• Aucun résultat trouvé

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

N/A
N/A
Protected

Academic year: 2022

Partager "Pooled steganalysis in JPEG: how to deal with the spreading strategy?"

Copied!
26
0
0

Texte intégral

(1)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Pooled steganalysis in JPEG:

how to deal with the spreading strategy?

Ahmad ZAKARIA1,2, Marc CHAUMONT1,4, G´erard SUBSOL1,3 LIRMM1, Univ Montpellier2, CNRS3, Univ Nˆımes4, Montpellier,

France

December 11, 2019

WIFS’2019, IEEE International Workshop on Information Forensics and Security, December 9-12, 2019, Delft, The Netherlands.

(2)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Introduction

Outline

Introduction

Pooled steganalysis architecture Experimental protocol

Results

Conclusions and perspectives

(3)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Introduction

Steganography / Steganalysis

(4)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Introduction

Batch steganography / Pooled steganalysis

Alice

Embedding

Bob

Bag of cover images

Bag of cover/stego

images

Spreading Strategy

S Message

m

Alice:

I

spreads a message m

∈ {0,

1}

|m|

,

I

in multiple covers,

I

using a strategy s

∈ S

.

A. D. Ker, “Batch steganography and pooled steganalysis,” in IH’06

(5)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Introduction

Examples of possible spreading strategies

Joint Cover

Cover bag

Classical embedding

algorithm

Greedy strategy [2]

Classical embedding

algorithm

Linear strategy [2]

Classical embedding

algorithm

The 6 evaluated spreading strategies in this paper,

S

=

{IMS,

DeLS

,

DiLS, Greedy, Linear

,

and Uses

−β}

(6)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Introduction

Pooled steganalysis: how to deal with the spreading strategy?

Alice

Embedding

Bob Bag of cover

images

Bag of cover/stego

images

Spreading Strategy S Message

m

Many possibilities for Alice to spread the message;

What about Eve, the steganalyst?

Recent approaches opt for

pooling

individual scores (more general) Let us denote, f , a Single Image Detector (SID);

For example a payload predictor (quantitative steganalysis):

f :

Rr×c →R+

(7)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Introduction

Pooled steganalysis: how to deal with the spreading strategy?

Alice

Embedding

Bob Bag of cover

images

Bag of cover/stego

images

Spreading Strategy S Message

m

Many possibilities for Alice to spread the message;

What about Eve, the steganalyst?

Recent approaches opt for

pooling

individual scores (more general)

Let us denote, f , a Single Image Detector (SID);

For example a payload predictor (quantitative steganalysis):

f :

Rr×c →R+

(8)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Introduction

Pooled steganalysis: how to deal with the spreading strategy?

Alice

Embedding

Bob Bag of cover

images

Bag of cover/stego

images

Spreading Strategy S Message

m

Many possibilities for Alice to spread the message;

What about Eve, the steganalyst?

Recent approaches opt for

pooling

individual scores (more general) Let us denote, f , a Single Image Detector (SID);

For example a payload predictor (quantitative steganalysis):

f :

Rr×c →R+

(9)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Introduction

Pooled steganalysis: how to deal with the spreading strategy?

Alice

Embedding

Bob Bag of cover

images

Bag of cover/stego

images

Spreading Strategy S Message

m

Many possibilities for Alice to spread the message;

What about Eve, the steganalyst?

Recent approaches opt for

pooling

individual scores

Cover bag Stego Pooling bag

function g

Classification x1

x2

xb-1

xb SID f(x1) f(x2)

f(xb-1) f(xb) Bag of cover/stego

images

. . . . . .

Bag of scores

. . .

(10)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Introduction

Recent studies

I

[1] Hypothesis: Eve

does not know

the spreading strategy

best pooling strategy = averaging the individual scores

I

[2] Hypothesis: Eve

does know

the spreading strategy

knowledge of the strategy = improves steganalysis results.

I

[3] Hypothesis: Eve

does know

the spreading strategy

knowledge of the strategy = improves steganalysis results.

I [1] R. Cogranne, “A sequential method for online steganalysis,” in WIFS’2015.

I [2] T. Pevn´y and I. Nikolaev, “Optimizing pooling function for pooled steganalysis,” in WIFS’2015.

I [3] R. Cogranne, V. Sedighi, and J. J. Fridrich, “Practical strategies for content-adaptive batch steganography and pooled steganalysis,” in ICASSP’2017.

(11)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Introduction

The addressed question

Cover bag Stego Pooling bag

function g

Classification x1

x2

xb-1

xb SID f(x1) f(x2)

f(xb-1) f(xb) Bag of cover/stego

images

. . . . . .

Bag of scores

. . .

Hypothesis: Eve

does not know

the spreading strategy.

Can Eve “do better” than averaging the individual scores?

(12)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Pooled steganalysis architecture

Outline

Introduction

Pooled steganalysis architecture

Experimental protocol Results

Conclusions and perspectives

(13)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Pooled steganalysis architecture

T. Pevny and I. Nikolaev general architecture

x1

x2

xb-1

xb

SID f(x1) f(x2)

f(xb-1) f(xb)

IMAGES

Bag of scores

PARZEN window

. . . . . . . . .

SVM

. . .

Cover Stego

Given a vector of SID scores z =

{f

(x

1

), ..., f (x

b

)}:

h =

"

1 b

X

f(xi)∈z

k (f (x

i

), c

1

), ... , 1 b

X

f(xi)∈z

k (f (x

i

), c

p

)

# ,

with

{ci}pi=1

a set of equally spaced real positive values,

and k(x

,

y) = exp(−γ

||x−

y||

2

)).

(14)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Pooled steganalysis architecture

T. Pevny and I. Nikolaev general architecture

x1

x2

xb-1

xb SID f(x1) f(x2)

f(xb-1) f(xb)

IMAGES

Bag of scores

PARZEN window

. . . . . . . . .

SVM

. . .

Cover Stego

I

Histogram

can treat a bag of any dimension,

I

Histogram

invariant to the sequential order in the bag.

(15)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Pooled steganalysis architecture

The Single Image Detector (SID)

I

Note: Alice embeds using J-UNIWARD (512×512 BossBase1.01 QF=75).

I

Quantitative steganalysis in JPEG [1].

I

GFR cleaned and normalized:

I Gabor Features Residuals (GFR) of dimension 17 000 [2],

I Clean cleaned from NaN values and from constant values

→reduced to 16 750,

I Normalize using random conditioning [3].

Learning: 5 000 covers + 5 000 stego per payload size ({0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1} bpc).

I [1] J. Kodovsk´y and J. J. Fridrich, “Quantitative steganalysis using rich models,” in EI’2013 MWSF.

I [2] X. Song, F. Liu, C. Yang, X. Luo, and Y. Zhang, “Steganalysis of adaptive JPEG steganography using 2d gabor filters,” in IH&MMSec’2015.

I [3] M. Boroumand and J. J. Fridrich, “Nonlinear feature normalization in steganalysis,” in IH&MMSec 2017.

I Note: M. Chen, M. Boroumand, and J. J. Fridrich, “Deep learning regressors for quantitative steganalysis,”

in EI’2018 MWSF, is more efficient.

(16)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Experimental protocol

Outline

Introduction

Pooled steganalysis architecture Experimental protocol

Results

Conclusions and perspectives

(17)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Experimental protocol

Alice: Batch spreading strategies

Alice

Embedding

Bob

Bag of cover images

Bag of cover/stego

images

Spreading Strategy

S Message

m

1. Greedy strategy: spreading into as few covers as possible.

2. Linear strategy: spreading evenly.

3. Uses -β strategy: spreading evenly across a fraction of covers.

4. IMS strategy: spreading in an unique artificial image.

5. DeLS strategy: spreading at the same deflection coefficient (MiPod model).

6. DiLS strategy: spreading at the same distortion.

(18)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Experimental protocol

Eve: Pooling strategies

I

g

clair

: Eve (clairvoyant) knows the spreading strategy.

SVM learned on the known strategy s

∈ S

.

I

g

disc

: Eve (discriminative) does not know the spreading strategy. SVM learned on all the strategies

S.

I

g

max

: Maximum function AND

τmax

by minimizing P

e

over

S.

I

g

mean

: Average function AND

τmin

by minimizing P

e

over

S.

(19)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Experimental protocol

Bags for the learning and for the test

g

clair

(clairvoyant) learning:

I

Choose one bag size b

∈ B

=

{2,

4, 6, 10, 20, 50, 100, 200},

I

Choose one spreading strategies s

∈ S

,

I

Generate 5 000 cover bags and 5 000 stego bags (0.1 bptc).

g

clair

testing:

I

Choose the same bag size b,

I

Choose the same spreading strategies s ,

I

Generate 5 000 cover bags and 5 000 stego bags (0.1 bptc).

(20)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Experimental protocol

Bags for the learning and for the test

g

disc

(discriminative) , g

max

, and g

mean

learning:

I

Choose one bag size b

∈ B

=

{2,

4, 6, 10, 20, 50, 100, 200},

I

Choose

all

the spreading strategies from

S,

I

Generate 5 000 cover bags and 5 000 stego bags.

833 bags per strategy (0.1 bptc).

g

disc

(discriminative) , g

max

, and g

mean

testing:

I

Choose the same bag size b,

I

Choose one spreading strategies s

∈ S

(unknown from Eve),

I

Generate 5 000 cover bags and 5 000 stego bags (0.1 bptc).

(21)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Results

Outline

Introduction

Pooled steganalysis architecture Experimental protocol

Results

Conclusions and perspectives

(22)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Results

Alice: Spreading strategies comparison (Eve clairvoyant)

0.00 0.05 0.10 0.15 0.20 0.25 0.30 0.35

2 4 6 1 0 2 0 5 0 1 0 0 2 0 0

DeLS DiLS IMS Linear Greedy Uses Beta0.5

g

clair

(Clairvoyant)

Figure: Spreading strategies comparison in theclairvoyantcase (10 runs).

(23)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Results

Eve: Pooling function comparisons

0.00 0.02 0.04 0.06 0.08 0.10 0.12 0.14 0.16 0.18 0.20

2 4 6 1 0 2 0 5 0 1 0 0 2 0 0

g clair g disc g mean g max

Pooling functions

Figure: Pooled steganalysis comparison (10 runs).

(24)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Conclusions and perspectives

Outline

Introduction

Pooled steganalysis architecture Experimental protocol

Results

Conclusions and perspectives

(25)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Conclusions and perspectives

Conclusions

Up-to-date algorithms:

I

modern embedding (J-Uniward),

I

6 spreading strategies (3 moderns),

I

modern (generic) pooling architecture.

Coherent results with past papers.

The take away messages:

I

For Alice: DeLS is a really interesting spreading strategy.

I

For Eve: g

disc

pooling can improve the detectability

if Eve does not know the spreading strategy.

(26)

Pooled steganalysis in JPEG: how to deal with the spreading strategy?

Conclusions and perspectives

To be continued...

Future:

I

DeLS with a DCT model,

I

Robustness to the bag size variation (learn only once with various size),

I

Robustness to the mismatch in the spreading strategy (uses a different strategy in the test; Examples in [1]),

I

Minimize the Pe (for g

disc

) differently for each strategy,

I

Use something more powerful than an SVM,

I

Extend to deep learning,

I

Go toward a simulation of a game (GAN philosophy),

[1] X. Liao, J. Yin, “Two Embedding Strategies for Payload Distribution in Multiple Images Steganography”, in ICASSP’2018.

Références

Documents relatifs

Kupiainen in this issue develops this question, analyzing how the production and broadcast of visual images, by cultural groups in the Solomon Islands during

Unité de recherche INRIA Rennes : IRISA, Campus universitaire de Beaulieu - 35042 Rennes Cedex (France) Unité de recherche INRIA Rhône-Alpes : 655, avenue de l’Europe - 38334

This article proposes to show the recent evolution of policies regarding informal settlement in Damascus, the social views and visions that fuel them and the role played

Sometimes, contractual terms imposed by platforms restrict competition on the market. These vertical restrictions are dealt as an anticompetitive agreement and prohibited by

By adopting a statistical model of Warden’s detector, the problems of batch steganography and pooled steganalysis are formalized within a unified theoretical framework that allows us

"The Great Spirit," another National Film Board film is helpful in understanding the spiritual aspects of "The Red Dress." CANADIAN JOURNAL OF

Key words: natural language interfaces, fuzzy semantics, geolocation, 2-tuple linguistic representation models, business-level objectives..

Similarly, we note from Table 13 that the conclusion from the comparison of results obtained by training on BOSS- Base or on the same M9Base also remains valid ; the fact of picking