Image Steganalysis: Challenges

Similar documents
1 Introduction Steganography and Steganalysis as Empirical Sciences Objective and Approach Outline... 4

Quantitative Evaluation of Pairs and RS Steganalysis

Copy Move Image Forgery Detection Method Using Steerable Pyramid Transform and Texture Descriptor

Advanced Statistical Steganalysis

Steganography in Digital Media

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Reducing DDR Latency for Embedded Image Steganography

WINGS TO YOUR THOUGHTS..

Steganographic Technique for Hiding Secret Audio in an Image

Moving Steganography and Steganalysis from the Laboratory into the Real World

Moving Steganography and Steganalysis from the Laboratory into the Real World

What is Steganography

Channel models for high-capacity information hiding in images

Nearest-neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image*

A Robust Method for Image Steganography based on Chaos Theory

Region Adaptive Unsharp Masking based DCT Interpolation for Efficient Video Intra Frame Up-sampling

Automatic Music Genre Classification

Video coding standards

A Framework for Segmentation of Interview Videos

WYNER-ZIV VIDEO CODING WITH LOW ENCODER COMPLEXITY

Module 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India

An Efficient Low Bit-Rate Video-Coding Algorithm Focusing on Moving Regions

UC San Diego UC San Diego Previously Published Works

CS 1674: Intro to Computer Vision. Face Detection. Prof. Adriana Kovashka University of Pittsburgh November 7, 2016

Improving Frame Based Automatic Laughter Detection

Wavelet transform based steganography technique to hide audio signals in image.

Embedding Multilevel Image Encryption in the LAR Codec

VISUAL CONTENT BASED SEGMENTATION OF TALK & GAME SHOWS. O. Javed, S. Khan, Z. Rasheed, M.Shah. {ojaved, khan, zrasheed,

Chord Classification of an Audio Signal using Artificial Neural Network

A Layered Approach for Watermarking In Images Based On Huffman Coding

International Journal of Advance Engineering and Research Development MUSICAL INSTRUMENT IDENTIFICATION AND STATUS FINDING WITH MFCC

Motion Re-estimation for MPEG-2 to MPEG-4 Simple Profile Transcoding. Abstract. I. Introduction

Analog Performance-based Self-Test Approaches for Mixed-Signal Circuits

Experiments on musical instrument separation using multiplecause

Music Genre Classification

Key-based scrambling for secure image communication

DeepID: Deep Learning for Face Recognition. Department of Electronic Engineering,

Music Genre Classification and Variance Comparison on Number of Genres

COMP 249 Advanced Distributed Systems Multimedia Networking. Video Compression Standards

Singer Traits Identification using Deep Neural Network

Image Resolution and Contrast Enhancement of Satellite Geographical Images with Removal of Noise using Wavelet Transforms

Cryptagram. Photo Privacy for Online Social Media Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian

Visual Communication at Limited Colour Display Capability

Capacity is the Wrong Paradigm*

Music Emotion Recognition. Jaesung Lee. Chung-Ang University

Multichannel Satellite Image Resolution Enhancement Using Dual-Tree Complex Wavelet Transform and NLM Filtering

EE391 Special Report (Spring 2005) Automatic Chord Recognition Using A Summary Autocorrelation Function

TRAFFIC SURVEILLANCE VIDEO MANAGEMENT SYSTEM

Overview: Video Coding Standards

Outline. Why do we classify? Audio Classification

Automatic Piano Music Transcription

Fast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264

AN IMPROVED ERROR CONCEALMENT STRATEGY DRIVEN BY SCENE MOTION PROPERTIES FOR H.264/AVC DECODERS

A SUBJECTIVE STUDY OF THE INFLUENCE OF COLOR INFORMATION ON VISUAL QUALITY ASSESSMENT OF HIGH RESOLUTION PICTURES

P. Sanyasi Naidu* and Jagadish Gurrala**

Template Protection under Signal Degradation: A Case-Study on Iris-Biometric Fuzzy Commitment Schemes

Multiple Image Secret Sharing based on Linear System

DETECTION OF SLOW-MOTION REPLAY SEGMENTS IN SPORTS VIDEO FOR HIGHLIGHTS GENERATION

Introduction to image compression

Analysis of a Two Step MPEG Video System

Lecture 9 Source Separation

A Study of Encoding and Decoding Techniques for Syndrome-Based Video Coding

MUSI-6201 Computational Music Analysis

Automatic Extraction of Popular Music Ringtones Based on Music Structure Analysis

A SVD BASED SCHEME FOR POST PROCESSING OF DCT CODED IMAGES

Adaptive Distributed Compressed Video Sensing

Neural Network for Music Instrument Identi cation

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICASSP.2016.

Man-Machine-Interface (Video) Nataliya Nadtoka coach: Jens Bialkowski

Topics in Computer Music Instrument Identification. Ioanna Karydi

Document Analysis Support for the Manual Auditing of Elections

Statistical Modeling and Retrieval of Polyphonic Music

CHAPTER 8 CONCLUSION AND FUTURE SCOPE

WE CONSIDER an enhancement technique for degraded

Constant Bit Rate for Video Streaming Over Packet Switching Networks

Noise Flooding for Detecting Audio Adversarial Examples Against Automatic Speech Recognition

Video compression principles. Color Space Conversion. Sub-sampling of Chrominance Information. Video: moving pictures and the terms frame and

Joint source-channel video coding for H.264 using FEC

A PERPLEXITY BASED COVER SONG MATCHING SYSTEM FOR SHORT LENGTH QUERIES

Vector-Valued Image Interpolation by an Anisotropic Diffusion-Projection PDE

Rebroadcast Attacks: Defenses, Reattacks, and Redefenses

An Introduction to Image Compression

CERIAS Tech Report Preprocessing and Postprocessing Techniques for Encoding Predictive Error Frames in Rate Scalable Video Codecs by E

Implementation of an MPEG Codec on the Tilera TM 64 Processor

VERY low bit-rate video coding has triggered intensive. Significance-Linked Connected Component Analysis for Very Low Bit-Rate Wavelet Video Coding

Optimized Color Based Compression

Intra-frame JPEG-2000 vs. Inter-frame Compression Comparison: The benefits and trade-offs for very high quality, high resolution sequences

CONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION

Deep Neural Networks Scanning for patterns (aka convolutional networks) Bhiksha Raj

Indexing local features. Wed March 30 Prof. Kristen Grauman UT-Austin

High Quality Digital Video Processing: Technology and Methods

Research on sampling of vibration signals based on compressed sensing

Research Topic. Error Concealment Techniques in H.264/AVC for Wireless Video Transmission in Mobile Networks

Optimal look-up table-based data hiding

Instrument Recognition in Polyphonic Mixtures Using Spectral Envelopes

A Hybrid Approach for Information Hiding and Encryption using Multiple LSB s Algorithms

Distortion Compensated Lookup-Table Embedding: Joint Security and Robustness Enhancement for Quantization Based Data Hiding

DATA hiding technologies have been widely studied in

Transcription:

Image Steganalysis: Challenges Jiwu Huang,China BUCHAREST 2017

Acknowledgement Members in my team Dr. Weiqi Luo and Dr. Fangjun Huang Sun Yat-sen Univ., China Dr. Bin Li and Dr. Shunquan Tan, Mr. Jishen Zeng Shenzhen Univ., China

Outlines Steganography in Images Steganalysis vs. Steganography Challenges in Steganalysis 3

Steganography What steganography? undetectable 4

Steganography Steganography vs. Cryptography? Unreadable! plaintext E k (M) encryption @2*$#&(*%7* =? ciphertext plaintext Cryptography 5

Steganography Steganography and Cryptography? cover Nothing! plaintext M Hiding M stego plaintext Steganography 6

Steganography Secret message Cryptography Encryption Encrypted bits Steganography Cover image Hiding Unsecure channel Security: 1) difficulty to find stego images 2) difficulty to extract the hidden bits 7

Steganography Security for steganography Secure steganography: undetectable Can only be estimated with a probability about random guessing Not necessary or sufficient to be imperceptible Imperceptible does not means undetectable perceptible does not means detectable 8

Steganography Security for steganography K-L distance: security (Cachin 2004) P X ---distribution of covers P Y ---distribution of stegos relative entropy security 9

Steganography Security for steganography Maximum Mean Discrepancy-based Security (Fridrich 2008) x i, y i : Sample of P X, P Y What function f should be selected? 10

Steganography Security for steganography Steganalyzer s ROC-based Security (Memon 2003) security: ROC:TP rate ~FP rate 11

Steganalysis vs. Steganography 12

Steganalysis vs. Steganography Steganalysis 13

Steganalysis vs. Steganography Early targeted approaches Attacking LSB-based steganography Attacking OutGuess, MB, F5, YASS Advanced universal approaches Image Quality Features (Memon et. al) Calibration Based Features (Fridrich et. al) Moment Based Features (Farid et. al) Correlation Based Features (Moulin, Sullivan, Shi) 14

Steganalysis vs. Steganography Cat & Mouse Game targeted approaches steganography LSB-based (J-steg) Model-based (MB1) steganalysis Histogram-based (Chi-square), RS Over fitting Compensationbased (MB2) Block artifact due to many changes 15

Steganalysis vs. Steganography Cat & Mouse Game universal approaches steganography matrix coding wet paper code STC(syndrome-trellis codes) Distortion functions steganalysis High-dimensional features +machine learning Adaptive+ Adaptive+ 16

Steganalysis vs. Steganography Advanced universal approaches Y i testing Y: feature vector Classifier: mapping Y i i : i =0,nature image; i =1,stego image 17

Steganalysis vs. Steganography Advanced universal approaches training Classifiers: SVM, Fisher linear discriminant, neural network, ensemble, others. 18

19 Statistical features nature images stego images Steganalysis wins steganography

20 Statistical features stego images nature images steganography wins Steganalysis

21 Counterwork between steganography and steganalysis statistical model of nature images

Challenges in Steganalysis Statistical model of nature images Is there such universal statistical model It seem to be difficult to answer If yes, how to model? At least, it is not easy to model texture regions 22

Challenges in Steganalysis How to find the traces a steganographic scheme? Limited performance in the existing features Objective image quality measures, Calibration-based features, statistical moments, gray-level co-occurrence matrix based features, Markov process based features, SPAM (subtractive pixel adjacency matrix), SRM (spatial rich model) SRM: generating features (Fridrich 2012) 23

SRM Computing residuals using different submodels Ri,j = X i,j(ni,j)-cxi,j Truncation and quantization by quantization step q and threshold T Ri,j = trunc T (round(ri,j/q)) Using co-occurrence matrices for feature extraction Fridrich et. al, Rich Models for Steganalysis of Digital Images, IEEE T-IFS, 7(3): 868-882, 2012 24

25

Performance of SRM under different datasets SRM + ensemble classifier Image Dataset: downsampling from high resolution raw images Downsampling type: bicubic, bilinear, lanczos2, nearest 5000 images for training, 5000 for testing. stegnographic algorithm: S-UNIWARD, 0.4bpp 26

Challenges in Steganalysis How to find the traces a steganographic scheme? How to design efficient features? To achieve better performance Methodology for constructing features Compact features Low computation load 27

Challenges in Steganalysis Mis-matchng between training and testing databases Mis-matching issue Mis-matching: datasets for training and testing have different properties Steganalyzers should be robust In steganalysis community: downsampling leaves traces 28

Downsampling effect on steganalysis SRM + ensemble classifier Image Dataset: downsampling from high resolution raw images 5000 images for training, 5000 for testing. stegnographic algorithm: S-UNIWARD, 0.4bpp 29

Challenges in Steganalysis Does deep learning work? Great success in pattern recognition Does DL work in recognizing Imperceptible differences? Works on some easy forensics issues However, how about steganalysis? Have not seen good progress in steganalysis in spatial domain Recent progress in steganalysis for JPEG domain 30

Deep learning in JPEG steganalysis JPEG steganography: J-Uniward, 0.4bpp Training: 800K images from ImageNet Testing: 200K images from ImageNet Method Accuracy DCTR features (8000dims) 0.65 PHARM features (12600dims) 0.68 Proposed deep network 0.75 JPEG stegnographic algorithm: J-UNIWARD, 0.4bpp Zeng et,al, Large-scale JPEG image steganalysis using hybrid deep-learning framework, Submitted to IEEE Trans. on IFS 31

Challenges in Steganalysis Dataset for training Golden rules in machine learning data samples should be at least 20-50 times with the total number of parameters. Steganalysis in spatial domain: Highdimensional features vs. small dataset Taking SRM as an example 32

SRM: very high feature dimension vs. small training dataset features:34671 Image database: 10 K, training images: 5K JPEG stegnographic algorithm: Juniward, 0.4bpp Fridrich et. al, Rich Models for Steganalysis of Digital Images, IEEE T-IFS, 7(3): 868-882, 2012 33

DNN: very large number of network parameters vs. small training dataset parameters: 100K Image database: 10 K, training images: 5K JPEG stegnographic algorithm: Juniward, 0.4bpp Xu et., al, Structural Design of Convolutional Neural Networks for Steganalysis, IEEE SPL, 23(5), 708-712, 2016. 34

Challenges in Steganalysis Dataset for training Uncompressed images are not commonly used in practice Very huge manpower to collect an applicable raw dataset 35

Conclusions Stegnography is a good way in secret communication and thus steganalysis is of important Have some progress in laboratory There are still many challenges Deep learning may be useful in JPEG steganalysis 36