Top Banner
Steganography and Block-based Quantitative Steganalysis Haiqiang Wang Advisor: C.-C. Jay Kuo Viterbi School of Engineering, USC 07/26/2014 Haiqiang Wang Steganography and Steganalysis 1 / 38
38

Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Apr 26, 2018

Download

Documents

hoangcong
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Steganography and Block-based Quantitative Steganalysis

Haiqiang Wang

Advisor: C.-C. Jay Kuo

Viterbi School of Engineering, USC

07/26/2014

Haiqiang Wang Steganography and Steganalysis 1 / 38

Page 2: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Outline

1 IntroductionDefinitionInformation Hiding

2 Research on steganographyTransform domainSpatial domain

3 Research on SteganalysisMachine Learning ApproachCurse of Dimensionality

4 Block-based Quantitative SteganalysisWhy block-basedBlock-based steganalysis approach

Haiqiang Wang Steganography and Steganalysis 2 / 38

Page 3: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Introduction Definition

What are steganography and steganalysis?

DefinitionSteganography is the art of communicating in a way which hides theexistence of the communication.

Steganalysis is the science to detect, or estimate the hidden data fromobserved data with little knowledge about steganography algorithm.

Figure 1: Communication with invisible ink

Haiqiang Wang Steganography and Steganalysis 3 / 38

Page 4: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Introduction Definition

Framework of Steganography and Steganalysis

Figure 2: Components of the steganographic channel

Cover X: input image; Stego Y: output image

Payload p: relative message length (bpp: bit per pixel)

HOLUB, V. CONTENT ADAPTIVE STEGANOGRAPHY?DESIGN AND DETECTION. Diss. State University of New York, 2014.

Haiqiang Wang Steganography and Steganalysis 4 / 38

Page 5: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Introduction Information Hiding

Common information hiding techniques

Figure 3: Information hiding classification

V. Nagaraj., et al. "Overview of Digital Steganography Methods and Its Applications." IJAST 60 (2013): 45-58.

Haiqiang Wang Steganography and Steganalysis 5 / 38

Page 6: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Introduction Information Hiding

Examples of Watermarking

Figure 4: Watermarking used in documentation

Haiqiang Wang Steganography and Steganalysis 6 / 38

Page 7: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Introduction Information Hiding

Examples of Watermarking

Figure 5: Perceptible and Imperceptible Watermarking used in video

Haiqiang Wang Steganography and Steganalysis 7 / 38

Page 8: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Introduction Information Hiding

Example of Steganography

Figure 6: Steganography using UNIWARD

Haiqiang Wang Steganography and Steganalysis 8 / 38

Page 9: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Introduction Information Hiding

Comparison with Watermarking

Table 1: Comparison of Watermarking and Steganography

Watermarking SteganographyGoal copyright protection covert communication

Information host or owner any kind of informationPerceptible either visible or imperceptible statistically undetectable

Receiver point-to-multiple points point-to-pointCapacity not important important

Robustness important not necessary

Haiqiang Wang Steganography and Steganalysis 9 / 38

Page 10: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Introduction Information Hiding

Why we study Steganography and Steganalysis?

Used in military purpose, intelligence services, or by terrorists via publicaccess channelIn October 2001, An article from the New York Times claims theterrorists use covert communication to prepare and execute the 11September 2001 terrorist attack

Figure 7: Publications number

Haiqiang Wang Steganography and Steganalysis 10 / 38

Page 11: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Research on steganography Transform domain

How to embed information while minimizing distortion?

Transform domain (wavelet, DCT) and spatial domainJP Hide&Seek, Jsteg, MBS1, MMX, nsF5, OutGuess and PerturbedQuantization (PQ)LSB, HUGO, WOW and UNIWARD

Brute-force embedding and empirical embeddingContent adaptive spatial domain embedding performs better

Typical algorithms (PQ, LSB) and state-of-the-art (UNIWARD).

Pevny, T., et al."From blind to quantitative steganalysis." SPIE Electronic Imaging. 2009.

Haiqiang Wang Steganography and Steganalysis 11 / 38

Page 12: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Research on steganography Transform domain

Perturbed Quantization in DCT domain

Think of EE 669 homework 2 (JPEG cpmpression)

8 ∗ 8 image blocks, shifted by −128, two-dimensional DCT, divided byquantization matrix, round to nearest decimal and entropy coding

Fractional part is around 0.5, either round up or down

Disadvantage: change the pixel value more than 1

Figure 8: Key idea of Perturbed Quantization

Fridrich, Jessica., et al."Perturbed quantization steganography." Multimedia Systems 11.2 (2005): 98-107.

Haiqiang Wang Steganography and Steganalysis 12 / 38

Page 13: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Research on steganography Spatial domain

Least Significant Bit Replacement

Figure 9: LSB replacement embedding

Ker, Andrew D. "Steganalysis of embedding in two least-significant bits." ITIFS on 2.1 (2007): 46-54.

Haiqiang Wang Steganography and Steganalysis 13 / 38

Page 14: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Research on steganography Spatial domain

Weakness of LSB

Figure 10: Embedding changes statistics

Haiqiang Wang Steganography and Steganalysis 14 / 38

Page 15: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Research on steganography Spatial domain

UNIWARD–UNIversal WAvelet Relative Distortion

Minimize a well defined embedding distortion functionEmbedding in noisy regions, complex texture and avoid smooth regions

Figure 11: Steganography using UNIWARD

Denemark, Tomas, et al. "Further Study on the Security of S-UNIWARD." SPIE Electronic Imaging. International Society for Opticsand Photonics, 2014.

Haiqiang Wang Steganography and Steganalysis 15 / 38

Page 16: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Research on steganography Spatial domain

Filter banks

β = {K(1),K(2),K(3)} to evaluate smoothness in multiple directions

K(1) = h · gT ,K(2) = g · hT ,K(3) = g · gT

Figure 12: low-pass and high-pass filter

Haiqiang Wang Steganography and Steganalysis 16 / 38

Page 17: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Research on steganography Spatial domain

Wavelet decomposition

Directional residuals is the convolution between the filter and image:

Wk = Kk ? X (1)

The distortion of changing one pixel is defined as:

D(X,Y) =

3∑k=1

∑u,v

|Wkuv(X)−Wk

uv(Y)|ε+ |Wk

uv(X)|(2)

kth decomposition, Wkuv is the uvth wavelet coefficient

For each filter, compute the relative wavelet coefficient change w.r.t. thecover image

Haiqiang Wang Steganography and Steganalysis 17 / 38

Page 18: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Research on steganography Spatial domain

Embedding cost function

The additive approximation (with subscript "A") of distortion function is:

DA(X,Y) =

n1∑i=1

n2∑j=1

ρij(X,Yij)[Xij 6= Yij] (3)

ρij(X,Yij) is the distortion of changing ijth pixel:

ρij(X,Yij) = D(X,Yij) (4)

Haiqiang Wang Steganography and Steganalysis 18 / 38

Page 19: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Research on steganography Spatial domain

Embedding cost

Figure 13: Cover image and embedding distortion

Haiqiang Wang Steganography and Steganalysis 19 / 38

Page 20: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Research on steganography Spatial domain

Why does it work?

D(X,Y) =

3∑k=1

∑u,v

|Wkuv(X)−Wk

uv(Y)|ε+ |Wk

uv(X)|(5)

Pixel in noisy region has large wavelet coefficients, embedding distortionis small

Even one smooth direction |Wkuv(X)| will lead to large embedding

distortion

Selected pixels are hard to model in all directions

Haiqiang Wang Steganography and Steganalysis 20 / 38

Page 21: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Research on steganography Spatial domain

Embedding distribution of UNIWARD

Figure 14: Content adaptivity of UNIWARD

Haiqiang Wang Steganography and Steganalysis 21 / 38

Page 22: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Research on Steganalysis Machine Learning Approach

Two approaches

Statistical signal detectionDerives the detector from statistical modelAttacks specific embedding algorithm and needs sufficient samples

Standard machine learning approachEnsemble classifierSupport Vector Machine (SVM): binary estimationSupport Vector Regression (SVR): quantitative estimation

Ker, Andrew D., et al. "Moving steganography and steganalysis from the laboratory into the real world." Proceedings of the first ACMworkshop on Information hiding and multimedia security. ACM, 2013.

Haiqiang Wang Steganography and Steganalysis 22 / 38

Page 23: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Research on Steganalysis Machine Learning Approach

Ensemble classifier

Lower complexity but can handle large feature set

Also known as bootstrap aggregation or bagging

Figure 15: Diagram of ensemble classifier

HOLUB, V. CONTENT ADAPTIVE STEGANOGRAPHY: DESIGN AND DETECTION. Diss. State University of New York, 2014.

Haiqiang Wang Steganography and Steganalysis 23 / 38

Page 24: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Research on Steganalysis Machine Learning Approach

Support vector regression

Principle: Use regression tools to learn the relationship between featurevector and payload

Assumption: Feature changes predictably with payload

ψ̂ = arg minψ∈F

1L

L∑i=1

e(ψ(xi), yi) (6)

xi = f(ci) ∈ Rd is feature vector computed from image ci embedded withrate yi ∈ [0, 1].

Find a mapping function ψ̂ : Rd 7→ [0, 1] that minimizes the estimationerror

Pevny, T., et al."From blind to quantitative steganalysis." SPIE Electronic Imaging. 2009.

Haiqiang Wang Steganography and Steganalysis 24 / 38

Page 25: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Research on Steganalysis Machine Learning Approach

Support vector regression

Figure 16: SVR used in quantitative steganalysis

Haiqiang Wang Steganography and Steganalysis 25 / 38

Page 26: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Research on Steganalysis Curse of Dimensionality

Feature dimension problem

Table 2: Feature for Steganalysis (Spatial domain)

Name Dimension Published Year AuthorSPAM 548 2010 T.Pevny and J. Fridrich

CDF 1234 2010 J. Kodovsky and J. FridrichSRM 34671 2012 J. Fridrich and J. Kodovsky

PSRM 12870 2013 V. Holub and J. FridrichCSR 1183 2014 T. Denemark and J. Fridrich

Haiqiang Wang Steganography and Steganalysis 26 / 38

Page 27: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Block-based Quantitative Steganalysis Why block-based

Why block-based approach

Ideas from video coding, 16*16, 16*8, 8*4, . . .Extremly high dimension feature to handle heterogeneous images

Group homogeneous blocks togetherKnowledge about embedding distribution (ROI)

Noisy region, edge and complex texture and avoid smooth region

Ability to achieve better payload estimation

Haiqiang Wang Steganography and Steganalysis 27 / 38

Page 28: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Block-based Quantitative Steganalysis Why block-based

Region of Interest

(a) ROI at payload = 0.25 (b) Embedding dist. at payload = 0.25

Figure 17: ROI and embedding distribution at big payload

Haiqiang Wang Steganography and Steganalysis 28 / 38

Page 29: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Block-based Quantitative Steganalysis Block-based steganalysis approach

Block-based steganalysis approach

1 Block classification2 Different feature of different block group3 Next: support vector regression4 Future work: adaptive block partition

Haiqiang Wang Steganography and Steganalysis 29 / 38

Page 30: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Block-based Quantitative Steganalysis Block-based steganalysis approach

Block classification

3 block types, smooth, edge and texture

Figure 18: Cover image and embedding distortion

Haiqiang Wang Steganography and Steganalysis 30 / 38

Page 31: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Block-based Quantitative Steganalysis Block-based steganalysis approach

Block classification

Figure 19: Distortion map and classification grid

Haiqiang Wang Steganography and Steganalysis 31 / 38

Page 32: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Block-based Quantitative Steganalysis Block-based steganalysis approach

Feature extraction

1183 CSR feature: Content-selective residual

Figure 20: CSR feature components

Denemark, Tomas, et al. "Further Study on the Security of S-UNIWARD." SPIE Electronic Imaging. International Society for Opticsand Photonics, 2014.

Haiqiang Wang Steganography and Steganalysis 32 / 38

Page 33: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Block-based Quantitative Steganalysis Block-based steganalysis approach

Feature extraction

Residual order and truncation (Th and Tc):

Embedding probability

pij =exp(−λρij)

1 + exp(−λρij)(7)

Haiqiang Wang Steganography and Steganalysis 33 / 38

Page 34: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Block-based Quantitative Steganalysis Block-based steganalysis approach

Feature extraction

Pixel classes: compare pij with two parametersType L: when pij(X, α) > tLType s: when pij(X, α) < ts

Example: 1st 1D histogram2d+1 = 4 pixel classes, [s s], [s L], [L s] and [L L].22 = 4 to 3 in 1st, 23 = 8 to 6 in 2nd, and 24 = 16 to 10 in 3rd

Haiqiang Wang Steganography and Steganalysis 34 / 38

Page 35: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Block-based Quantitative Steganalysis Block-based steganalysis approach

Feature reduction

Too large feature for 32*32 blocks

Figure 21: CSR feature of smooth, edge and texture blocks

Haiqiang Wang Steganography and Steganalysis 35 / 38

Page 36: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Block-based Quantitative Steganalysis Block-based steganalysis approach

Feature reduction

PCA to reduce each feature subset

ANOVA to select feature set for each blocks

Figure 22: Reduced feature dimension with PCA

Haiqiang Wang Steganography and Steganalysis 36 / 38

Page 37: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Future work

Future work

Quantitative Steganalysis using SVR

Adaptive block partition

Haiqiang Wang Steganography and Steganalysis 37 / 38

Page 38: Steganography and Block-based Quantitative Steganalysismcl.usc.edu/wp-content/uploads/2014/07/seminar_slide.pdf · Introduction Definition What are steganography and steganalysis?

Future work

Thanks

Haiqiang Wang Steganography and Steganalysis 38 / 38