Feature Reduction and Payload Location with WAM Steganalysis

Similar documents
Revisiting Weighted Stego-Image Steganalysis

Steganalysis of Overlapping Images

Feature Reduction and Payload Location with WAM Steganalysis

Resampling and the Detection of LSB Matching in Colour Bitmaps

Locating Steganographic Payload via WS Residuals

Improved Detection of LSB Steganography in Grayscale Images

An Implementation of LSB Steganography Using DWT Technique

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

Steganalysis in resized images

arxiv: v2 [cs.mm] 12 Jan 2018

Steganalysis by Subtractive Pixel Adjacency Matrix

COLOR IMAGE STEGANANALYSIS USING CORRELATIONS BETWEEN RGB CHANNELS. 1 Nîmes University, Place Gabriel Péri, F Nîmes Cedex 1, France.

Stochastic Approach to Secret Message Length Estimation in ±k Embedding Steganography

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Application of Histogram Examination for Image Steganography

A Reversible Data Hiding Scheme Based on Prediction Difference

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

arxiv: v1 [cs.mm] 16 Nov 2015

EFFECT OF SATURATED PIXELS ON SECURITY OF STEGANOGRAPHIC SCHEMES FOR DIGITAL IMAGES. Vahid Sedighi and Jessica Fridrich

Background Pixel Classification for Motion Detection in Video Image Sequences

Resampling and the Detection of LSB Matching in Colour Bitmaps

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

FACE RECOGNITION USING NEURAL NETWORKS

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

An Enhanced Least Significant Bit Steganography Technique

Convolutional Neural Network-based Steganalysis on Spatial Domain

PRIOR IMAGE JPEG-COMPRESSION DETECTION

REVERSIBLE data hiding, or lossless data hiding, hides

A New Image Steganography Depending On Reference & LSB

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Compendium of Reversible Data Hiding

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

Colour image watermarking in real life

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

Constructing local discriminative features for signal classification

A Study on Steganography to Hide Secret Message inside an Image

Hybrid SOFM-MLP Neural Network for Steganalysis to Detect Stego-Contents in Corporate s

Camera identification from sensor fingerprints: why noise matters

Automated hand recognition as a human-computer interface

Available online at ScienceDirect. Procedia Computer Science 79 (2016 )

Color Transformations

STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE. Tomáš Denemark, Student Member, IEEE, and Jessica Fridrich, Fellow, IEEE

Laser Printer Source Forensics for Arbitrary Chinese Characters

Building a dataset for image steganography

A Simple and Effective Image-Statistics-Based Approach to Detecting Recaptured Images from LCD Screens

Steganography is the art of secret communication.

Investigation of Various Image Steganography Techniques in Spatial Domain

STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION

An Integrated Image Steganography System. with Improved Image Quality

Histogram Layer, Moving Convolutional Neural Networks Towards Feature-Based Steganalysis

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

Image Compression Supported By Encryption Using Unitary Transform

Integer Wavelet Bit-Plane Complexity Segmentation Image Steganography

INDIAN VEHICLE LICENSE PLATE EXTRACTION AND SEGMENTATION

A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance

MLP for Adaptive Postprocessing Block-Coded Images

New Lossless Image Compression Technique using Adaptive Block Size

Image Forgery Detection Using Svm Classifier

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION

Steganography using Concept of Skin Tone Detection

Subjective evaluation of image color damage based on JPEG compression

Improvement of Satellite Images Resolution Based On DT-CWT

CoE4TN4 Image Processing. Chapter 3: Intensity Transformation and Spatial Filtering

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

Keywords Secret data, Host data, DWT, LSB substitution.

Camera Model Identification Framework Using An Ensemble of Demosaicing Features

Multimedia Forensics

An Improvement for Hiding Data in Audio Using Echo Modulation

Keywords: BPS, HOLs, MSE.

Information Forensics: An Overview of the First Decade

A Proposed Technique For Hiding Data Into Video Files

SIGNAL PROCESSING OF POWER QUALITY DISTURBANCES

Determining the stego algorithm for JPEG images

Transform Domain Technique in Image Steganography for Hiding Secret Information

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM

Digital Image Processing

Detection of Stego Images by principle of Suspicion Value for Distributing Stego Algorithms

Source Camera Identification Forensics Based on Wavelet Features

Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Image Compression

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

A Modified Image Coder using HVS Characteristics

DESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

Undercover Communication Using Image and Text as Disguise and. Countermeasures 1

Steganalytic methods for the detection of histogram shifting data-hiding schemes

Secret Communication on Facebook Using Image Steganography: Experimental Study

Dual Transform Color Image Steganography Method

Wavelets Transform Based Data Hiding Technique for Stegnography

Digital Image Processing 3/e

Efficient Target Detection from Hyperspectral Images Based On Removal of Signal Independent and Signal Dependent Noise

CROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS. Kuan-Chuan Peng and Tsuhan Chen

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Dynamic Collage Steganography on Images

Fragile Sensor Fingerprint Camera Identification

Transcription:

Feature Reduction and Payload Location with WAM Steganalysis Andrew Ker & Ivans Lubenko Oxford University Computing Laboratory contact: adk @ comlab.ox.ac.uk SPIE/IS&T Electronic Imaging, San Jose, CA 19 January 2009

LSB matching (±1 embedding) Host LSBs carry payload, but other bits are also affected. Easy to implement, high capacity, visually imperceptible. Detectors performance is poor and variable: Histogram Characteristic Function (HCF) Harmsen & Pearlman, 2003, 2004 Ker, 2005 Li et al., 2008 Analysis of Local Extrema (ALE) Cancelli et al., 2007, 2008 Wavelet Higher Order Statistics Holotyak et al., 2005 Wavelet Absolute Moments (WAM) Goljan et al., 2006 We contribute three things to the development of WAM: Separate benchmarks for different cover sources Feature reduction Payload location

WAM features The WAM features measure the predictability of noise residuals, in the wavelet domain. 1. From input X, compute 1-level wavelet decomposition: 2. The WAM filter gives quasi-wiener residuals: (where v is a MAP estimate of local variance based on 4 windows, and is the noise variance, here 0.5) 3. The 27 WAM features are the absolute central moments of the highfrequency subband residuals:

Effect of cover source We benchmarked the accuracy of WAM steganalysis using three classification engines: The original Fisher Linear Discriminator (FLD), Multilayer Perceptron, a.k.a. Neural Network (NN), Support Vector Machine (SVM), in nine different sets of images. 2000 grayscale cover images per set, all images cropped to 400 300, payload 0.5bpp (50% max), benchmarked by minimum of FP+FN, ten-fold cross validation.

Set Source in spatial domain Image noise levels in wavelet domain Classification accuracy (%) FLD NN SVM A Digital camera never-compressed, pre-processed as grayscale B Digital camera never-compressed, pre-processed as colour 69.7 73.4 75.8 C Various digital cameras never-compressed, unknown pre-processing 80.6 89.2 90.4 D Photo library CD decompressed JPEGs, quality factor 50 95.5 97.7 97.5 E Scanned photos downsampled, never-compressed 60.9 64.3 64.7 H Internet photo sites mixed JPEGs 97.3 98.0 98.1

Set Source in spatial domain Image noise levels in wavelet domain Classification accuracy (%) FLD NN SVM A Digital camera never-compressed, pre-processed as grayscale B Digital camera never-compressed, pre-processed as colour significant < significant < 69.7 73.4 75.8 (p <0.01) (p <0.01) C Various digital cameras never-compressed, unknown pre-processing significant < 80.6 89.2 (p <0.001) 90.4 D Photo library CD decompressed JPEGs, quality factor 50 significant < 95.5 97.7 (p <0.001) 97.5 E Scanned photos downsampled, never-compressed significant < 60.9 64.3 (p <0.01) 64.7 H Internet photo sites mixed JPEGs significant < 97.3 98.0 (p <0.01) 98.1

Feature reduction The WAM features cannot be independent: etc. PCA suggests the set of 27 features has only 3-5 independent dimensions. Tried to reduce the feature set using various methods, mainly forward selection, backward selection, for each cover set separately. different features for each set of covers!

Feature reduction set A set B set C set D

Feature reduction The WAM features cannot be independent: etc. PCA suggests the set of 27 features has only 3-5 independent dimensions. Tried to reduce the feature set using various methods, mainly forward selection, backward selection, for each cover set separately. different features for each set of covers! Using FLD, tested all combinations of four features, ranked by aggregate score over all cover sets. best selection was

Set Source in spatial domain Image noise levels in wavelet domain 27 features 4 features FLD NN SVM A Digital camera never-compressed, pre-processed as grayscale B Digital camera never-compressed, pre-processed as colour 69.7 62.7 73.4 75.8 67.6 C Various digital cameras never-compressed, unknown pre-processing 80.6 76.2 89.2 90.4 83.2 D Photo library CD decompressed JPEGs, quality factor 50 95.5 92.1 97.7 97.5 94.3 E Scanned photos downsampled, never-compressed 60.9 55.5 64.3 64.7 57.1 H Internet photo sites mixed JPEGs 97.3 91.0 98.0 98.1 93.5

Pooled steganalysis Suppose the steganalyst has N stego objects which contain different payloads placed in the same locations in different covers. There are plausible scenarios in which this could happen. Can we find the payload locations, which should be more noisy than the others? WAM residuals live in a transform domain: we need to take them back to the spatial domain.

WAM residuals 1. From input X, compute 1-level wavelet decomposition: 2. The WAM filter gives quasi-wiener residuals: (where v is a MAP estimate of local variance based on 4 windows, and is the noise variance, here 0.5) 3. Transform filtered residuals back to spatial domain: We expect higher absolute residuals in locations containing payload.

Experimental results low high 25x25 region, absolute residuals at each pixel, 1 stego image with 10% payload

Experimental results low high 25x25 region, average absolute residuals at each pixel, 10 stego images with 10% payload

Experimental results low high 25x25 region, average absolute residuals at each pixel, 20 stego images with 10% payload

Experimental results low high 25x25 region, average absolute residuals at each pixel, 50 stego images with 10% payload

Experimental results low high 25x25 region, average absolute residuals at each pixel, stego images with 10% payload

Experimental results low high 25x25 region, average absolute residuals at each pixel, stego images with 10% payload = payload locations

Experimental results Payload can be located accurately with enough images: # stego images Set A Payload location accuracy (%) Set B Set C Set D 10 84.3 53.6 74.7 64.8 99.8 64.8 97.6 93.4 0 82.5

Conclusions Tested WAM features with a three classification engines in nine cover sets. Moreover, we can measure the statistical significance of differences. everyone should do this! Just like other LSB matching detectors, WAM works very well sometimes, and its feature set can be reduced with little loss in power. But we cannot predict when it will work and when it will not, and the reduced feature set depends on unknown cover properties. an avenue for further research. Converting WAM residuals to spatial domain, and averaging, allows us to estimate payload location, given enough stego images with payload in the same locations. This demonstrates why steganographic embedding keys must not be reused.