ABSTRACT
This short paper investigates the influence of the image processing pipeline (IPP) on the cover-source mismatch (CSM) for the popular JPHide steganographic scheme. We propose to deal with CSM by combining a forensics and a steganalysis approach. A multi-classifier is first trained to identify the IPP, and secondly a specific training set is designed to train a targeted classifier for steganalysis purposes. We show that the forensic step is immune to the steganographic embedding. The proposed IPP-informed steganalysis outperforms classical strategies based on training on a mixture of sources and we show that it can provide results close to a detector specifically trained on the appropriate source.
- M. Barni, G. Cancelli, and A. Esposito. 2010. Forensics aided steganalysis of heterogeneous images. In Int. Conf. on Acoustics Speech and Signal Processing (ICASSP). IEEE, 1690--1693.Google Scholar
- P. Bas, T. Filler, and T. Pevny. 2011. Break our Steganographic System - the ins and outs of organizing BOSS. In 13th workshop on Information Hiding. Springer, Prague, Czech Republic, 59--70. Google ScholarDigital Library
- M. Boroumand and J. Fridrich. 2017. Scalable Processing History Detector for JPEG Images. In Media Watermarking, Security, and Forensics. IS&T.Google Scholar
- Cambridge in Colours 2017. Photography tutorials: White balance. (2017). Retrieved Jan 24, 2018 from http://www.cambridgeincolour.com/tutorials/ white-balance.htmGoogle Scholar
- G. Cancelli, G. Doerr, M. Barni, and I. J. Cox. 2008. A comparative study of ±1 steganalyzers. In IEEE 10th Workshop on Multimedia Signal Processing. 791--796.Google Scholar
- J. Fridrich, J. Kodovský, V. Holub, and M. Goljan. 2011. Breaking HUGO - The Process Discovery. In 13th Int. Conf. on Information Hiding. 85--101. Google ScholarDigital Library
- Q. Giboulot, R. Cogranne, and P. Bas. 2018. Steganalysis into the Wild: How to Define a Source?. In Media Watermarking, Security, and Forensics. IST.Google Scholar
- A.D. Ker, P. Bas, R. Böhme, R. Cogranne, S. Craver, T. Filler, J. Fridrich, and T. Pevny. 2013. Moving steganography and steganalysis from the laboratory intoGoogle Scholar
- the real world. In Workshop on Information Hiding and Multi-media Security (IH&MMSEC). ACM, 45--58.Google Scholar
- A. Ker and T. Pevny. 2014. A Mishmash of Methods for Mitigating the Model Mismatch Mess. In Electronic Imaging, Media Watermarking, Security and Forensics, Vol. SPIE Vol. 9028. SPIE, San Francisco, 90280I.Google Scholar
- J. Kodovsky and J. Fridrich. 2012. Steganalysis of JPEG Images Using Rich Models. In Electronic Imaging, Media Watermarking, Security and Forensics. SPIE, San Francisco.Google Scholar
- J. Kodovsky and J. Fridrich. 2013. Steganalysis in Resized Images. In Proc. ICASSP.Google Scholar
- J. Kodovsky, J. Fridrich, and V. Holub. 2012. Ensemble classifiers for steganalysis of digital media. IEEE TIFS 7, 2 (2012), 432 -- 444. Google ScholarDigital Library
- J. Kodovsky, V. Sedighi, and J. Fridrich. 2014. Study of Cover Source Mismatch in Steganalysis and Ways to Mitigate its Impact. In Electronic Imaging, Media Watermarking, Security and Forensics. SPIE, SPIE, San Francisco, California, 90280J.Google Scholar
- I. Lubenko and A. Ker. 2012. Going from small to large data in steganalysis. In Media Watermarking, Security, and Forensics, Vol. 8303. SPIE, 83030M--83030M--10.Google Scholar
- F. Comby M. Yedroudj, M. Chaumont. 2018. How to augment a small learning set for improving the performances of a CNN-based steganalyzer?. In Media Watermarking, Security, and Forensics. IS&T.Google Scholar
- J. Pasquet, S. Bringay, and M. Chaumont. 2014. Steganalysis with Cover-Source Mismatch and a small learning database. In Proc. EUSPICO.Google Scholar
- X. Qiu, H. Li, W. Luo, and J. Huang. 2014. A universal Image Forensic Strategy based on Steganalytic Model. In Workshop on Information Hiding and Multi-media Security (IH&MMSEC). Salzburg. Google ScholarDigital Library
- Rawpedia 2015. Gamma differential. (2015). Retrieved Jan 29, 2018 from https: //rawpedia.rawtherapee.com/Gamma_-_DifferentialGoogle Scholar
- M.S. Tooms. 2016. Colour Reproduction in Electronic Imaging Systems: Photography, Television, Cinematography. John Wiley & Sons, Chapter Appendix H: Deriving the Standard Formula for Gamma Correction, 667--672.Google Scholar
Index Terms
- Facing the Cover-Source Mismatch on JPHide using Training-Set Design
Recommendations
Efficient stego key recovery based on distribution differences of extracting message bits
AbstractThe extraction of embedded messages, i.e., extraction attacks are the ultimate purpose of steganalysis, with great practical significance to obtain covert communication content and covert communication forensics. For steganography using a stego ...
Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain
IH&MMSec'19: Proceedings of the ACM Workshop on Information Hiding and Multimedia SecurityThis short paper is an extension of a family of embedding schemes called Natural Steganography, which embeds a message by mimicking heteroscedastic sensor noise in the JPEG domain. Under the assumption that the development from RAW uses linear de- ...
JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline
IH&MMSec '20: Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia SecurityThis paper proposes to use the statistical analysis of the correlation between DCT coefficients to design a new synchronization strategy that can be used for cost-based steganographic schemes in the JPEG domain. First, an analysis is performed on the ...
Comments