• Aucun résultat trouvé

, Fr´ ed´ eric COMBY

N/A
N/A
Protected

Academic year: 2022

Partager ", Fr´ ed´ eric COMBY"

Copied!
31
0
0

Texte intégral

(1)

LSSD: a Controlled Large JPEG Image Database for Deep-Learning-based Steganalysis

Hugo RUIZ

1

, Mehdi YEDROUDJ

1

, Marc CHAUMONT

1,2

, Fr´ ed´ eric COMBY

1

, G´ erard SUBSOL

1

1

Research-Team ICAR, LIRMM, Univ. Montpellier, CNRS, France;

2

Univ. Nˆımes, France hugo.ruiz@lirmm.fr

January 11, 2021

ICPR’2021, International Conference on Pattern Recognition, MMForWILD’2021, Worshop on MultiMedia FORensics in the WILD,

(2)

LSSD Introduction

Steganography / Steganalysis

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean id nunc convallis, volutpat

purus et, sodales tortor. Nullam tristique leo sapien, nec aliquet velit posuere ac. Maecenas eu lorem eu libero faucibus congue vel rutrum enim.

Donec sagittis elit a turpis posuere aliquam.

Maecenas quis sem eleifend arcu finibus volutpat. Emb

Cover image C

Message M Alice

(3)

Steganography / Steganalysis

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean id nunc convallis, volutpat

purus et, sodales tortor. Nullam tristique leo sapien, nec aliquet velit posuere ac. Maecenas eu lorem eu libero faucibus congue vel rutrum enim.

Donec sagittis elit a turpis posuere aliquam.

Maecenas quis sem eleifend arcu finibus volutpat. Emb

Cover image C

Message M Alice

Ext Lorem ipsum dolor sit amet, consectetur

adipiscing elit. Aenean id nunc convallis, volutpat purus et, sodales tortor. Nullam tristique leo sapien, nec aliquet velit posuere ac. Maecenas eu lorem eu libero faucibus congue vel rutrum enim.

Donec sagittis elit a turpis posuere aliquam.

Maecenas quis sem eleifend arcu finibus volutpat.

Bob

Stego image S

Message M Secret key K

(4)

LSSD Introduction

Steganography / Steganalysis

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean id nunc convallis, volutpat

purus et, sodales tortor. Nullam tristique leo sapien, nec aliquet velit posuere ac. Maecenas eu lorem eu libero faucibus congue vel rutrum enim.

Donec sagittis elit a turpis posuere aliquam.

Maecenas quis sem eleifend arcu finibus volutpat. Emb

Cover image C

Message M Alice

Ext Lorem ipsum dolor sit amet, consectetur

adipiscing elit. Aenean id nunc convallis, volutpat purus et, sodales tortor. Nullam tristique leo sapien, nec aliquet velit posuere ac. Maecenas eu lorem eu libero faucibus congue vel rutrum enim.

Donec sagittis elit a turpis posuere aliquam.

Maecenas quis sem eleifend arcu finibus volutpat.

Bob

Eve

Stego image S

Message M Secret key K

Stego ≈ Cover

(5)

Efficient methods in steganalysis

I First were based on Machine Learning [KCP13]

I Deep Learning improved performance

I But it requires a significant training database

(6)

LSSD Introduction

The mismatch problem

Learning

base Test base

(7)

The mismatch problem

I Differences between learning base and test base

• different image sources (Camera & ISO)

• differences in development parameters (RAW → JPEG)

Learning

base Test base

(8)

LSSD Introduction

The mismatch problem

I Differences between learning base and test base

• different image sources (Camera & ISO)

• differences in development parameters (RAW → JPEG)

I Reduce performance of the method

Learning

base Test base

(9)

The mismatch problem

I Differences between learning base and test base

• different image sources (Camera & ISO)

• differences in development parameters (RAW → JPEG)

I Reduce performance of the method

Learning

base Test base

Objective to work with mismatch

To be closer to the real world and have a network more robust

(10)

LSSD Introduction

Limits of image bases currently used in steganalysis

I ALASKA v1 (2018) & v2 (2020): big base (up to 80k images) with a lot of diversity. link here

I BOSS (2010): a reference base but few images (10k). link here

I Dresden & RAISE : very few images (∼10k both combined).

RAISE link here

All these bases contain about 100,000 images in RAW format but

some are no longer available for download.

(11)

Examples

Part of image from ALASKA2 256×256 JPEG image in colour

Part of image from BOSS

256×256 JPEG image in grayscale

(12)

LSSD Diversity

Sources

Increase diversity: get as RAW images as possible

I Total: 127,420 images

I Size: ∼ 3000×5000

I Cameras: > 100

(13)

Analysis of diversity of the images

The ISO number is the value of sensitivity of the camera sensor.

I ISO for ALASKA2 base:

ISO < 100 100 ≤ ISO < 1000 1000 ≤ ISO

Number 12,497 55,893 11,615

I Camera models: > 100

ALASKA2 BOSS Dresden RAISE Stego App

Number 40 7 25 3 26

(14)

LSSD Diversity

Development process

Processing pipeline

Split

1 RAW Original size Colour image

1 JPEG 1024x1024 Colour | Grayscale

16 JPEG 256x256 Grayscale Dev

To obtain LSSD database: 127,420×16 ' 2M

(15)

Processing pipeline

Rawtherapee process RAW

dataset

Demosaicing Resizing Crop

1024x1024

JPEG compression Microconstrast tool

p = 0.5 Denoising

LSSD

Multi split 256x256

(16)

LSSD Diversity

Development process

Processing pipeline

Rawtherapee process RAW

dataset

Demosaicing Resizing Crop

1024x1024

JPEG compression Microconstrast tool

p = 0.5 Denoising

LSSD

Multi split 256x256

With this method, it is possible to create 1024×1024 and 256×256 JPEG images.

During the Rawtherapee process, Unsharp Masking (USM) can be used

and more values are available for the denoising.

(17)

Parameters for the LSSD database

Based on the script[CGB20] used for the development of the images of the ALASKA2 challenge

1

.

Other parameters could be used:

I Demosaicing: AMAZE or IGV I Resize: can be random I Denoise: different range I . . .

Name Value

Demosaicing Fast or DCB Resize & Crop Yes

Size (resize) 1024×1024 Kernel (resize)

Nearest (0.2) Bicubic (0.5) Bilinear (0.3) Resize factor depends on initial size

Unsharp Masking No

Denoise

(Pyramid Denoising) Yes

Intensity [0; 60]

Detail [0; 40]

Micro-contrast Yes (p= 0.5)

Color No

Quality factor 75

(18)

LSSD Diversity

Development process

Quality Factor (QF), a key-parameter for JPEG images

QF is linked to quantization matrices in DCT image compression.

We use only standard matrices in the first version of LSSD.

However, possible to increase diversity by changing QF.

QF ∈ [0, 100]

I 0: very poor quality I 50: minimum I 75: our choice

I 100: best quality available

(19)

Global process

Dataset RAW

LSSD Cover JPEG Development

(20)

LSSD

Experimental protocol

Global process

I Algorithm: J-UNIWARD [HF13]

I Payload: 0.2 bpnzacs I Type: grayscale

Dataset RAW

LSSD Cover JPEG

LSSD Stego JPEG

Development Steganography

(21)

Global process

Dataset RAW

LSSD Cover JPEG

LSSD Stego JPEG

LSSD MAT

Development Steganography

Decompression

(22)

LSSD

Experimental protocol

Building different bases

I With different sizes

I 6 bases: from 10k to 2M images

I The smaller ones are extracted from the larger ones

⇒ same development

I Number of images = cover images

Ex: LSSD 50k = 50k cover + 50k stego

LSSD_1M LSSD_500k LSSD_100k LSSD_50k LSSD_10k LSSD_2M

(23)

Test base

All development pipeline

TST base 100k JPEG RAW

dataset

RAW TST

I Extract 6,250 RAW images from RAW dataset

I Same development pipeline (with same parameters)

I Test base of 100k images

(24)

LSSD

Experimental protocol

Test base

All development pipeline

TST base 100k JPEG RAW

dataset

RAW TST

I Extract 6,250 RAW images from RAW dataset

I Same development pipeline (with same parameters)

I Test base of 100k images

This test base is totally

independent of the learning base

(25)

A new database: LSSD

http://www.lirmm.fr/~chaumont/LSSD.html

(26)

LSSD Results

A new database: LSSD

A database of 2 million JPEG (color or grayscale) 256 × 256 images.

Different databases available for downloading separately.

http://www.lirmm.fr/~chaumont/LSSD.html

(27)

To download (access soon)

A shell script to download:

https://github.com/Yiouki/download_lssd

Parameters:

I Base name (-b): LSSD 10k, 50k. . . or ALASKA2, BOSS. . . I Type (-t): JPEG or MAT

I Coloring (-c): Color or Gray

I Nature (-n): Cover or Stego (Stego P02 in our case) I Output (-o): Choose the output path

I Help (-h): Print help

Example to download LSSD 10k gray cover images in MAT format: sh

(28)

LSSD

Conclusions and perspectives

Conclusions

I Steganalysis community can find multiple usages of this base:

• scalability analysis [RCY

+

21]

• learning bases exceeding millions of controlled images

I Lot of important steps to develop a complete database

I About one week to develop a complete and usable base.

(Computer: 16 proc Intel Xeon(R) W-2145 3.70Ghz)

(29)

To be continued. . .

I Create and analyze the controlled mismatch between the training/learning and test base.

With USM, denoising, demosaicing. . .

I Use different steganography algorithms with more payloads

I Use colour in the base

(30)

LSSD References

R´ ef´ erences I

R´ emi Cogranne, Quentin Giboulot, and Patrick Bas.

Challenge Academic Research on Steganalysis with Realistic Images.

In Proceedings of the IEEE International Workshop on Information Forensics and Security, WIFS’2020, Virtual Conference due to covid (Formerly New-York, NY, USA), December 2020.

Vojtech Holub and Jessica Fridrich.

Digital image steganography using universal distortion.

IH&MMSec 13 Proceedings of the first ACM workshop on Information hiding and multimedia security, 2013(1), 2013.

Sarra Kouider, Marc Chaumont, and William Puech.

Adaptive Steganography by Oracle (ASO).

In Proceeding of the IEEE International Conference on Multimedia and

Expo, ICME’2013, pages 1–6, San Jose, California, USA, July 2013.

(31)

R´ ef´ erences II

Hugo Ruiz, Marc Chaumont, Mehdi Yedroudj, Ahmed Oulad-Amara, Fr´ ed´ eric Comby, and G´ erard Subsol.

Analysis of the Scalability of a Deep-Learning Network for Steganography

“Into the Wild”.

In Submited to MultiMedia FORensics in the WILD, MMForWILD’2020,

in conjunction with ICPR2020 The 25th International Conference on

Pattern Recognition, Virtual Conference due to covid (Formerly Milan,

Italy), January 2021.

Références

Documents relatifs

lorem ipsum dolor sit amet, consectetur lorem ipsum dolor sit amet, consectetur lorem ipsum dolor sit amet, consectetur reviews features extraction user’s request and

Indiquez la description ici Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.. Ut enim ad minim

Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Sed aliquam, nisi quis porttitor congue, elit erat euismod orci, ac placerat dolor lectus

Neque porro quisquam est qui dolorem ipsum quia dolor sit amet, consectetur, adipisci velit. Lorem ipsum dolor sit amet, consecte- tur adipiscing elit. Sed non risus.. Cras

A cet effet, le présent travail consiste à avoir le réseau d‟AEP de la partie Sud du groupement urbain de Tlemcen sous forme d‟une base de données de type SIG ( ArcGis) et

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibhLorem ipsum dolor sit amet,. consectetuer adipiscing elit, sed

Une troisième approche dans le développement international d'un produit consiste à standardiser la politique de communication développée sur le marché domestique et à

lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod. tincidunt magna