Quantitative Evaluation of Pairs and RS Steganalysis

Similar documents
1 Introduction Steganography and Steganalysis as Empirical Sciences Objective and Approach Outline... 4

Image Steganalysis: Challenges

Advanced Statistical Steganalysis

Nearest-neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image*

Reducing DDR Latency for Embedded Image Steganography

Steganography in Digital Media

Outline. Why do we classify? Audio Classification

Browsing News and Talk Video on a Consumer Electronics Platform Using Face Detection

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

STAT 113: Statistics and Society Ellen Gundlach, Purdue University. (Chapters refer to Moore and Notz, Statistics: Concepts and Controversies, 8e)

Channel models for high-capacity information hiding in images

Wipe Scene Change Detection in Video Sequences

DETECTION OF SLOW-MOTION REPLAY SEGMENTS IN SPORTS VIDEO FOR HIGHLIGHTS GENERATION

NUMB3RS Activity: Coded Messages. Episode: The Mole

PERCEPTUAL QUALITY OF H.264/AVC DEBLOCKING FILTER

MEMORY ERROR COMPENSATION TECHNIQUES FOR JPEG2000. Yunus Emre and Chaitali Chakrabarti

Copy Move Image Forgery Detection Method Using Steerable Pyramid Transform and Texture Descriptor

An Alternative Architecture for High Performance Display R. W. Corrigan, B. R. Lang, D.A. LeHoty, P.A. Alioshin Silicon Light Machines, Sunnyvale, CA

for Digital IC's Design-for-Test and Embedded Core Systems Alfred L. Crouch Prentice Hall PTR Upper Saddle River, NJ

Research Article. ISSN (Print) *Corresponding author Shireen Fathima

WINGS TO YOUR THOUGHTS..

Evaluation of Automatic Shot Boundary Detection on a Large Video Test Suite

The Development of a Synthetic Colour Test Image for Subjective and Objective Quality Assessment of Digital Codecs

Part 1: Introduction to Computer Graphics

... A Pseudo-Statistical Approach to Commercial Boundary Detection. Prasanna V Rangarajan Dept of Electrical Engineering Columbia University

8/30/2010. Chapter 1: Data Storage. Bits and Bit Patterns. Boolean Operations. Gates. The Boolean operations AND, OR, and XOR (exclusive or)

Chapter 1. Introduction to Digital Signal Processing

Automatic Commercial Monitoring for TV Broadcasting Using Audio Fingerprinting

Downloads from:

Avoiding False Pass or False Fail

Chord Classification of an Audio Signal using Artificial Neural Network

Tutorial 0: Uncertainty in Power and Sample Size Estimation. Acknowledgements:

Minimax Disappointment Video Broadcasting

G-106Ex Single channel edge blending Processor. G-106Ex is multiple purpose video processor with warp, de-warp, video wall control, format

G-700LITELite multiple Channel warping processor

Fast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264

Bar Codes to the Rescue!

Building Trust in Online Rating Systems through Signal Modeling

Cryptagram. Photo Privacy for Online Social Media Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian

Coaxlink series Ultimate in performance with superior value CoaXPress frame grabbers

Moving Steganography and Steganalysis from the Laboratory into the Real World

Steganographic Technique for Hiding Secret Audio in an Image

Moving Steganography and Steganalysis from the Laboratory into the Real World

WHAT MAKES FOR A HIT POP SONG? WHAT MAKES FOR A POP SONG?

A Layered Approach for Watermarking In Images Based On Huffman Coding

Contents. xv xxi xxiii xxiv. 1 Introduction 1 References 4

Type-2 Fuzzy Logic Sensor Fusion for Fire Detection Robots

Colour Reproduction Performance of JPEG and JPEG2000 Codecs

Video Quality Monitoring for Mobile Multicast Peers Using Distributed Source Coding

Characteristics of Polyphonic Music Style and Markov Model of Pitch-Class Intervals

HEBS: Histogram Equalization for Backlight Scaling

IMIDTM. In Motion Identification. White Paper

EDDY CURRENT IMAGE PROCESSING FOR CRACK SIZE CHARACTERIZATION

Interframe Bus Encoding Technique for Low Power Video Compression

Objective Video Quality Assessment of Direct Recording and Datavideo HDR-40 Recording System

How to use the NATIVE format reader Readmsg.exe

Digital Image Processing and Pattern Recognition

Time Domain Simulations

A FUNCTIONAL CLASSIFICATION OF ONE INSTRUMENT S TIMBRES

What is Steganography

Lab Assignment 2 Simulation and Image Processing

G-106 GWarp Processor. G-106 is multiple purpose video processor with warp, de-warp, video wall control, format conversion,

1996 Yampi Shelf, Browse Basin Airborne Laser Fluorosensor Survey Interpretation Report [WGC Browse Survey Number ]

How to Manage Video Frame- Processing Time Deviations in ASIC and SOC Video Processors

Reducing False Positives in Video Shot Detection

Automatic Rhythmic Notation from Single Voice Audio Sources

VBM683 Machine Learning

POST-PROCESSING FIDDLE : A REAL-TIME MULTI-PITCH TRACKING TECHNIQUE USING HARMONIC PARTIAL SUBTRACTION FOR USE WITHIN LIVE PERFORMANCE SYSTEMS

NAA ENHANCING THE QUALITY OF MARKING PROJECT: THE EFFECT OF SAMPLE SIZE ON INCREASED PRECISION IN DETECTING ERRANT MARKING

INTER GENRE SIMILARITY MODELLING FOR AUTOMATIC MUSIC GENRE CLASSIFICATION

SUBJECTIVE QUALITY EVALUATION OF HIGH DYNAMIC RANGE VIDEO AND DISPLAY FOR FUTURE TV

A Hybrid Approach for Information Hiding and Encryption using Multiple LSB s Algorithms

Modeling memory for melodies

The absolute opposite of ordinary. G804 Quad Channel Edge Blending processor

Example: compressing black and white images 2 Say we are trying to compress an image of black and white pixels: CSC310 Information Theory.

Speech Recognition and Signal Processing for Broadcast News Transcription

2. Problem formulation

New forms of video compression

INTRA-FRAME WAVELET VIDEO CODING

APPLICATION OF MULTI-GENERATIONAL MODELS IN LCD TV DIFFUSIONS

Why t? TEACHER NOTES MATH NSPIRED. Math Objectives. Vocabulary. About the Lesson

Easy Search Method of Suspected Illegally Video Signal Using Correlation Coefficient for each Silent and Motion regions

Investigation of Look-Up Table Based FPGAs Using Various IDCT Architectures

So far. Chapter 4 Color spaces Chapter 3 image representations. Bitmap grayscale. 1/21/09 CSE 40373/60373: Multimedia Systems

Role of Color Processing in Display

Practical Bit Error Rate Measurements on Fibre Optic Communications Links in Student Teaching Laboratories

EE373B Project Report Can we predict general public s response by studying published sales data? A Statistical and adaptive approach

Different Approach of VIDEO Compression Technique: A Study

Data Storage and Manipulation

2D Interleaver Design for Image Transmission over Severe Burst-Error Environment

Figure 1: AFM image of a Tip-check sample

Synchronization-Sensitive Frame Estimation: Video Quality Enhancement

Auto classification and simulation of mask defects using SEM and CAD images

Hidden Markov Model based dance recognition

Subjective Similarity of Music: Data Collection for Individuality Analysis

Color Image Compression Using Colorization Based On Coding Technique

Automatic Music Clustering using Audio Attributes

Automatic Laughter Detection

DICOM medical image watermarking of ECG signals using EZW algorithm. A. Kannammal* and S. Subha Rani

Lyrics Classification using Naive Bayes

Transcription:

Quantitative Evaluation of Pairs and RS Steganalysis Andrew Ker Oxford University Computing Laboratory adk@comlab.ox.ac.uk Royal Society University Research Fellow / Junior Research Fellow at University College, Oxford SPIE EI 4 9 January 24

Simple Classification The primary question an Information Security Officer (Warden) wants to ask is Does this image contain hidden data? (as opposed to estimating any hidden message length or trying to decode any hidden data). This work focuses solely on evaluating the reliability of hypothesis tests for this question. Reliability is a two-dimensional measure, showing how false positive and missed detections trade off against each other. Traditionally this is displayed as a Region of Confidence curve.

Distributed Steganalysis Project A number of large libraries of natural images (many JPEG compressed) Currently over 3, images in total, with more to come Optimised and portable program to simulate steganography and compute detection statistics Includes over variants of steganalysis statistics Heterogeneous cluster of computing machines to spread the work Has been 7-5 machines at any one time Calculations queued and results stored in a relational database Presently over 3 million rows of data, expected to grow to over million

Scope of Investigations Covers Grayscale bitmaps (which quite likely were previously subject to JPEG compression) Embedding method LSB steganography using a set proportion of evenly-spread pixels Steganalysis statistics Pairs [Fridrich et al, SPIE 3] RS a.k.a. dual statistics [Fridrich et al, ACM Workshop ] Will focus on interesting cases, in this case embedding rates of.-.2 secret bits per cover pixel.

Sample Output 7 6 No hidden data LSB steganography at 5% 5 4 3 2 -.75 -.25.25.75.25 Histograms of the standard RS statistic, generated from 5 JPEG images.

Sample Output % Probability of detection 8% 6% 4% 2% RS Steganalysis, 5% LSB Steganography % % 2% 4% 6% 8% Probability of false positive ROC curves generated from 5, JPEG images

Sample Output % Probability of detection 8% 6% 4% 2% RS Steganalysis, 5% LSB Steganography RS Steganalysis, % LSB Steganography % % 2% 4% 6% 8% Probability of false positive ROC curves generated from 5, JPEG images

Choosing the RS Mask The mask in RS Steganalysis determines how the pixels are grouped and which pixels of each group are LSB-flipped. In [Fridrich et al, ACM Workshop ] the masks and were used. We experimented with a number of alternative masks including: Uniformly, was the best performer. [ ] [ ] [ ]

Choosing the RS Mask There is a small but useful improvement: % Probability of detectionn 8% 6% 4% 2% % % 2% 4% 6% 8% Probability of false positive Mask = [,,;,,;,,] Mask = [,,,] Mask = [,,;,,;,,] ROC curves generated from 5, JPEG images; 5% LSB Steganography was used

Improved Pairs Analysis Pairs Analysis works by forming the colour cuts and then measuring relative homogeneity: 6 7 7 6 7 6 6 6 6 6 6 7 6 6 7 7 6 7 6 6 6 6 6 6 7 6

Improved Pairs Analysis Pairs Analysis works by forming the colour cuts and then measuring relative homogeneity: 6 7 7 6 7 6 6 6 6 6 6 7 6 6 7 7 6 7 6 6 6 6 6 6 7 6

Improved Pairs Analysis Count E = # adjacent pixels of equal value F = # adjacent pixels which differ by being LSB flipped (e.g. (6,7)) C = # adjacent pixels which differ by being LSB contraflipped (e.g. (7,8)) Let Q=E/(E+F) E/(E+C) Then Q is quadratic in the length of LSB-embedded message, which can be solved for in the usual way [Fridrich et al, SPIE 2]. c.f. [Dumitrescu et al, IHW 2]

Improved Pairs Analysis Results in (very roughly) reduction of false positives by approximately half: Probability of detection % 8% 6% 4% 2% % % 2% 4% 6% 8% Probability of false positive ROC curves generated from 5, JPEG images Conventional Pairs, 3% steganography Improved Pairs, 3% steganography Conventional Pairs, 5% steganography Improved Pairs, 5% steganography Conventional Pairs, % steganography Improved Pairs, % steganography

Conclusions The first results from the distributed steganalysis project focus only on LSB steganography in grayscale bitmaps. So far we have: Determined the best-performing mask for RS steganalysis, Substantially improved the performance of Pairs steganalysis

Conclusions The first results from the distributed steganalysis project focus only on LSB steganography in grayscale bitmaps. So far we have: Determined the best-performing mask for RS steganalysis, Substantially improved the performance of Pairs steganalysis, Showed the null distribution of RS statistic is leptokurtic, Illustrated that 2-dimensional variants of Pairs and RS are no more useful than the standard versions, Exposed some pitfalls in the selection of a representative set of natural images.

Further Work Have only examined the tip of the iceberg! Still to do: Consider other steganalysis algorithms for LSB steganography, Look at LSB steganography in RGB, palette, JPEG images, Plenty of other methods of embedding besides LSB

Further Work Have only examined the tip of the iceberg! Still to do: Consider other steganalysis algorithms for LSB steganography, Look at LSB steganography in RGB, palette, JPEG images, Plenty of other methods of embedding besides LSB What is it about JPEG compressed images that causes variation in reliability results? Can we classify images as a first stage, and then apply the bestperforming steganalysis statistic for each class? Do some statistical analysis of accuracy of ROC curves generated by simulation.

End