calibrated Detectors >5% capacity >5-10% capacity >50% capacity

Conclusions LSB Matching is almost as simple as LSB Replacement, but much harder to detect. Harmsen s standard HCF COM detector is usable for colour bitmaps of all types, but not very sensitive. We have suggested ways to improve the sensitivity by comparing the HCF COM of an image with that of a downsampled/smeared image. More performance is gained by totalling up the RGB components of a colour image. LSB Matching is still very difficult to detect in cover images which have never been JPEG compressed (or in grayscale images) unless the hidden payload is very large.

End adk@comlab.ox.ac.uk