Top Banner
Batch Steganography and Pooled Steganalysis Andrew Ker [email protected] Royal Society University Research Fellow Oxford University Computing Laboratory 8 th Information Hiding Workshop 11 July 2006
16

Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker [email protected] Royal Society University Research Fellow Oxford University Computing

Feb 27, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing

Batch Steganography and Pooled Steganalysis

Andrew [email protected]

Royal Society University Research FellowOxford University Computing Laboratory

8th Information Hiding Workshop11 July 2006

Page 2: Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing

“The Prisoners’ Problem”

cover object

payload

stego object

emb

edd

ing

al

go

rith

m

Steganographer

Warden

or ?

Page 3: Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing

…more realistic?

many covers

payload

some stego objects, some covers

emb

edd

ing

al

go

rith

m

Steganographer

Warden

or ?

Page 4: Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing

…more realistic?

many covers

payload

some stego objects, some covers

emb

edd

ing

al

go

rith

m

Steganographer

Warden

any ?

Page 5: Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing

Batch SteganographyThe Steganographer:• has N covers each with same capacity C,• wants to embed a payload of BNC,

B<1 is the proportional bandwidth

• embeds Cp in each of Nr covers, leaving the other N(1 — r) alone.

p is the proportion of capacity used when a cover is embedded inr is the rate at which covers are usedconstraints: rp=B p � 1 r � 1

N(1 — r)Nr

Page 6: Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing

Pooled Steganalysisl

The Warden:• has a quantitative steganalysis method which estimates the proportionate

payload in each cover:

• wants to pool this evidence to answer the hypothesis test

• for now, does not aim to estimate B, r, p or separate individual stego objects from covers.

X1, X2 , . . . , XN

H0 : r = 0H1 : p, r > 0

X1 X2 X3 XN. . .

Page 7: Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing

Assumptions• N fixed• The Shift Hypothesis:

If proportion of capacity p is embedded in cover i,

where the error ǫi is independent of pWill write ψ for error pdf

Ψ for error cdf

• Assumptions about the shape of ψ:“Bell shaped”Symmetric about 0UnimodalSuitably smoothBut we do not assume finite variance

Xi = p+ ǫi

p0

ψ

Page 8: Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing

Outline• Three pooling strategies:

I: Count positive observationsII: Average observationIII: Generalised likelihood ratio test

for

• For each, consider• False positive rate @ 50% false negatives,• Steganographer’s best embedding counterstrategy,• How performance depends on B and N.

• Results of some simulation experiments• Conclusions

H0 : r = 0H1 : p, r > 0

Page 9: Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing

I: Count Positive Observations• Pooled statistic:This is just the sign test for whether the median of observed dist is greater than 0

• Null distribution:

• Stego distribution:

• Median p-value:

An increasing function of p; steganographer should take p=1 r=B

H0 : ♯P ∼ Bi(N, 12) ≈N(N2 , N

4 )

H1 : ♯P ∼ Bi(N(1− r), 12) + Bi(Nr,Ψ(p))

♯P = |{Xi :Xi > 0}|

median(♯P )≈ 12N +Nr(Ψ(p)− 1

2)

Φ(

−2BN 12 (Ψ(p)− 1

2p )

)

Page 10: Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing

II: Average Observation• Pooled statistic:

• Null distribution:

• Stego distribution:

• Median p-value:

Independent of choice of p

X̄ = 1N

∑Xi

H0 : X̄ ·

∼ N(0, σ2/N)

Φ(− 1σBN

12 )

H1 : median(X̄) ≈ rp =B

Page 11: Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing

III: Likelihood Ratio• Pooled statistic:

Likelihood function based on mixture pdf

• Null distribution:

• Median (mean) p-value: maximized when p=1, r=Bfunction of NB2

ℓ ·

∼ λχ2d

ℓ = log L(X1, . . . ,XN ; r̂, p̂)L(X1, . . . ,XN ;r =0, p= 0)

f(x) = (1− r)ψ(x) + rψ(x − p)

Theorem [see Appendix]Under some assumptions... (omitted here)In the limit as N→∞, for small B, E[ℓ] is maximized when p=1, r=B, and then

E[ℓ] ∼ NB2

2∫ ψ′(x)2

ψ(x) + ψ′′ (x) dx

Page 12: Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing

Strategies Summarised

(for small B)

any

Best steg. strategy

decreasing function of

Generalised Likelihood Ratio Test( known)

decreasing function ofAverage

observation

decreasing function ofCount positive

observations

Total capacity ∝ BN ∝

False +ve rate at 50% false –ve

Pooling strategy

p = 1r = B N

12

N12

p = 1r = B N

12

ψ

BN12

BN12

B2N

Page 13: Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing

Experimental Results• Covers: A set of 14000 grayscale images• Steganography: LSB Replacement• Steganalysis: “Sample Pairs” [Dumitrescu, IHW 2002]• N=10, 100, 1000

For a random batch of size N, compute 5000 samples with no steganography, to fit null distributions500 samples each with a range of p, r such that rp=B=0.01

Measure false positive rate @ 50% false negatives

♯P,X̄, ℓ

Page 14: Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing

Experimental Results:

Count positive observationsAverage observationGeneralised likelihood ratio

B = 0.01

0.1 1

10-2

10-1

100

r

N=10

0.01 0.1 1

10-8

10-6

10-4

10-2

100

r

N=1000

0.01 0.1 1

10-8

10-6

10-4

10-2

100

r

N=100

Steganography concentrated in fewest covers

Steganography spread over all covers

Page 15: Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing

Not in this talk• Technical statistical difficulties.• Empirical investigation of relationship between B and N.• A critical problem: bias in the quantitative steganalysis method.

Further Work• Other strategies for Warden

e.g. “count observations greater than some threshold t”

• Try to relax some of the assumptionsUniformity of covers/embeddingShift hypothesis

Page 16: Batch Steganography and Pooled SteganalysisBatch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing

Conclusions• Batch steganography and pooled steganalysis are interesting and relevant

problems.Complicated by the plethora of possible pooling strategies for the Warden.Mathematical analysis can be intractable.

• Common theme: B should shrink as N grows, for fixed risk.Conjecture: Steganographic capacity is proportional to the square root of the total cover size.

• Common theme: Steganographer should concentrate the steganography.Not true for all pooling strategies!Nonetheless, seems to be true for all “sensible” pooling strategies…Lessons for adaptive embedding?

The [email protected]