• Aucun résultat trouvé

Adaptive Steganography by Oracle (ASO)

N/A
N/A
Protected

Academic year: 2022

Partager "Adaptive Steganography by Oracle (ASO)"

Copied!
1
0
0

Texte intégral

(1)

Adaptive Steganography by Oracle (ASO)

Sarra Kouider, Marc Chaumont, William Puech

LIRMM, UMR CNRS 5506, University of Montpellier II

Sarra.kouider@lirmm.fr, marc.chaumont@lirmm.fr, william.puech@lirmm.fr

IEEE ICME 2013, San Jose, California

[1] T. Pevny, T. Filler, and P. Bas, “Using High-Dimensional Image Models to Perform. Highly Undetectable Stegan- ography,” IH’2012.

[2] J. Kodovsk´y, J.J. Fridrich, and V. Holub, “Ensemble Classifiers for Steganalysis of Digital Media,” IEEE TIFS’2012.

References

*

The goal of steganography is to hide a secret message in an unsuspicious object in such a way that no one can detect it.

The stego image must be visually undetectable and .also statistically.

New concept of embedding based on an Oracle.

The Oracle is trained with the best state of the art algorithm, witch is HUGO [1].

Background

1

ASO Scheme

2

Detectability Map

3

Conclusion

6

5 Results

BossBase v1.00 database with 10000 grayscale images of 512 x 512.

Rich Model SRMQ1 [3] of 12753 features.

The reported performance of each payload is averaged over five random database splits.

Cover image Stego image

Kodovský’s FLD classifiers

« HUGO»

Calculation of the detectability

map

Process of message embedding

cover image stego image

Kodovský’s FLD classifiers

« ASO»

Calculation of the detectability

map

Process of message embedding

cover database stego database

I

II

Adaptive Steganography by Oracle (ASO)

Respectively for ρi(-)

Σ

image

FLD Classifier (F2)

ρ

i(+)

= Σ ρ

i(l)(+)

ρ

i (l)(+)

F = {F

1

,..,F

L

}

ρ

i (l)(+)

ρ

i (l)(+)

+1

FLD Classifier (F1)

FLD Classifier (FL)

FLD Costs

4

For each pixel (±1) : ρ = min (ρ

i(+)

, ρ

i(-)

).

To compute the detectability map we use the

Kodovsky's ensemble classifiers [2] as an oracle.

A new adaptive embedding scheme based an oracle (ASO).

A new paradigm witch is the steganography by database.

The proposed method scales well with dimension.

Future Work

7

Security evaluation with a pooled steganalysis.

Position with game theory aspects.

Références

Documents relatifs

The reason why conflict resolution by FOLLOW set does not work nearly as well as one might wish is that it replaces the look-ahead of single item of rule N in a given LR state

FINANCE: How the moneymen are moving in on Hollywood 40 , SCIENCE: DNAevidenceis upending our knowledge of early humans 42 ARTS:Met simulcasts are bringing live opera to Everyman

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des

We now study the scaling limits of discrete looptrees associated with large conditioned Galton–Watson trees, which is a model similar to the one of Boltzmann dissections: With

9.In 16---, the Pilgrim fathers , the Puritans established the

The adaptive steganographic algorithm by oracle (ASO), that we propose is based on the adaptivity of the embedding by the use of a de- tectability

Since our embedding ASO algorithm allows to obtain a set of stego images instead of just one stego image, we offer to the sender the opportunity to choose the most un- detectable

Motivated by applications in mathematical imaging, asymptotic expansions of the heat generated by single, or well separated, small particles are derived in [5, 7] based on