shenzhen university image steganalysis: challenges · 2017. 8. 5. · acknowledgement members in my...
TRANSCRIPT
Jiwu Huang
Shenzhen University,China
BUCHAREST·2017
Image Steganalysis:
Challenges
Shenzhen University
Acknowledgement
Members in my team
Dr. Weiqi Luo and Dr. Fangjun Huang
Sun Yat-sen Univ., China
Dr. Bin Li and Dr. Shunquan Tan, Mr. Jishen
Zeng
Shenzhen Univ., China
Shenzhen University
3
Shenzhen UniversityOutlines
Steganography in Images
Steganalysis vs. Steganography
Challenges in Steganalysis
4
Shenzhen UniversitySteganography
What steganography?
undetectable
5
Shenzhen UniversitySteganography
Steganography vs. Cryptography?
@2*$#&(*%7*= ?Ek(M)
encryptionplaintext
ciphertext
plaintext
Cryptography
Unreadable !
6
Shenzhen UniversitySteganography
Steganography and Cryptography?
Hidingplaintext stego
plaintext
MM
Nothing !
Steganography
cover
7
Shenzhen University
Encryption
Secret message
Encrypted bits
Unsecure
channelHiding
Cover image
Security:
1) difficulty to find stego images
2) difficulty to extract the hidden bits
Steganography
Cryptography
Steganography
8
Shenzhen University
Security for steganography
Secure steganography: undetectable
Can only be estimated with a probability
about random guessing
“Not necessary or sufficient to be
imperceptible”
“Imperceptible” does not means
“undetectable”
“perceptible” does not means
“detectable”
Steganography
9
Shenzhen UniversitySteganography
Security for steganography
K-L distance: security (Cachin 2004)
security
relative entropy
PX---distribution of covers
PY---distribution of stegos
10
Shenzhen UniversitySteganography
Security for steganography
Maximum Mean Discrepancy-based
Security (Fridrich 2008)
What function f should be selected?What function f should be selected?
xi , yi: Sample of PX, PY
11
Shenzhen UniversitySteganography
Security for steganography
Steganalyzer’s ROC-based Security
(Memon 2003)
ROC:TP rate ~FP rate
security:
12
Shenzhen UniversitySteganalysis vs. Steganography
13
Shenzhen UniversitySteganalysis vs. Steganography
Steganalysis
14
Shenzhen University
Early targeted approaches
Attacking LSB-based steganography
Attacking OutGuess, MB, F5, YASS
Advanced universal approaches
Image Quality Features (Memon et. al)
Calibration Based Features (Fridrich et. al)
Moment Based Features (Farid et. al)
Correlation Based Features (Moulin, Sullivan, Shi)
Steganalysis vs. Steganography
15
Shenzhen University
“Cat & Mouse Game”
Steganalysis vs. Steganography
LSB-based
(J-steg)
Model-based
(MB1)
Compensation-
based (MB2)
Histogram-based
(Chi-square), RS
Over fitting
Block artifact due to
many changes
steganalysissteganography
targeted approaches
16
Shenzhen University
“Cat & Mouse Game”
Steganalysis vs. Steganography
matrix coding
wet paper code
STC(syndrome-trellis codes)
Distortion functions
High-dimensional
features
+machine learning
Adaptive+ Adaptive+
universal approaches
steganalysissteganography
17
Shenzhen University
Advanced universal approaches
Steganalysis vs. Steganography
Y: feature vector
Classifier: mapping Y→i
i: i=0,nature image; i=1,stego image
Y i
testing
18
Shenzhen University
Advanced universal approaches
Steganalysis vs. Steganography
training
Classifiers: SVM, Fisher linear discriminant,
neural network, ensemble, others.
nature
imagesstego
images
Steganalysis wins steganography
Statistical features
19
Statistical features
nature
images
stego
images
steganography wins Steganalysis
20
Counterwork between
steganography and steganalysis
statistical modelof nature images
21
22
Shenzhen University
Statistical model of nature images
Is there such universal statistical model
It seem to be difficult to answer
If yes, how to model?
At least, it is not easy to model texture
regions
Challenges in Steganalysis
23
Shenzhen University
How to find the traces a steganographic
scheme?
Limited performance in the existing
features
Objective image quality measures,
Calibration-based features, statistical
moments, gray-level co-occurrence matrix
based features, Markov process based
features, SPAM (subtractive pixel adjacency
matrix), SRM (spatial rich model)
SRM: generating features (Fridrich 2012)
Challenges in Steganalysis
Computing residuals using different
submodels
Ri,j = X’i,j(Ni,j)-cXi,j
Truncation and quantization by
quantization step q and threshold T
Ri,j = truncT(round(Ri,j/q))
Using co-occurrence matrices for feature
extraction
SRM
Fridrich et. al, “Rich Models for Steganalysis of Digital Images,”
IEEE T-IFS, 7(3): 868-882, 2012 24
25
Performance of SRM under different datasets
SRM + ensemble classifier
Image Dataset: downsampling from
high resolution raw images
Downsampling type: bicubic, bilinear, lanczos2, nearest
5000 images for training, 5000 for testing.
stegnographic algorithm:
S-UNIWARD, 0.4bpp
26
27
Shenzhen University
How to find the traces a steganographic
scheme?
How to design efficient features?
To achieve better performance
Methodology for constructing features
Compact features
Low computation load
Challenges in Steganalysis
28
Shenzhen University
Mis-matchng between training and
testing databases
Mis-matching issue
Mis-matching: datasets for training and
testing have different properties
Steganalyzers should be robust
In steganalysis community: down-
sampling leaves traces
Challenges in Steganalysis
Downsampling effect on steganalysis
SRM + ensemble classifier
Image Dataset: downsampling from
high resolution raw images
5000 images for training, 5000 for testing.
stegnographic algorithm: S-UNIWARD, 0.4bpp 29
30
Shenzhen University
Does deep learning work?
Great success in pattern recognition
Does DL work in recognizing
“Imperceptible” differences?
Works on some easy forensics issues
However, how about steganalysis?
Have not seen good progress in
steganalysis in spatial domain
Recent progress in steganalysis for JPEG
domain
Challenges in Steganalysis
Method Accuracy
DCTR features (8000dims) 0.65
PHARM features (12600dims) 0.68
Proposed deep network 0.75
Deep learning in JPEG steganalysis
JPEG steganography: J-Uniward, 0.4bpp
Training: 800K images from ImageNet
Testing: 200K images from ImageNet
Zeng et,al, “Large-scale JPEG image steganalysis using hybrid
deep-learning framework,” Submitted to IEEE Trans. on IFS 31
JPEG stegnographic algorithm: J-UNIWARD, 0.4bpp
32
Shenzhen University
Dataset for training
Golden rules in machine learning
data samples should be at least 20-50
times with the total number of
parameters.
Steganalysis in spatial domain: High-
dimensional features vs. small dataset
Taking SRM as an example
Challenges in Steganalysis
33
Shenzhen University
SRM: very high feature dimension vs.
small training dataset
features:34671
Image database: 10 K, training images: 5K
JPEG stegnographic algorithm: Juniward, 0.4bpp
Fridrich et. al, “Rich Models for Steganalysis of Digital Images,”
IEEE T-IFS, 7(3): 868-882, 2012
34
Shenzhen University
DNN: very large number of network parameters vs.
small training dataset
parameters: 100K
Image database: 10 K, training images: 5K
JPEG stegnographic algorithm: Juniward, 0.4bpp
Xu et., al, “Structural Design of Convolutional Neural Networks for Steganalysis,”
IEEE SPL, 23(5), 708-712, 2016.
35
Shenzhen University
Dataset for training
Uncompressed images are not commonly
used in practice
Very huge manpower to collect an
applicable raw dataset
Challenges in Steganalysis
36
Shenzhen University
Stegnography is a good way in secret
communication and thus steganalysis is
of important
Have some progress in laboratory
There are still many challenges
Deep learning may be useful in JPEG
steganalysis
Conclusions