The Need for Steganalysis in Image Distribution Channels
DOI:
https://doi.org/10.13052/2245-1439.834Keywords:
steganography, steganalysisAbstract
The rise of social networks during the last 10 years has created a situation in which up to 100 million new images and photographs are uploaded and shared by users every day. This environment poses an ideal background for those who wish to communicate covertly by the use of steganography. It also creates a new set of challenges for steganalysts, who have to shift their field of work away from a purely scientific laboratory environment and into a diverse real-world scenario, while at the same time having to deal with entirely new problems, such as the detection of steganographic channels or the impact that even a low false positive rate has when investigating the millions of images which are shared every day on social networks. We evaluate how to address these challenges with traditional steganographic and statistical methods, rather than using high performance computing and machine learning. To achieve this we first analyze the steganographic algorithm F5 applied to images with a high degree of diversity, as would be seen in a typical social network.We show that the biggest challenge lies in the detection of images whose payload is less then 50% of the available capacity of an image.We suggest new detection methods and apply these to the problem of channel detection in social network. We are able to show that using our attacks we are able to detect the majority of covert F5 channels after a mix containing 10 stego images has been classified by our scheme.
Downloads
References
Mo Chen, Vahid Sedighi, Mehdi Boroumand, and Jessica Fridrich. Jpeg-phase-aware convolutional neural network for steganalysis of jpeg images. In Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pages 75–84. ACM, 2017.
Rémi Cogranne, Vahid Sedighi, and Jessica Fridrich. Practical strategies for content-adaptive batch steganography and pooled steganalysis. In Acoustics, Speech and Signal Processing (ICASSP), 2017 IEEE International Conference on, pages 2122–2126. IEEE, 2017.
Ron Crandall. Some notes on steganography. In Posted on Steganogra- phy Mailing List, online: http://dde.binghamton.edu/download/Crandall matrix.pdf, (accessed Feb. 2018).
Andre Ester. Steganalysis of communication channels in social networks. Master’s thesis, TU Darmstadt, Germany, 2018.
Jessica J. Fridrich, Miroslav Goljan, and Dorin Hogea. Steganalysis of JPEG Images: Breaking the F5 Algorithm. Springer-Verlag, London, UK, online: http://www.ws.binghamton.edu/fridrich/Research/f5.pdf, (accessed Oct. 2017).
Tom Kellen. Hiding in Plain View: Could Steganography be a Terrorist Tool? SANS Institute, online: https://www.sans.org/reading-room/whitepapers/stenganography/hiding-plain-view-steganography-terrorist-tool-551, (accessed Sept. 2017).
Andrew D Ker. Batch steganography and pooled steganalysis. In International Workshop on Information Hiding, pages 265–281. Springer, 2006.
Li Lin, Jennifer Newman, Stephanie Reinders, Yong Guan, and Min Wu. Domain adaptation in steganalysis for the spatial domain. Electronic Imaging, 2018(7), 2018.
Declan McCullagh. Bin Laden: Steganography Master? Wired Magazine, online: https://www.wired.com/2001/02/bin-laden-steganography-master, (accessed Sept. 2017).
Noah Shachtman. FBI: Spies HID Secret Messages on Public Websites. Wired Magazine, online: https://www.wired.com/2010/06/alleged-spies-hid-secret-messages-on-public-websites, (accessed Sept. 2017).
Martin Steinebach, Andre Ester, and Huajian Liu. Channel steganalysis. In Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, pages 9:1–9:8, New York, NY, USA, 2018. ACM.
Martin Steinebach, Andre Ester, Huajian Liu, and Sascha Zmudzinski. Double embedding steganalysis: Steganalysis with low false positive rates. In MPS ’18: Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, CCS 2018, New York, NY, USA, 2018. ACM.
Clement Fuji Tsang and Jessica Fridrich. Steganalyzing images of arbitrary size with cnns. Electronic Imaging, 2018(7), 2018.
Andreas Westfeld. F5 – a steganographic algorithm. In Moskowitz I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, volume 2137, pages 289–302. Springer-Verlag, London, UK.