Explicit Optimization of min max Steganographic Game

被引:55
作者
Bernard, Solene [1 ]
Bas, Patrick [1 ]
Klein, John [2 ]
Pevny, Tomas [3 ]
机构
[1] Univ Lille, CRIStAL, F-59655 Villeneuve Dascq, France
[2] Univ Lille, Automat Genie Informat Traitement Signal, F-59655 Villeneuve Dascq, France
[3] Czech Tech Univ, Comp Sci & Engn, Prague 12135, Czech Republic
关键词
Steganography; steganalysis; game theory; distortion function; STEGANALYSIS;
D O I
10.1109/TIFS.2020.3021913
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This article proposes an algorithm which allows Alice to simulate the game played between her and Eve. Under the condition that the set of detectors that Alice assumes Eve to have is sufficiently rich (e.g. CNNs), and that she has an algorithm enabling to avoid detection by a single classifier (e.g adversarial embedding, gibbs sampler, dynamic STCs), the proposed algorithm converges to an efficient steganographic algorithm. This is possible by using a min max strategy which consists at each iteration in selecting the least detectable stego image for the best classifier among the set of Eve's learned classifiers. The algorithm is extensively evaluated and compared to prior arts and results show the potential to increase the practical security of classical steganographic methods. For example the error probability P-err of XU-Net on detecting stego images with payload of 0.4 bpnzAC embedded by J-Uniward and QF 75 starts at 7.1% and is increased by +13.6% to reach 20.7% after eight iterations. For the same embedding rate and for QF 95, undetectability by XU-Net with J-Uniward embedding is 23.4%, and it jumps by +25.8% to reach 49.2% at iteration 3.
引用
收藏
页码:812 / 823
页数:12
相关论文
共 47 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]  
[Anonymous], 2016, DEEP LEARNING
[3]  
[Anonymous], 1883, J SCI MILITAIRES
[4]  
Bas P., 2011, P 13 INF HID C PRAG, V6958, DOI 10.1007/978-3-642- 24178-9_5
[5]   Exploiting Adversarial Embeddings for Better Steganography [J].
Bernard, Solene ;
Pevny, Tomas ;
Bas, Patrick ;
Klein, John .
IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2019, :216-221
[6]   Deep Residual Network for Steganalysis of Digital Images [J].
Boroumand, Mehdi ;
Chen, Mo ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1181-1193
[7]  
Cermák J, 2016, AAAI CONF ARTIF INTE, P439
[8]  
Cogranne R, 2019, IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, P125
[9]  
Dini U., 1878, Fondamenti per la Teoria Delle Funzioni di Variabili Reali
[10]   Detection of LSB steganography via sample pair analysis [J].
Dumitrescu, S ;
Wu, XL ;
Wang, Z .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2003, 51 (07) :1995-2007