Steganalysis in resized images

Similar documents
EFFECT OF SATURATED PIXELS ON SECURITY OF STEGANOGRAPHIC SCHEMES FOR DIGITAL IMAGES. Vahid Sedighi and Jessica Fridrich

Steganalysis of Overlapping Images

Break Our Steganographic System : The Ins and Outs of Organizing BOSS

COLOR IMAGE STEGANANALYSIS USING CORRELATIONS BETWEEN RGB CHANNELS. 1 Nîmes University, Place Gabriel Péri, F Nîmes Cedex 1, France.

arxiv: v2 [cs.mm] 12 Jan 2018

STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE. Tomáš Denemark, Student Member, IEEE, and Jessica Fridrich, Fellow, IEEE

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

Resampling and the Detection of LSB Matching in Colour Bitmaps

Feature Reduction and Payload Location with WAM Steganalysis

Application of Histogram Examination for Image Steganography

Convolutional Neural Network-based Steganalysis on Spatial Domain

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

Histogram Layer, Moving Convolutional Neural Networks Towards Feature-Based Steganalysis

Revisiting Weighted Stego-Image Steganalysis

arxiv: v1 [cs.mm] 16 Nov 2015

Filters. Materials from Prof. Klaus Mueller

A New Steganographic Method for Palette-Based Images

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

Camera Model Identification Framework Using An Ensemble of Demosaicing Features

Improved Detection of LSB Steganography in Grayscale Images

A Reversible Data Hiding Scheme Based on Prediction Difference

Camera identification from sensor fingerprints: why noise matters

Locating Steganographic Payload via WS Residuals

Steganalysis by Subtractive Pixel Adjacency Matrix

Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1

Natural Steganography in JPEG Compressed Images

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

General-Purpose Image Forensics Using Patch Likelihood under Image Statistical Models

Spatial Analyst is an extension in ArcGIS specially designed for working with raster data.

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Resampling and the Detection of LSB Matching in Colour Bitmaps

An Implementation of LSB Steganography Using DWT Technique

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

Microlens Image Sparse Modelling for Lossless Compression of Plenoptic Camera Sensor Images

Hiding Image in Image by Five Modulus Method for Image Steganography

Vision Review: Image Processing. Course web page:

Sterilization of Stego-images through Histogram Normalization

Last Lecture. photomatix.com

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

CSCI 1290: Comp Photo

ECE 484 Digital Image Processing Lec 09 - Image Resampling

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

Steganalytic methods for the detection of histogram shifting data-hiding schemes

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION

3D-Assisted Image Feature Synthesis for Novel Views of an Object

Image Pyramids. Sanja Fidler CSC420: Intro to Image Understanding 1 / 35

ECC419 IMAGE PROCESSING

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

Higher-Order, Adversary-Aware, Double JPEG-Detection via Selected Training on Attacked Samples

An Enhanced Least Significant Bit Steganography Technique

Announcements. Image Processing. What s an image? Images as functions. Image processing. What s a digital image?

FPGA implementation of LSB Steganography method

Source Camera Model Identification Using Features from contaminated Sensor Noise

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid

PRIOR IMAGE JPEG-COMPRESSION DETECTION

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

A Simple and Effective Image-Statistics-Based Approach to Detecting Recaptured Images from LCD Screens

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

Steganography is the art of secret communication.

Lab S-3: Beamforming with Phasors. N r k. is the time shift applied to r k

Analysis and Design of Vector Error Diffusion Systems for Image Halftoning

Image and Video Processing

Last Lecture. photomatix.com

CURRICULUM VITAE TOMÁŠ FILLER.

Antialiasing and Related Issues

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

Image Filtering. Median Filtering

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Implementation Of Steganography For Business Documents Security Using Discrete Wavelet Transform Method

CURRICULUM VITAE TOMÁŠ FILLER.

International Journal of Advance Research in Computer Science and Management Studies

Demosaicing Algorithm for Color Filter Arrays Based on SVMs

A New Image Steganography Depending On Reference & LSB

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

Problem Sheet 1 Probability, random processes, and noise

Joint Demosaicing and Super-Resolution Imaging from a Set of Unregistered Aliased Images

10. Noise modeling and digital image filtering

Image representation, sampling and quantization

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

Image features: Histograms, Aliasing, Filters, Orientation and HOG. D.A. Forsyth

An Integrated Image Steganography System. with Improved Image Quality

Image Demosaicing. Chapter Introduction. Ruiwen Zhen and Robert L. Stevenson

Steganography using LSB bit Substitution for data hiding

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Information Hiding: Steganography & Steganalysis

Image Scaling. This image is too big to fit on the screen. How can we reduce it? How to generate a halfsized

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

! Multi-Rate Filter Banks (con t) ! Data Converters. " Anti-aliasing " ADC. " Practical DAC. ! Noise Shaping

Feature Reduction and Payload Location with WAM Steganalysis

Cameras. CSE 455, Winter 2010 January 25, 2010

A Kalman-Filtering Approach to High Dynamic Range Imaging for Measurement Applications

Digital Image Processing. Digital Image Fundamentals II 12 th June, 2017

Integer Wavelet Bit-Plane Complexity Segmentation Image Steganography

An Adaptive Framework for Image and Video Sensing

Multimedia Systems Giorgio Leonardi A.A Lectures 14-16: Raster images processing and filters

Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition

Empirical Assessment of Classification Accuracy of Local SVM

Scrabble Board Automatic Detector for Third Party Applications

Transcription:

Steganalysis in resized images Jan Kodovský, Jessica Fridrich ICASSP 2013 1 / 13

Outline 1. Steganography basic concepts 2. Why we study steganalysis in resized images 3. Eye-opening experiment on BOSSbase 4. Experiments on a controlled data set 5. Theoretical analysis (new scaling law) 6. Conclusion 2 / 13

Steganography Goal: Hide message in a cover object so that its presence cannot be established cover (x) + message (m) = stego object (y) x P x, y P y, P x = P y perfect security When x are digital media, steganography is imperfect, P x P y secure payload n, n is cover size (the square root law SRL) maximize payload for a given level of statistical detectability (value of the KL divergence D KL(P x P y) > 0) steganographic security evaluated empirically for a given image source 3 / 13

Why we study resizing 1. Imagery attached to e-mails is usually resized. 2. Image-sharing portas, e.g, Flickr and Picassa, offer several resized versions of images. 3. Steganalysis and steganography is benchmarked on standard databases, which are usually resized (e.g., BOSSbase, BOWS2). 4. Resizing changes statistical properties of pixels, which has a strong effect on steganalysis SRL no longer holds. 4 / 13

Eye-opening experiment BOSSbase (10,000 images of size 512 512) Introduced in 2010 BOSS competition Standard cover source for benchmarking today Image processing pipeline Demosaicking from RAW images (7 different cameras) Converting to 8-bit grayscale Resizing to the smaller side 512 pixels convert (ImageMagick) Central-cropping to 512 512 Steganalysis of HUGO (Pevný, 2010) Detector: binary ensemble classifier (Kodovský, 2012) Feature vector: 12,753 dim. Spatial Rich Model (Fridrich, 2012) Evaluation: P E = min 1 2 (P FA + P MD ) on the testing set 5 / 13

Eye-opening experiment BOSSbase (10,000 images of size 512 512) Introduced in 2010 BOSS competition Standard 0.50 cover source for benchmarking today Image processing pipeline 0.40 Demosaicking from RAW images (7 different cameras) 0.30 Converting to 8-bit grayscale Resizing0.20 to the smaller side 512 pixels convert (ImageMagick) Testing error Central-cropping 0.10 to 512 512 Lanczos Steganalysis0of HUGO (Pevný, 2010) 0 0.1 0.2 0.3 0.4 Detector: binary ensemble Relativeclassifier payload (bpp) (Kodovský, 2012) Feature vector: 12,753 dim. Spatial Rich Model (Fridrich, 2012) Evaluation: P E = min 1 2 (P FA + P MD ) on the testing set 5 / 13

Eye-opening experiment BOSSbase (10,000 images of size 512 512) Introduced in 2010 BOSS competition Standard 0.50 cover source for benchmarking today Image processing pipeline 0.40 Demosaicking from RAW images (7 different Cubiccameras) 0.30 Converting to 8-bit grayscale Resizing0.20 to the smaller side 512 pixels convert (ImageMagick) Testing error Central-cropping 0.10 to 512 512 Box Lanczos Triangle Steganalysis0of HUGO (Pevný, 2010) 0 0.1 0.2 0.3 0.4 Detector: binary ensemble Relativeclassifier payload (bpp) (Kodovský, 2012) Feature vector: 12,753 dim. Spatial Rich Model (Fridrich, 2012) Evaluation: P E = min 1 2 (P FA + P MD ) on the testing set 5 / 13

Formalization Image registered by camera discrete sampling function X(x, y) = Q (C Θ (x, y) f (x, y)) scalar quantizer 2D scene (reality) Resized image interpolation kernel X (k) (x, y) = Q (C Θ (k)(x, y) (X ϕ)(x, y)) (X ϕ)(x, y) serves as an approximation of reality Kernel function ϕ satisfies R 2 ϕ(x, y)dxdy = 1 Θ, Θ (k)... parameters of the sampling function (rectangular grid of spatial locations) 6 / 13

Controlled testing environment Image source 1,000 images from a single camera model Canon EOS 400D (RAW images available at BOSS website) Simplification HUGO LSB Matching, fixed change rate β SRM 4D cooc. of quantized R = X K X (169), K = 0.25 0.5 0.25 0.5 0 0.5 0.25 0.5 0.25 ImageMagick s convert Matlab s imresize (different kernels) Box Triangle Cubic After resizing, images are always central-cropped to 512 512 Eliminates effects of the SRL 7 / 13

Choice of the kernel 0.5 Testing error 0.4 0.3 0.2 0.1 box kernel triangle kernel cubic kernel 0 1 1.5 2 2.5 3 3.5 Resizing factor k Resizing factor k... downsampling to 1/k of the original size Differences due to different combinations of pixels during interpolation In general, detection error grows with higher k (downsampling w/o anti-aliasing weakens pixel dependencies) The error is not necessarily monotonous in k 8 / 13

Choice of the kernel 0.5 Testing error 0.4 0.3 0.2 0.1 box kernel triangle kernel cubic kernel 0 1 1.5 2 2.5 3 3.5 Resizing factor k Two important factors influencing the performance Distance between pixels at resolution k Position of the first pixel in the resized image 8 / 13

Choice of the kernel 0.5 Testing error 0.4 0.3 0.2 0.1 box kernel triangle kernel cubic kernel Triangle kernel, k 1.1 0 1 1.5 2 2.5 3 3.5 Resizing factor k original image resized image k > 1 Original pixels contribute to two pixels of the resized image increased strength of dependencies easier steganalysis 8 / 13

Choice of the kernel 0.5 Testing error 0.4 0.3 0.2 0.1 box kernel triangle kernel cubic kernel 0 1 1.5 2 2.5 3 3.5 Resizing factor k Triangle kernel, k = 2 (downsampling by 50%) original image resized image Perfect synchronization averaging increases local correlations Position of the first pixel is important 8 / 13

Choice of the kernel 0.5 Testing error 0.4 0.3 0.2 0.1 box kernel triangle kernel cubic kernel 0 1 1.5 2 2.5 3 3.5 Resizing factor k Triangle kernel, k = 2 (downsampling by 50%) original image resized image If the pixels were aligned subsampling weaker dependencies All three kernels would become identical (zeros at integers) 8 / 13

Theoretical scaling law Question: How does secure payload scale w.r.t. resolution? Assumptions: Box kernel: nearest neighbor interpolation (subsampling) Image model: pixel rows = first-order Markov chain { ) γ } TPM A = (a ij ), a ij = 1 Z i exp ( i j τ Parameters τ and γ estimated from 500 images TPM at resolution k is A k (generalized matrix power) D KL (k; β) 1 2 nβ2 I(k), I(k) = steganographic FI rate Filler (IH, 2009) closed-form expression for I(k) for any mutually-independent embedding operation For constant statistical detectability over k: D KL (1, β) = D KL (k; α(k)β) α(k) = I(1)/I(k) 9 / 13

Scaling factor for Canon 400D 11 9 α(k) 7 5 3 1 1 1.5 2 2.5 3 Resizing factor k α(k) is the scaling factor by which we need to modify the change rate β at resolution k in order to keep the same level of statistical detectability as with change rate β at full resolution (k = 1) 10 / 13

Experimental verification of the scaling law Testing error 0.5 0.4 0.3 0.2 β 1 = 0.0216 β 1 = 0.0830 0.1 β k = β 1 β k = α(k)β 1 0 1 1.2 1.4 1.6 1.8 2 Resizing factor k P E (k) 0.5 0.4 0.3 0.2 0.1 0 0 sm β k = β 1... constant change rate β k = α(k)β 1... change rate adjusted w.r.t. derived scaling law 11 / 13

Experimental verification of the scaling law 0.5 0.4 smaller change rates P E (k) 0.3 0.2 β k = β 1 0.1 k = 1.50 k = 1.25 β k = α(k)β 1 0 0 0.1 0.2 0.3 0.4 0.5 6 1.8 2 or k P E (1) x-axis: P E (1) for full-resolution images, change rate β (k = 1) y-axis: P E (k) for resized images, change rate α(k)β 12 / 13

Summary and future effort Resized images are ubiquitous (also used for benchmarking stego) Resizing changes statistical properties of pixels Resizing factor, interpolation kernel, and other parameters have a profound effect on detectability of embedding changes Derived secure payload scaling under resizing for nearest neighbor interpolation Markov chain model of pixel rows Mutually-independent embedding operation Experimentally verified to hold for resizing factor (1 k 1.7) Journal version (under review) Extended experimental section & more camera models Effects of anti-aliasing and grid-alignment on security 13 / 13