YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis

A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distortion constrained attacks. We present Yet Another Steganographic Scheme (YASS), a meth

  • PDF / 443,952 Bytes
  • 16 Pages / 430 x 660 pts Page_size
  • 29 Downloads / 182 Views

DOWNLOAD

REPORT


Abstract. A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distortion constrained attacks. We present Yet Another Steganographic Scheme (YASS), a method based on embedding data in randomized locations so as to disable the selfcalibration process (such as, by cropping a few pixel rows and/or columns to estimate the cover image features) popularly used by blind steganalysis schemes. The errors induced in the embedded data due to the fact that the stego signal must be advertised in a specific format such as JPEG, are dealt with by the use of erasure and error correcting codes. For the presented JPEG steganograhic scheme, it is shown that the detection rates of recent blind steganalysis schemes are close to random guessing, thus confirming the practical applicability of the proposed technique. We also note that the presented steganography framework, of hiding in randomized locations and using a coding framework to deal with errors, is quite simple yet very generalizable. Keywords: data hiding, error correcting codes, steganalysis, steganography, supervised learning.

1

Introduction

Secure communication of a secret message has always been important to people, and it is not surprising that steganography, the art of communicating without revealing its existence, as well as cryptography, the art of concealing the meaning of a message, have a rich history. In this paper, we consider the problem of secure steganography via hiding information in digital images. In steganography, a message signal is embedded into a host or cover signal to get a composite or stego signal in such a way that the presence of hidden information cannot be 

This research is supported in part by a grant from ONR # N00014-05-1-0816. Corresponding author: K. Solanki ([email protected])

T. Furon et al. (Eds.): IH 2007, LNCS 4567, pp. 16–31, 2007. c Springer-Verlag Berlin Heidelberg 2007 

YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis

17

detected by either statistical or perceptual analysis of the stego signal. In case of active steganography, there is an additional requirement that the hidden data must be recoverable even after benign or malicious processing of the stego signal by an adversary. JPEG is arguably the most popular format for storing, presenting, and exchanging images. It is not surprising that steganography in the JPEG format, and its converse problem of steganalysis of JPEG images to find ones with hidden data, have received considerable attention from researchers over the past decade. There are many approaches and software available for JPEG steganography, which include OutGuess [1], StegHide [2], model-based steganography [3], perturbed quantization [4], F5 [5], and statistical restoration [6,7]. Approaches for JPEG steganography have focused on hiding data in the least significant bit (LSB) of the quantized discrete cosine transform (DCT) coefficients. In order to avoid inducing significant