Top Banner
Journal of VLSI Signal Processing 41, 293–303, 2005 c 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. DOI: 10.1007/s11265-005-4153-1 Data Masking: A New Approach for Steganography? REGUNATHAN RADHAKRISHNAN, MEHDI KHARRAZI AND NASIR MEMON Polytechnic University, Brooklyn, NY 11201, USA Abstract. It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statisti- cal tests and capture them for further cryptanalysis. Hence, the communicating entities can use steganography to achieve covertness. In this paper we propose a new form of multimedia steganography called data mask- ing. Instead of embedding a secret message into a multimedia object, as in traditional multimedia steganog- raphy, we process the entire secret message to make it appear statistically similar to a multimedia object itself. Thereby we foil an eavesdropper who is primarily applying statistical tests to detect encrypted com- munication channels. We show that our approach can potentially give a covert channel capacity which is an order of magnitude higher than traditional steganography. Our experiments also show that steganalyzers trained with stego objects of known steganographic have a low detection accuracy for datamasked multimedia objects. 1. Introduction Rapid developments in cryptography, cryptographic standards, and relaxed export controls on encryption schemes have made cryptographic software widely available, user friendly and in some cases transpar- ent to end-users. The relative ease with which se- cure channels of communication can be created be- tween two parties using cryptography, coupled with the explosion in network traffic, has posed a problem to the surveillance operations typically carried out by law enforcement and intelligence agencies. In order to keep up with the growth in communication traffic and secure channels, massive eavesdropping campaigns, such as Carnivore and Echelon, have been developed. Carnivore, for example, is a combination of hardware and software, which collects all electronic packets that are sent to and from the Internet Service Provider where it is installed. Following this “collection” procedure, several filters are applied to isolate emails with certain keywords which could be further analyzed off-line. These filters could potentially include the performance of statistical tests to isolate encrypted emails for off- line cryptanalysis. Pervasive eavesdropping like that performed by Carnivore leads to the need for covert channels, in which communicating entities hide their communica- tion channel itself from eavesdroppers. Steganography refers to the science of “invisible” communication. Un- like cryptography, where the goal is to secure commu- nications from an eavesdropper, steganographic tech- niques strive to hide the very presence of the message itself from an observer [1]. As broadband technolo- gies improve bandwidth at the last-mile, multimedia content, such as still images, audio and video, have gained increasing popularity on the Internet. Given the high degree of redundancy present in a digital repre- sentation of multimedia content (despite compression), there has been an increased interest in using multime- dia content for the purpose of steganography. Indeed many such techniques have been devised in the past few years. For an excellent survey of such techniques, the reader is referred to [2]. Briefly, the general model for steganography, illustrated in Fig. 1, where we have
11

Data Masking: A New Approach for Steganography?isis.poly.edu/~steganography/pubs/vlsi04.pdfData Masking: A New Approach for Steganography? 295 Figure 2. Audio datamasking using spectral

Apr 26, 2018

Download

Documents

vantu
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Data Masking: A New Approach for Steganography?isis.poly.edu/~steganography/pubs/vlsi04.pdfData Masking: A New Approach for Steganography? 295 Figure 2. Audio datamasking using spectral

Journal of VLSI Signal Processing 41, 293–303, 2005c© 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands.

DOI: 10.1007/s11265-005-4153-1

Data Masking: A New Approach for Steganography?

REGUNATHAN RADHAKRISHNAN, MEHDI KHARRAZI AND NASIR MEMONPolytechnic University, Brooklyn, NY 11201, USA

Abstract. It is well known that encryption provides secure channels for communicating entities. However,due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statisti-cal tests and capture them for further cryptanalysis. Hence, the communicating entities can use steganographyto achieve covertness. In this paper we propose a new form of multimedia steganography called data mask-ing. Instead of embedding a secret message into a multimedia object, as in traditional multimedia steganog-raphy, we process the entire secret message to make it appear statistically similar to a multimedia objectitself. Thereby we foil an eavesdropper who is primarily applying statistical tests to detect encrypted com-munication channels. We show that our approach can potentially give a covert channel capacity which isan order of magnitude higher than traditional steganography. Our experiments also show that steganalyzerstrained with stego objects of known steganographic have a low detection accuracy for datamasked multimediaobjects.

1. Introduction

Rapid developments in cryptography, cryptographicstandards, and relaxed export controls on encryptionschemes have made cryptographic software widelyavailable, user friendly and in some cases transpar-ent to end-users. The relative ease with which se-cure channels of communication can be created be-tween two parties using cryptography, coupled withthe explosion in network traffic, has posed a problemto the surveillance operations typically carried out bylaw enforcement and intelligence agencies. In order tokeep up with the growth in communication traffic andsecure channels, massive eavesdropping campaigns,such as Carnivore and Echelon, have been developed.Carnivore, for example, is a combination of hardwareand software, which collects all electronic packets thatare sent to and from the Internet Service Provider whereit is installed. Following this “collection” procedure,several filters are applied to isolate emails with certainkeywords which could be further analyzed off-line.These filters could potentially include the performance

of statistical tests to isolate encrypted emails for off-line cryptanalysis.

Pervasive eavesdropping like that performed byCarnivore leads to the need for covert channels, inwhich communicating entities hide their communica-tion channel itself from eavesdroppers. Steganographyrefers to the science of “invisible” communication. Un-like cryptography, where the goal is to secure commu-nications from an eavesdropper, steganographic tech-niques strive to hide the very presence of the messageitself from an observer [1]. As broadband technolo-gies improve bandwidth at the last-mile, multimediacontent, such as still images, audio and video, havegained increasing popularity on the Internet. Given thehigh degree of redundancy present in a digital repre-sentation of multimedia content (despite compression),there has been an increased interest in using multime-dia content for the purpose of steganography. Indeedmany such techniques have been devised in the pastfew years. For an excellent survey of such techniques,the reader is referred to [2]. Briefly, the general modelfor steganography, illustrated in Fig. 1, where we have

Page 2: Data Masking: A New Approach for Steganography?isis.poly.edu/~steganography/pubs/vlsi04.pdfData Masking: A New Approach for Steganography? 295 Figure 2. Audio datamasking using spectral

294 Radhakrishnan, Kharrazi and Memon

Figure 1. Framework for Secret Key Passive Warden Steganography. Alice embeds secret message in cover image (left). Wendy the wardenchecks if Alice’s image is a stego-image (center). If she cannot determine it to be so, she passes it on to Bob who retrieves the hidden messagebased on secret key (right) he shares with Alice.

Alice wishing to send a secret message m to Bob. Inorder to do so, she “embeds” m into a cover-object c,to obtain the stego-object s. The stego-object s is thensent through the public channel. Wendy who examinesall messages in the channel, should not be able to dis-tinguish in any sense between cover-objects (objectsnot containing any secret message) and stego-objects(objects containing a secret message). In this context,steganalysis refers to the body of techniques that aidWendy in distinguishing between cover-objects andstego-objects. It should be noted that Wendy has tomake this distinction without any knowledge of thesecret key which Alice and Bob may be sharing andsometimes even without any knowledge of the specificalgorithm that they might be using for embedding thesecret message.

There are two problems with multimedia steganog-raphy that seem to have been ignored in the literature.Firstly, in multimedia steganography, the size of thecovert message is relatively much smaller than the sizeof the multimedia object (the stego object) that car-ries the covert message. In fact recent developmentsin steganalysis techniques have demonstrated that em-bedding a secret message in a multimedia object, likesay a still image, causes certain statistically discernibleartifacts that reveal the presence of the secret messagethereby exposing the covert communication channel[3–6]. Such developments further limit the number ofbits that can safely be hidden in a multimedia objectfrom sophisticated steganalysis techniques. This leadsto a cover object that is one or more orders of magnitudelarger than the secret message, reducing the effectivebandwidth of covert communication channels.

The second problem is that the common interpre-tation of the warden-based framework when used formultimedia steganography described has been that thewarden examines the cover-object (or stego-object)perceptually and statistically. However, perceptualtests, which may have been practical on low volumecommunication channels, would not be practical withhigh volume communication channels. Such channelsmust rely on automated statistical tests for detectingpotential stego objects and only then may apply (if atall) some form of perceptual tests to the selected can-didates. Indeed, large scale eavesdropping operationslike Carnivore rely first on statistical analysis to iso-late “interesting messages.” Hence, if Alice and Bobcan evade statistical tests performed by Wendy, theymay not have to undergo any perceptual test at all! Sofor example, if the stego object is statistically indistin-guishable from an image, its perceptual quality doesnot matter at all. Can this fact be exploited to improvecovert communications in any sense? In this paper weshow that this is indeed possible.

Specifically, we propose a novel technique, whichwe call Data Masking, for multimedia steganography.We again look at the problem of Alice and Bob wishingto communicate covertly, but we assume that the war-den Wendy is an entity like Carnivore and will first ex-amine messages statistically. Only if the statistical testsindicate a possibility of covert communication, wouldshe then examine the message further. Hence instead ofselecting a cover object and embedding a covert mes-sage in it like traditional steganography, we mask thesecret message to make it appear like a normal multi-media object under typical statistical examinations.

Page 3: Data Masking: A New Approach for Steganography?isis.poly.edu/~steganography/pubs/vlsi04.pdfData Masking: A New Approach for Steganography? 295 Figure 2. Audio datamasking using spectral

Data Masking: A New Approach for Steganography? 295

Figure 2. Audio datamasking using spectral factorization.

To demonstrate our approach we assume the covertmessage is encrypted and hence a random bit stream.Since a random bit string can be easily identified byWendy using simple statistical tests, we process therandom bit stream to make it appear like a audio signalor image, in a statistical sense. This process removesrandomness from the encrypted message, and makes itdifficult for Wendy to distinguish it from a typical audiostream or image. We refer to the process of convertinga random bitstream into audio and image as “audiodatamasking” and “image datamasking” respectively.The rest of the paper is organized as follows: in thefollowing section we describe the proposed system foraudio and image datamasking. Section 3 presents someexperimental results and possible improvements andwe conclude in Section 4 with future work.

2. Proposed System

If Alice wants to send an encrypted message to Bob, thewarden Wendy would be able to detect such a messageas an encrypted stream since it would exhibit propertiesof randomness. In order for a secure channel to achievecovertness, it is necessary to preprocess the encryptedstream at the end points to remove randomness suchthat the resulting stream defeats statistical tests for ran-domness and the stream is reversible at the other end.In this section, we propose schemes that make the pro-cessed encrypted streams appear like more correlatedmultimedia streams (audio and image).

2.1. Audio Datamasking

We propose the following two methods for audio data-masking.

• Audio datamasking using spectral factorization.• Audio datamasking using LPC analysis-synthesis.

2.1.1. Audio Datamasking Using Spectral Factoriza-tion. Audio datamasking using spectral factorizationis illustrated in Fig. 2. Let us consider the cipher streamas samples from a Wide Sense Stationary (WSS) Pro-cess, E. We would like to transform this input processwith high degree of randomness to another stationaryprocess, A, with more correlation between samples byusing a linear filter, H. It is well known that Powerspectrum of a input WSS Process, A(w), to a lineartime invariant system and Power spectrum of the cor-responding output Process, E(w) are related by thefollowing equation:

E(w) = |H (w)|2 A(w) (1)

If E(w) is a white noise process, then H(w) is thewhitening filter or Wiener filter. Since the encryptedstream is random, its power spectral density is flat andresembles the power spectral density of a white noiseprocess. Then, the desired Wiener filter can be obtainedby spectral factorization of (E(w)/A(w)) followed byselection of poles and zeros to obtain the minimumphase solution for H(w). Since the factor (E(w)/A(w))can have arbitrary shape, it would require a filter ofvery high order for realization.

2.1.2. Audio Datamasking Using LPC Analysis-Synthesis. Audio datamasking can also be performedusing LPC Analysis/Synthesis as shown in Fig. 3. TheLPC Analysis filter for reference Audio clip, A, is ob-tained as follows. Let X0, X1, X2 . . . X N−1 represent Nprevious samples of the reference audio clip. The goalis to obtain the filter coefficients h0, h1, h2 . . . hN−1

Page 4: Data Masking: A New Approach for Steganography?isis.poly.edu/~steganography/pubs/vlsi04.pdfData Masking: A New Approach for Steganography? 295 Figure 2. Audio datamasking using spectral

296 Radhakrishnan, Kharrazi and Memon

Figure 3. Audio datamasking using LPC analysis/synthesis.

such that∑

E((Xi − X̂i )2) is minimized. Here X̂i isthe predicted value of the current sample based on Nprevious samples in the reference audio and is definedas

∑(N−1)k=0 hk Xk .

Using the orthogonality principle (Hilbert spaceprojection theorem), N equations (called Yule-Walkerequations) can be set up to solve for the optimal filtercoefficients in the MMSE (Minimum Mean Square Er-ror) sense. Then, the inverse of the LPC analysis filterso designed, can be used to filter the noise-like cipherstream to remove randomness from cipher stream andtransform it into a reference audio-like waveform thathas more correlation between samples.

With the knowledge of filter coefficients the receivercan reconstruct the cipher stream from the referenceaudio, as in the Inverse Wiener filtered cipher stream.

2.2. Image Datamasking

Since the source model for speech is well understood,LPC Analysis-synthesis could be used for datamask-ing. The all-pole synthesis filter is known to model thehuman vocal tract filter. However, the source modelfor images is not as well understood and hence wepropose a different scheme for image datamasking asshown in Fig. 3.

As in audio datamasking, we use the prediction er-ror to mask the encrypted stream. Each pixel’s in-tensity value is predicted based on its causal neigh-borhood using a MED predictor that is employed inthe JPEG-LS lossless compression standard [8]. Thecausal neighborhood consists of W, NW, N, NE (west,northwest, north, northeast) pixels. According to theMED predictor, the predicted value of current pixel is

min (W, N) if N W ≥ max(W, N ) or it is max(W, N )if N W ≤ min(W, N ) or it is W + N − NW otherwise.

A Huffman codebook, that is constructed for theLaplacian prediction error probability density function(PDF), is used to decode the input random encryptedstream. Then the PDF of Huffman decoded encryptedsamples would also have a Laplacian PDF. Hence, onecan modify each pixel so that the prediction error at thatpixel is matched with the Huffman decoded encryptedstream sample.

Note that in the proposed system for image data-masking, there are two parameters that the communi-cating parties should exchange beforehand. The firstis a Huffman codebook designed for coding predictionerrors with a Laplacian PDF and the second is a thresh-old to select the range prediction error values to bemapped to encrypted stream samples. For instance, ifthe chosen threshold in M, there would 2M+1 huffmancodewords mapping {−M . . . 0 . . . M}. This thresholdcontrols the tradeoff between datamasking capacityand quality of the data masked image. By choosingthe threshold small, one would select only smooth re-gions of the image to hide information and hence thequality of the datamasked image would be better. Withthe knowledge of these two parameters, the receiverwould map the prediction error at each pixel to therandom encrypted stream.

In the following section, we present some of ourexperimental results to evaluate the performance ofaudio and image data masking.

3. Experimental Results

We chose an AES (Advanced Encryption Standard)Advanced Encryption Standard [7], encrypted stream

Page 5: Data Masking: A New Approach for Steganography?isis.poly.edu/~steganography/pubs/vlsi04.pdfData Masking: A New Approach for Steganography? 295 Figure 2. Audio datamasking using spectral

Data Masking: A New Approach for Steganography? 297

Figure 4. Proposed system for image datamasking.

Figure 5. Comparison of reference audio clip and encrypted streamin time domain.

as input to our system. The system’s desired output isto generate a multimedia object from this stream. Weuse any audio clip or image as a reference to guide thesystem in the process.

3.1. Results on Audio Datamasking

We picked a speech clip of duration 2 seconds as ourreference audio, A. We read every seven bits fromthe encrypted stream and append a random LSB andinterpret it as a sample from a random process, E.Figures 5 and 6 compare the encrypted stream andreference audio clip in time domain and frequencydomain respectively.

The reference audio is then segmented into framesof length 1024 samples, such that the time duration isshort enough for the stationarity assumption to hold.Then for each frame of audio, an equal number of bytes

Figure 6. Comparison of power spectral densities (PSDs) of ref-erence audio clip and encrypted stream.

from the encrypted stream are read. A LPC Analysisfilter of order 31 was designed, the inverse of whichwas used to filter the encrypted stream. We thus have atime-varying inverse Wiener filter shaping every 1024samples of the encrypted stream to match the referenceaudio frame.

Figure 7 shows the results of inverse Wiener fil-tering on encrypted stream corresponding to 2 s ofreference audio clip and its PSD. It is clear that the fil-tered signal has more correlation than the encryptedsignal and would potentially defeat most statisticaltests for randomness. However, the filtered signal doesnot match the reference audio waveform exactly andhence the resulting waveform was noisier when lis-tened to (perceptual test). If the shaping of the en-crypted stream perfectly matched that of reference au-dio for each frame, then the inverse Wiener filtered

Page 6: Data Masking: A New Approach for Steganography?isis.poly.edu/~steganography/pubs/vlsi04.pdfData Masking: A New Approach for Steganography? 295 Figure 2. Audio datamasking using spectral

298 Radhakrishnan, Kharrazi and Memon

Figure 7. Inverse wiener filtered encrypted stream & its PSD.

encrypted stream would also sound like the referenceaudio.

In order to reconstruct the encrypted stream at thereceiver, knowledge of LPC analysis filter coefficientsfor the current frame is essential. Therefore, the filtercoefficients for the current frame are appended to theencrypted stream that was shaped in the previous frameand the coefficients corresponding to the first framewere included in the header of the .wav file. Wienerfiltering can then be performed for each frame by re-trieving the filtering coefficients reconstructed fromthe previous frame to obtain the encrypted stream forthe current frame. Figure 8 shows the reconstructed en-crypted stream and its difference from the original. Themaximum difference between the samples of originaland reconstructed encrypted stream is within 0.015.Since each sample was interpreted as a byte from theencrypted stream and scaled by (1/64) and shifted by−1, a bit flip in the encrypted stream can occur only ifthe error is greater than (1/64). Therefore, if the error iswithin (1/64) or (0.0156), it is possible to reconstructthe encrypted stream without any bit error which iscritical for proper decryption.

Now that we are convinced that the proposed schemewould mask encrypted data from statistical tests, let usevaluate the performance of this scheme as a audiodata hiding technique. If we assume that each filtercoefficient occupies a word, we have an overhead of124 bytes (4 × 31) for every 1024 bytes of encryptedstream. The effective payload, (1024−124−128) =772 bytes, can be thought of as embedding capacity forthis scheme per frame of audio. It has been observedthat the quantization error introduced by a precision

Figure 8. Reconstructed encrypted stream & its difference fromoriginal encrypted stream.

of 8 bits per sample of the filtered encrypted streamwould result in an error greater than (1/64). Therefore,we use 16 bit precision for each sample in the filteredencrypted stream and assume that the transmitted in-verse Wiener filtered stream was received without anydistortion. We can compare our scheme’s embeddingcapacity to that of LSB embedding, in which one bitis embedded in the LSB per sample of audio. The pro-posed scheme hides 6176 bits (8 × 772) per 1024 bytesof audio data whereas LSB embedding (which also haslow robustness) can hide 1024 bits per 1024 bytes ofaudio data. Therefore, the embedding capacity of pro-posed scheme is 6.0313 times that of the capacity ofLSB embedding. In order to achieve an embeddingcapacity of 6176 bits per 1024 bytes using LSB em-bedding technique, it would require changing at least 6bits of the 8 bits in each sample! Note that in practice,steganalysis techniques given in [4–6] can detect thepresence of LSB embedding even when 10% of thebits in the cover message have been flipped (in somecases this can be as low as 2%;). So we potentially havean order of magnitude larger capacity as compared totraditional multimedia steganography. Of course, wegain this by assuming that warden does not examinethe message perceptually, but only statistically.

In order to see what kind of statistical tests candetect the datamasked audio signals, we tested themwith a number of existing audio steganalysis tools[9]. Table 1 summarizes the performance of somesteganalysis techniques on 66 datamasked audiostreams of total duration 29 min. It can be observedthat all of the detectors trained with stego objects ofknown steganographic techniques have a low detection

Page 7: Data Masking: A New Approach for Steganography?isis.poly.edu/~steganography/pubs/vlsi04.pdfData Masking: A New Approach for Steganography? 295 Figure 2. Audio datamasking using spectral

Data Masking: A New Approach for Steganography? 299

Table 1. Detection performance of classifiers trained with stegoaudio files of specific embedding techniques with embedding capac-ity of 6.03bits per audio sample; [A]: Number of actual datamaskedaudio streams; [B]: Number of audio streams detected by the ste-ganalyzer; [C]: Number of false alarms; Precision: ([B]−[C])

[B] ; Recall:([B]−[C])

[A] .

[A] [B] [C]Precision

(%)Recall

(%)

DSSS 66 100 46 54.0 81.82

FHSSS 66 38 12 68.42 39.39

Echo 66 36 7 80.56 43.94

DctWHas 66 20 9 55 16.67

Steganos 66 17 4 76.47 25.76

S-tools 66 54 15 72.22 59.09

rate for the datamasked audio streams. This suggeststhat the artifacts introduced to the cover audio signalby the datamasking process has a different signaturethan that introduced by existing steganographictechniques. Hence, the classifiers trained with stegoaudio files of specific embedding techniques were lesssuccessful with a dataset consisting datamasked audiofiles.

3.2. Results on Image Datamasking

A reference image was chosen and a Huffman code-book was designed for the prediction error PDF. Thereference image’s gray scale values were re-mapped

to a smaller range so that the modified pixel’s valueis still within [0 255]. Figure 9 shows the originalreference image and the PDF of the prediction error.We used a threshold of 50 on the absolute value ofprediction error and hence there were 101 huffmancodewords to map the encrypted stream to predictionerrors. Figure 10 shows the datamasked image and itsprediction error PDF.

The embedding capacity of this datamasking schemefor the chosen image was found to be 5.47 bits per byteof image stream. Figure 11 shows the tradeoff betweenembedding capacity and quality of the datamasked im-age for two different values of M.

For all of the chosen M values, the embedding ca-pacity is high compared to many of the multimediasteganographic schemes. With such a high embeddingcapacity, would the datamasked image escape statisti-cal tests performed by existing steganalyzers?

This motivated us to test a number of datamaskedimages with existing steganalyzers for known stegano-graphic techniques. Tables 1 and 2 present the detec-tion performance on two sets of datamasked images ofa linear classifier trained with stego images of specificembedding techniques. Dataset 1 contains 100 data-masked images with embedding capacity of 4.5 bpp& their corresponding 100 original images. Dataset 2contains 71 datamasked images with the same embed-ding capacity & their corresponding original images.The original images in the Dataset 2 were chosen to bealready noisy images.

Figure 9. Original reference image and its prediction error histogram.

Page 8: Data Masking: A New Approach for Steganography?isis.poly.edu/~steganography/pubs/vlsi04.pdfData Masking: A New Approach for Steganography? 295 Figure 2. Audio datamasking using spectral

300 Radhakrishnan, Kharrazi and Memon

Figure 10. Datamasked image and its prediction error histogram.

Figure 11. Datamasked images with M = 25 and M = 15 with corresponding embedding capacities of 4.56 & 3.65 bpp.

The results from tables 1 and 2 show that mostof the steganalyzers have a low detection rate forboth datasets. Also, the false alarm rate is consistentlyhigher for dataset 2 compared to dataset 1. Since theimages in dataset 2 were already noisy before embed-ding, the detectors found it difficult to differentiate be-tween the noise introduced by the embedding processand the noise already present, thereby increasing thefalse alarm rate. Since the choice of the cover imagefor steganography is upto the communicating parties,

the noisy images like those in dataset 2 would be moredesirable for datamasking.

In order to see the effect of embedding capacity onthese two classifiers, a similar experiment was per-formed on the same datasets but with a lower embed-ding capacity of 2.8 bpp. Tables 3 and 7 present theresults for the testing dataset 1 with SVM classifierswith two different embedding capacities.

Tables 4 and 8 present the results of SVM classifierson dataset 2 with two different embedding capacities.

Page 9: Data Masking: A New Approach for Steganography?isis.poly.edu/~steganography/pubs/vlsi04.pdfData Masking: A New Approach for Steganography? 295 Figure 2. Audio datamasking using spectral

Data Masking: A New Approach for Steganography? 301

Table 2. Top Table: Detection performance of linear classifierstrained with stego images of specific embedding techniques usingBinary Similarity Metric (BSM) as features for Dataset 1 with em-bedding capacity of 4.5 bpp; [A]: Number of actual datamaskedimage streams; [B]: Number of image streams detected by the ste-ganalyzer; [C]: Number of false alarms; Precision: ([B]−[C])

[B] ; Recall:([B]−[C])

[A] .

[A] [B] [C]Precision

(%)Recall

(%)

F5r12 100 111 28 74.77 83.0

F5r11 100 49 15 69.38 34.0

Out− 100 164 64 60.97 100.0

Out+ 100 29 29 0.0 0.0

Lsb 100 52 52 0.0 0.0

Table 3. Detection performance of linear classifiers trained withstego images of specific embedding techniques using Binary Similar-ity Metric(BSM) as features for Dataset 2 with embedding capacityof 4.5 bpp; [A]: Number of actual datamasked image streams; [B]:Number of image streams detected by the steganalyzer; [C]: Numberof false alarms; Precision: ([B]−[C])

[B] ; Recall: ([B]−[C])[A] .

[A] [B] [C]Precision

(%)Recall

(%)

F5r12 71 89 28 68.54 85.92

F5r11 71 56 20 64.29 50.7

Out− 71 111 40 63.96 100.0

Out+ 71 43 43 0.0 0.0

Lsb 71 48 48 0.0 0.0

Table 5 presents the results of a linear classifier ondataset 1 with embedding capacity of 2.8 bpp. Comparethis with Table 1 which presents the detection resultsfor the same classifier and dataset but with higher em-bedding capacity of 4.5 bpp.

Table 6 presents the results of a linear classifier ondataset 2 with embedding capacity of 2.8 bpp. Comparethis with Table 2 which presents the detection resultsfor the same classifier and dataset but with higher em-bedding capacity of 4.5 bpp.

From all the experiments we consistently observethat, the detection rate of classifiers decreases as onedecreases the embedding capacity of datamaskingalgorithm. Also, the reduction in detection rate wasonly marginal.

While these experiments were performed with ste-ganalyzers trained with stego images of specific em-bedding techniques, we also performed an experimentwith a generic steganalyzer trained with stego im-

Table 4. Detection performance of SVM classifiers trained withstego images of specific embedding techniques using Binary Similar-ity Metric(BSM) as features for Dataset 1 with embedding capacityof 4.5 bpp; [A]: Number of actual datamasked image streams; [B]:Number of image streams detected by the steganalyzer; [C]: Numberof false alarms; Precision: ([B]−[C])

[B] ; Recall: ([B]−[C])[A] .

[A] [B] [C]Precision

(%)Recall

(%)

F5r12 100 23 23 0.0 0.0

F5r11 100 66 20 69.69 46.0

Out− 100 30 25 16.66 5.0

Out+ 100 21 20 4.76 1.0

Lsb 100 121 89 26.44 32

Table 5. Detection performance of SVM classifiers trained withstego images of specific embedding techniques using Binary Similar-ity Metric(BSM) as features for Dataset 1 with embedding capacityof 2.8 bpp; [A]: Number of actual datamasked image streams; [B]:Number of image streams detected by the steganalyzer; [C]: Numberof false alarms; Precision: ([B]−[C])

[B] ; Recall: ([B]−[C])[A] .

[A] [B] [C]Precision

(%)Recall

(%)

F5r12 100 23 23 0.0 0.0

F5r11 100 58 20 65.52 38.0

Out− 100 29 25 13.79 4.0

Out+ 100 20 20 0.0 0.0

Lsb 100 106 89 16.04 17.0

Table 6. Detection performance of SVM classifiers trained withstego images of specific embedding techniques using Binary Similar-ity Metric(BSM) as features for Dataset 2 with embedding capacityof 4.5 bpp; [A]: Number of actual datamasked image streams; [B]:Number of image streams detected by the steganalyzer; [C]: Numberof false alarms; Precision: ([B]−[C])

[B] ; Recall ([B]−[C])[A] .

[A] [B] [C]Precision

(%)Recall

(%)

F5r12 71 15 14 6.67 1.41

F5r11 71 13 9 30.77 5.63

Out− 71 23 18 21.74 7.04

Out+ 71 6 6 0.0 0.0

Lsb 71 75 66 12.00 12.68

ages of different embedding schemes. The detectionperformance of the generic steganalyzer on the sameset of datamasked images was found to be 2.81%at 4.5 bpp and 1.31% at 2.8 bpp. Also, the em-bedded message length estimate using RS steganal-

Page 10: Data Masking: A New Approach for Steganography?isis.poly.edu/~steganography/pubs/vlsi04.pdfData Masking: A New Approach for Steganography? 295 Figure 2. Audio datamasking using spectral

302 Radhakrishnan, Kharrazi and Memon

Table 7. Detection performance of SVM classifiers trained withstego images of specific embedding techniques using Binary Similar-ity Metric(BSM) as features for Dataset 2 with embedding capacityof 2.8 bpp; [A]: Number of actual datamasked image streams; [B]:Number of image streams detected by the steganalyzer; [C]: Numberof false alarms; Precision: ([B]−[C])

[B] ; Recall ([B]−[C])[A] .

[A] [B] [C]Precision

(%)Recall

(%)

F5r12 71 14 14 0.0 0.0

F5r11 71 11 9 18.18 5.63

Out− 71 22 18 18.18 5.63

Out+ 71 6 6 0.0 0.0

Lsb 71 83 66 20.48 23.94

Table 8. Detection performance of linear classifiers trained withstego images of specific embedding techniques using Binary Similar-ity Metric(BSM) as features for Dataset 1 with embedding capacityof 2.8 bpp; [A]: Number of actual datamasked image streams; [B]:Number of image streams detected by the steganalyzer; [C]: Numberof false alarms; Precision: ([B]−[C])

[B] ; Recall ([B]−[C])[A] .

[A] [B] [C]Precision

(%)Recall

(%)

F5r12 100 109 28 74.31 81.0

F5r11 100 53 15 71.7 38.0

Out− 100 164 64 60.97 100.0

Out+ 100 29 29 0.0 0.0

Lsb 100 52 52 0.0 0.0

Table 9. Detection performance of linear classifiers trained withstego images of specific embedding techniques using Binary Similar-ity Metric(BSM) as features for Dataset 2 with embedding capacityof 2.8 bpp; [A]: Number of actual datamasked image streams; [B]:Number of image streams detected by the steganalyzer; [C]: Numberof false alarms; Precision: ([B]−[C])

[B] ; Recall ([B]−[C])[A] .

[A] [B] [C]Precision

(%)Recall

(%)

F5r12 71 91 28 69.23 88.71

F5r11 71 44 20 54.55 33.80

Out− 71 114 40 62.28 100.0

Out+ 71 43 43 0.0 0.0

Lsb 71 48 48 0.0 0.0

ysis was only 25% of the actual embedded messagelength. All of these experiments suggests that thep-roposed datamasking scheme has a different “signa-ture” from that of existing steganographic schemes.Hence, one needs to train a new steganalyzer with data-

masked images to learn the statistics of the datamask-ing scheme. In order to verify that we also trained asteganalyzer using datamasked images and have foundthat both linear & SVM classifiers have a precisionof above 87% while maintaining a recall rate above97%.

4. Conclusions

In this paper, we proposed a novel solution to removerandomness from cipher streams in a reversible man-ner. This would make difficult for an eavesdropperto distinguish encrypted streams from other networkstreams, thereby, providing covertness to secure chan-nels. We have proposed schemes to generate audiostreams and image streams from encrypted streams.Since perceptual tests are not feasible with such largevolumes of data, we relax the requirement for per-ceptual transparency to increase the steganographicstreams. However, we maintain certain statistical prop-erties in the datamasking process: the shape of powerspectral density in the case of audio datamasking andthe shape of prediction error PDF in the case of imageof datamasking.

Our experimental results show that the proposeddatamasking schemes have a “different” signature thanexisting steganographic schemes. Even though existingsteganalyzers do not perform well to detect datamaskedstreams, we have also shown that one can train a ste-ganalyzer with datamasked streams to detect them withhigh accuracy. For the existing steganalyzers, ensuringspectral shape and prediction error PDF’s shape wassufficient. However, it remains to be seen if one candevise a framework for steganography which wouldescape any other higher order statistical analysis. Ourexperiments seem to suggest that an embedding mech-anism which induces similar noise characteristics asthe noise that is already present in the image, would behard to be detected by any statistical analysis.

Acknowledgments

We would like to thank Kulesh Shanmugasundaram(CIS department, Polytechnic University, Brooklyn,NY) for many helpful discussions on data masking andnetwork security. We are also grateful to Hamza Ozer(National Research Institute of Electronics and Cryp-tology, Marmara Research Center, Gebze, Turkey) for

Page 11: Data Masking: A New Approach for Steganography?isis.poly.edu/~steganography/pubs/vlsi04.pdfData Masking: A New Approach for Steganography? 295 Figure 2. Audio datamasking using spectral

Data Masking: A New Approach for Steganography? 303

helping in evaluating datamasked streams with the au-dio steganalyzers.

References

1. G.J Simmons, Prisoner’s Problem and the Subliminal Channel(The), CRYPTO83—Advances in Cryptology, Aug. 1984, pp.51–67.

2. N.F Johnson and S. Katzenbeisser, “A Survey of SteganographicTechniques,” in Information Hiding S. Katzenbeisser and F. Pe-titcoals (Eds.), Artech House, Norwood, MA, 2000, pp. 43–78.

3. N.F. Johnson and S. Jajodia, “Steganalysis of Images CreatedUsing Current Steganography Software,” in InformationHiding, David Aucsmith (Ed.), LNCS 1525, Springer-VerlagBerlin Heidelberg, 1998, pp. 32–47.

4. A. Westfield and A. Pfitzmann, “Attacks on SteganographicSystems,” in Information Hiding, LNCS 1768, Springer-VerlagHeidelberg, 1999, pp. 61–76.

5. J. Fridrich, M. Goljan, and R. Du, “Reliable Detection of LSBSteganography in Color and Grayscale Images,” in Proc. of the

ACM Workshop on Multimedia and Security, Ottawa, CA, Oct.,2001, pp. 27–30.

6. I. Avcibas, N. Memon, and B. Sankur, “Steganalysis UsingImage Quality Metrics,” Security and Watermarking ofMultimedia Contents, SPIE, San Jose, 2001.

7. Advanced Encryption Standard, FIPS 197, 2001.8. ISO/IEC 14495-1, ITU Recommendation T.87, “Information

technology—Lossless and Near-Lossless Compression ofContinuous-Tone Still Images,” 1999.

9. H. Zer, I. Avcibas, B. Sankur, and N. Memon, “Steganalysisof Audio Based on Audio Quality Metrics,” submitted to SPIE2004.

10. Elke Franz et al., Steganography Preserving Statistical Prop-erties, Fifth International Workshop on Information Hiding,2002.

11. S. Lyu and H. Farid, Detecting Hidden Messages UsingHigher-Order Statistics and Support Vector Machines,Fifth International Workshop on Information Hiding,2002.

12. S. Dumitrescu, X. Wu, and Z. Wang, “Detection of LSBSteganography via Sample Pair Analysis,” IEEE Transactionson Signal Processing, 2003, pp. 1995–2007.