On Completeness of Feature Spaces in Blind Steganalysis

被引:0
作者
Kodovsky, Jan [1 ]
Fridrich, Jessica [1 ]
机构
[1] SUNY Binghamton, Dept ECE, Binghamton, NY 13902 USA
来源
MM&SEC'08: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2008 | 2008年
关键词
Blind steganalysis; completeness; FCM; steganography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Blind steganalyzers can be used for many diverse applications in steganography that go well beyond a mere detection of stego content. A blind steganalyzer can also be used for constructing targeted attacks or as an oracle for designing steganographic methods. The feature space itself provides a low-dimensional model of covers useful for benchmarking. These applications require the feature space to be complete in the sense that the features fully characterize the space of covers. Incomplete feature sets may skew benchmarking scores and lead to poor steganalysis. As a simple test of completeness, we propose a general approach for constructing steganographic methods that approximately preserve the whole feature vector and thus become practically undetectable by any steganalyzer that uses the same feature set. We demonstrate the plausibility of this approach, which we call the Feature Correction Method (FCM) by constructing the FCM for a 274-dimensional feature set from a state-of-the-art blind steganalyzer for JPEG images.
引用
收藏
页码:123 / 131
页数:9
相关论文
共 39 条
  • [1] Image steganalysis with binary similarity measures
    Avcibas, I
    Kharrazi, M
    Memon, N
    Sankur, B
    [J]. EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2005, 2005 (17) : 2749 - 2757
  • [2] Avcibas I, 2002, 2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, P645, DOI 10.1109/ICIP.2002.1039053
  • [3] Steganalysis of watermarking techniques using image quality metrics
    Avcibas, I
    Memon, N
    Sankur, B
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 : 523 - 531
  • [4] Böhme R, 2004, LECT NOTES COMPUT SC, V3200, P82
  • [5] Cachin C, 1998, LECT NOTES COMPUT SC, V1525, P306
  • [6] DUMITRESCU S, 2000, LECT NOTES COMPUTER, V2578, P355
  • [7] Franz E, 2003, LECT NOTES COMPUT SC, V2578, P278
  • [8] Perturbed quantization steganography
    Fridrich, J
    Goljan, M
    Soukal, D
    [J]. MULTIMEDIA SYSTEMS, 2005, 11 (02) : 98 - 107
  • [9] Fridrich J, 2004, LECT NOTES COMPUT SC, V3200, P67
  • [10] On estimation of secret message length in LSB steganography in spatial domain
    Fridrich, J
    Goljan, M
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 23 - 34