Steganalysis of JPEG images using rich models



Similar documents
A Feature Selection Methodology for Steganalysis

Color Image Stegananalysis Using Correlations between RGB Channels

Image Authentication Scheme using Digital Signature and Digital Watermarking

Technical Points about Adaptive Steganography by Oracle (ASO)

Subspace Analysis and Optimization for AAM Based Face Alignment

Estimating the Redundancy Factor for RA-encoded sequences and also Studying Steganalysis Performance of YASS

WATERMARKING FOR IMAGE AUTHENTICATION

Going from Small to Large Data in Steganalysis

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

Source Class Identification for DSLR and Compact Cameras

Multimodal Biometric Recognition Security System

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

Classifying Large Data Sets Using SVMs with Hierarchical Clusters. Presented by :Limou Wang

Evaluation of Feature Selection Methods for Predictive Modeling Using Neural Networks in Credits Scoring

The Scientific Data Mining Process

Document Image Retrieval using Signatures as Queries

Security Based Data Transfer and Privacy Storage through Watermark Detection

How To Identify A Churner

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Decision Trees from large Databases: SLIQ

Multi-factor Authentication in Banking Sector

Component Ordering in Independent Component Analysis Based on Data Power

Advanced Ensemble Strategies for Polynomial Models

Soumendu Chakraborty, Anand Singh Jalal* and Charul Bhatnagar

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Linear Threshold Units

II. RELATED WORK. Sentiment Mining

Support Vector Machines for Dynamic Biometric Handwriting Classification

Circle Object Recognition Based on Monocular Vision for Home Security Robot

A Novel Cryptographic Key Generation Method Using Image Features

Clustering & Visualization

SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp

A Study Of Bagging And Boosting Approaches To Develop Meta-Classifier

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data

Some Publications and Patents on Data Hiding, Steganalysis, Forensics and Security Yun Q. Shi 25 December, 2008

Blind Deconvolution of Barcodes via Dictionary Analysis and Wiener Filter of Barcode Subsections

Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services

Machine Learning for Medical Image Analysis. A. Criminisi & the InnerEye MSRC

Random forest algorithm in big data environment

Object Recognition and Template Matching

International ejournals

Triple Security of Information Using Stegnography and Cryptography

Data Mining Practical Machine Learning Tools and Techniques

Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

diagnosis through Random

Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability

Extend Table Lens for High-Dimensional Data Visualization and Classification Mining

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Module 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur

Tracking Groups of Pedestrians in Video Sequences

AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION

Combating Anti-forensics of Jpeg Compression

CROP CLASSIFICATION WITH HYPERSPECTRAL DATA OF THE HYMAP SENSOR USING DIFFERENT FEATURE EXTRACTION TECHNIQUES

Feature vs. Classifier Fusion for Predictive Data Mining a Case Study in Pesticide Classification

Social Media Mining. Data Mining Essentials

Determining optimal window size for texture feature extraction methods

Multi-class Classification: A Coding Based Space Partitioning

Tracking in flussi video 3D. Ing. Samuele Salti

Class #6: Non-linear classification. ML4Bio 2012 February 17 th, 2012 Quaid Morris

A Lightweight and Effective Music Score Recognition on Mobile Phone

On the Effectiveness of Obfuscation Techniques in Online Social Networks

Stegosaurus Development Report

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE.

Euler Vector: A Combinatorial Signature for Gray-Tone Images

Methodology for Emulating Self Organizing Maps for Visualization of Large Datasets

Analecta Vol. 8, No. 2 ISSN

How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm

Face Model Fitting on Low Resolution Images

Iris Sample Data Set. Basic Visualization Techniques: Charts, Graphs and Maps. Summary Statistics. Frequency and Mode

Efficient Attendance Management: A Face Recognition Approach

An Iterative Image Registration Technique with an Application to Stereo Vision

A Web-based Interactive Data Visualization System for Outlier Subspace Analysis

A Concept of Digital Picture Envelope for Internet Communication

D-optimal plans in observational studies

Safer data transmission using Steganography

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet

Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Data Mining - Evaluation of Classifiers

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION

Neural Network based Vehicle Classification for Intelligent Traffic Control

Emotion Detection from Speech

A General Approach to Incorporate Data Quality Matrices into Data Mining Algorithms

Supervised Learning (Big Data Analytics)

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

Modeling the Print-Scan Process for Resilient Data Hiding

A Simple Feature Extraction Technique of a Pattern By Hopfield Network

Relative Permeability Measurement in Rock Fractures

Transcription:

Jan Kodovský, Jessica ridrich January 23, 2012 / PIE 1 / 14

Two building blocks eature based steganalysis eature space representation of digital images Binary classifier trained on examples of cover and stego features eature space (image model) tatistical descriptor of images (or their noise component) Captures dependencies among image coefficients ensitive to stego-modifications, insensitive to image content Classifier Any machine learning tool can be used (LD, LR, VM, NN) The choice of the classifier (shapes of decision boundaries, training complexity) and available computing resources inherently influence the feature space design 2 / 14

Current trends in steganalysis Modern steganography requires more complex feature spaces 18 BM [Avcıbaş,2002], 72 higher order moments [arid,2002] 23 DCT [ridrich,2004] 274 PEV [Pevný,2007] 548 CC-PEV 324 [hi,2006] 486 [Chen,2008] Markov based features 686 PAM [Pevný,2010] 1234 CD = PAM + CC-PEV trategies for model enrichment Merge existing feature sets together Add reference values, include more statistics increasing dimensionality Machine learning needs to adapt Machine learning should not constrain feature space design VM accurate, but infeasible in high dimensions Ensemble classifier [2011] scalable w.r.t. dimensionality and the number of training samples 3 / 14

How to build features in JPEG domain (Without dimensionality constraints) JPEG domain specifics 8 8 blocks of coefficients in different DCT modes 64 parallel channels of different statistical properties Two types of dependencies: frequency and spatial (intra/inter block) Model building guidelines Capture as many dependencies as possible, proceed systematically Learn from previously proposed feature spaces, e.g. co-occurrences Model individual DCT modes separately large number of submodels Keep submodels well populated utilize natural symmetries, small T Include also integral components sum over the image, larger T Inspiration from spatial domain BO competition Diversity, diversity, diversity Rich Model 4 / 14

JPEG domain Rich Model (JRM) 1. The first DCT mode specific model Absolute values of DCT coefficients elected DCT mode: (1,2) Horizontal neighbor 2D co-occurrence matrix Truncate with T = 3 Dimension = (T+1) 2 = 16 1 2 3 4 5 6 1 2 3 4 5 6 7 8 DCT plane 7 2. Cover low-frequencies 3. Extend to other intra-block neighbors 1 2 3 4 5 6 7 8 8 1 2 3 4 5 6 7 95 submodels 5 / 14

JPEG domain Rich Model (JRM) 4. Keep scaling up the rich model Add inter-block neighbors (horizontal, vertical, diagonal) 157 submodels Repeat everything for differences of DCT coefficients 628 submodels Horizontal, vertical, and diagonal intra-block differences Horizontal and vertical inter-block differences Add integral features (T = 5) 673 submodels Both inter- and intra-block co-occurrences rom both absolute values and differences JRM (11,255) 5. Apply Cartesian calibration dimension doubles to 22,510 JPEG patial patial Original image IDCT Crop. DCT JPEG Reference image CC-JRM (22,510) Calibrated feature = [f( ˆX), f(x)] 6 / 14

Ensemble classifier overview Designed to be scalable w.r.t. feature space dimensionality Built as a fusion of many weak classifiers (base learners) built on random subspaces of the original feature space pecific implementation choices: Base learner = isher Linear Discriminant (LD) usion = majority voting scheme idecision(i) > threshold All parameters automatically optimized on the training set Relationship to prior art: [Breiman-2001] Random forests ast, comparable accuracy to VMs Detailed description appears in [PIE, 2011], [TI, 2012] http://dde.binghamton.edu/download/ensemble 7 / 14

Comparison to prior art Experimental setup 6,500 images coming from 22 cameras, resized, JPEG 75 Ensemble classifier, average testing error over 10 splits teganographic methods ns5 non-shrinkage version of 5 [Westfeld, 2001] MB model based steganography [allee, 2003] YA yet another steganographic scheme [olanki, 2007] MME modified matrix encoding [Kim, 2006] BCH utilizes structured BCH syndrome coding [achnev,2009] BCHopt BCH with heuristic optimization [achnev, 2009] 8 / 14

Comparison to prior art eature sets CHEN (486) Markov features, intra- & inter-block [Chen, 2008] CC-CHEN (972) CHEN features improved by Cartesian calibration LIU (216) differences of abs. values, different calibrations [Liu, 2011] CC-PEV (548) Cartesian calibrated PEV features [Pevný, 2007] CD (1,234) CC-PEV expanded by PAM features [Pevný, 2009] CC-C300 (48,600) driven by mutual information [Kodovský, 2011] C* (7,850) compact rich model [Kodovský, 2012] JRM (11,255) JPEG domain Rich Model CC-JRM (22,510) Cartesian calibrated JRM J+RM (35,263) CC-JRM + patial domain Rich Model [under review] http://dde.binghamton.edu/download/feature_extractors 9 / 14

Algorithm bpac Comparison to prior art new models LIU CHEN CC-PEV CC-CHEN CD C* JRM CC-JRM J+RM CC-C300 (216) (486) (548) (972) (1,234) (7,850) (11,255) (22,510) (35,263) (48,600) ns5 0.10.1732.3097.2239.2470.2020.1737.1782.1616.1375.2207 0.15.0706.2094.1171.1393.0906.0720.0793.0663.0468.1127 MB 0.01.3826.4070.3876.3962.3786.3710.3478.3414.3260.4038 0.05.0812.1243.0833.0946.0704.0684.0427.0373.0282.1176 YA 0.16.1793.2334.1341.1476.0507.0164.0210.0103.0054.0370 0.19.1301.1277.0723.0876.0224.0146.0165.0081.0045.0350 MME.10.2574.3001.2613.2611.2501.2466.2286.2091.1891.3026.15.1677.2165.1721.1735.1586.1608.1404.1221.1027.2299 BCH 0.20.3087.3594.2974.3124.2752.2629.2707.2369.1946.2958 0.30.0862.1383.0779.0889.0697.0663.0715.0536.0390.0912 BCHopt 0.20.3583.4032.3548.3712.3368.3265.3253.3030.2582.3517 0.30.1719.2400.1605.1711.1356.1289.1389.1102.0830.1681 High dimension is not sufficient teganalysis benefits from cross-domain models Cartesian calibration helps even in high dimensions Diverse and compact rich models deliver best results 10 / 14

Comparison of stego methods Testing error 0.50 0.45 0.40 0.35 0.30 0.25 ns5 MME BCHopt 0.20 BCH 0.15 0.10 MB 0.05 YA 0 0 0.05 0.10 0.15 0.20 0.25 0.30 Payload (bpac) J+RM (35,263) MB and YA are by far the least secure ide-informed schemes (MME, BCH, BCHopt) perform better Jumps in MME due to its suboptimal coding 11 / 14

Experiment 1 systematic merging BCHopt 0.30 bpac Testing error 0.22 0.20 0.18 0.16 0.14 0.12 0.10 abs inter intra CC-JRM 0 5,000 10,000 15,000 20,000 absolute values horiz. differences diag. differences inter-block differences integral features... frequency neighbors... spatial neighbors cale of dimensionality 10 4 Width of each bar is proportional to the model dimensionality Reveals what types of features are effective against a given scheme 12 / 14

Experiment 1 systematic merging MME 0.10 bpac Testing error 0.35 0.30 0.25 abs intra inter absolute values horiz. differences diag. differences inter-block differences integral features 0.20 CC-JRM 0 5,000 10,000 15,000 20,000 cale of dimensionality 10 4... frequency neighbors... spatial neighbors Width of each bar is proportional to the model dimensionality Reveals what types of features are effective against a given scheme 12 / 14

Experiment 1 systematic merging Testing error 0.40 0.35 0.30 0.25 0.20 0.15 ns5 0.10 bpac abs intra inter CC-JRM 0 5,000 10,000 15,000 20,000 absolute values horiz. differences diag. differences inter-block differences integral features... frequency neighbors... spatial neighbors cale of dimensionality 10 4 Width of each bar is proportional to the model dimensionality Reveals what types of features are effective against a given scheme 12 / 14

Experiment 2 forward feature selection Estimate of testing error 0.30 0.28 0.26 0.24 0.22 0.20 0.18 0.16 1 2 ns5 0.10 bpac 3 4 5 6 7 8 9 10 CC-JRM 0.14 0 0.5 1.0 1.5 2.0 2.5 22.51 Dimensionality ( 10 3 ) 1. (abs. values) 2. (integral) 3. (abs. values) reference 4. (integral) 5. (differences) 6. (abs. values) 7. (differences) reference... frequency neighbors... spatial neighbors Greedy minimization of the testing error estimate (2 51 submodels) Add the submodel that best complements those already selected Red corresponds to reference submodels from Cartesian calibration 13 / 14

Experiment 2 forward feature selection MME 0.10 bpac Estimate of testing error 0.34 1 0.32 0.30 2 0.28 0.26 3 4 0.24 5 6 7 0.22 8 9 CC-JRM 10 0.20 0 0.5 1.0 1.5 2.0 2.5 22.51 Dimensionality ( 10 3 ) 1. (integral) 2. (integral) 3. (abs. values) reference 4. (differences) 5. (differences) reference 6. (integral) 7. (itnegral)... frequency neighbors... spatial neighbors Greedy minimization of the testing error estimate (2 51 submodels) Add the submodel that best complements those already selected Red corresponds to reference submodels from Cartesian calibration 13 / 14

ummary Conclusion teganalysis using rich models and scalable machine learning improves previous approaches CC-JRM is universally effective rich model for JPEG domain or a fixed steganographic channel, dimensionality of CC-JRM can be drastically reduced Merging with patial Rich Model further improves steganalysis Calibration helps even in high-dimensional spaces Open problems Bottleneck of steganalysis becomes feature extraction Robustness of rich models w.r.t. cover source mismatch Resources Ensemble: http://dde.binghamton.edu/download/ensemble eatures: http://dde.binghamton.edu/download/feature_extractors 14 / 14

References İ. Avcıbaş, N. D. Memon and B. ankur. Image steganalysis with binary similarity measures. Proc. IEEE, International Conference on Image Processing, ICIP volume 3, pages 645 648, Rochester, NY, eptember 22 25, 2002. L. Breiman. Random forests. Machine Learning, 45:5 32, October 2001. C. Chen and Y. Q. hi. JPEG image steganalysis utilizing both intrablock and interblock correlations. Circuits and ystems, ICA, IEEE International ymposium on, pages 3029 3032, May 2008. H. arid and L. iwei. Detecting hidden messages using higher-order statistics and support vector machines. Information Hiding, 5th International Workshop, volume 2578 of LNC, pages 340 354, Noordwijkerhout, The Netherlands, October 7 9, 2002. pringer-verlag, New York. J. ridrich. eature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Information Hiding, 6th International Workshop, volume 3200 of LNC, pages 67 81, Toronto, Canada, May 23 25, 2004. pringer-verlag, New York. Y. Kim, Z. Duric, and D. Richards. Modified matrix encoding technique for minimal distortion steganography. Information Hiding, 8th International Workshop, volume 4437 of LNC, pages 314 327, Alexandria, VA, July 10 12, 2006. pringer-verlag, New York. J. Kodovský, J. ridrich, and V. Holub. Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information orensics and ecurity, 2012. To appear. J. Kodovský and J. ridrich.. Proc. PIE, Electronic Imaging, Media Watermarking, ecurity, and orensics of Multimedia XIV, an rancisco, CA, January 22 26, 2012. J. Kodovský and J. ridrich. teganalysis in high dimensions: using classifiers built on random subspaces. Proc. PIE, Electronic Imaging, Media Watermarking, ecurity and orensics of Multimedia XIII, volume 7880, pages OL 1 13, an rancisco, CA, January 23 26, 2011. Q. Liu. teganalysis of DCT-embedding based adaptive steganography and YA. Proc. of the 13th ACM Multimedia & ecurity Workshop, pages 77 86, Niagara alls, NY, eptember 29 30, 2011. T. Pevný and J. ridrich. Merging Markov and DCT features for multi-class JPEG steganalysis. Proc. PIE, Electronic Imaging, ecurity, teganography, and Watermarking of Multimedia Contents IX, volume 6505, pages 3 1 3 14, an Jose, CA, January 29 ebruary 1, 2007. 14 / 14

References T. Pevný, P. Bas, and J. ridrich. teganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information orensics and ecurity, 5(2):215 224, June 2010. V. achnev, H. J. Kim, and R. Zhang. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. Proc. of the 11th ACM Multimedia & ecurity Workshop, pages 131 140, Princeton, NJ, eptember 7 8, 2009. P. allee. Model-based steganography. Digital Watermarking, 2nd International Workshop, volume 2939 of LNC, pages 154 167, eoul, Korea, October 20 22, 2003. pringer-verlag, New York. Y. Q. hi, C. Chen, and W. Chen. A Markov process based approach to effective attacking JPEG steganography. Information Hiding, 8th International Workshop, volume 4437 of LNC, pages 249 264, Alexandria, VA, July 10 12, 2006. pringer-verlag, New York. K. olanki, A. arkar, and B.. Manjunath. YA: Yet another steganographic scheme that resists blind steganalysis. Information Hiding, 9th International Workshop, volume 4567 of LNC, pages 16 31, aint Malo, rance, June 11 13, 2007. pringer-verlag, New York. A. Westfeld. High capacity despite better steganalysis (5 a steganographic algorithm). Information Hiding, 4th International Workshop, volume 2137 of LNC, pages 289 302, Pittsburgh, PA, April 25 27, 2001. pringer-verlag, New York. 14 / 14