Cover-aware Steganalysis

Authors

  • Niklas Bunzel Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany
  • Martin Steinebach Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany https://orcid.org/0000-0002-0240-0388
  • Huajian Liu Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany https://orcid.org/0000-0003-3470-0999

DOI:

https://doi.org/10.13052/jcsm2245-1439.1011

Keywords:

Steganography, Steganalysis, Information Hiding

Abstract

The increasing digitization offers new ways, possibilities and needs for a secure transmission of information. Steganography and its analysis constitute an essential part of IT-Security. In this work we show how methods of blind-steganalysis can be improved to work in cover-aware scenarios, we will call this non-blind steganalysis. The main objective was to examine how to take advantage of the knowledge of reference images to maximize the accuracy-rate of the analysis.


Therefore we evaluated common stego-tools and their embedding algorithms and established a dataset of 353110 images. The images have been applied to test the potency of the improved methods of the non-blind steganalysis. The results show that the accuray can be significantly improved by using cover-images to produce reference images. Also the aggregation of the outcomes has shown to have a positive impact on the accuracy. Particularly noteworthy is the correlation between the qualities of the stego- and coverimages. Only by consindering both, the accuracy could strongly be improved. Interestingly the difference between both qualities also has a deep impact on the results.

Downloads

Download data is not yet available.

Author Biographies

Niklas Bunzel, Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany

Niklas Bunzel received his B.Sc. and M.Sc. degrees in computer science and IT security from Technical University Darmstadt 2015 and 2020, respectively. He is currently a research scientist at Fraunhofer Institute for Secure Information Technology (SIT). His major research interests include artificial intelligence, IT security and steganography.

Martin Steinebach, Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany

Martin Steinebach is the manager of the Media Security and IT Forensics division at Fraunhofer SIT. From 2003 to 2007 he was the manager of the Media Security in IT division at Fraunhofer IPSI. He studied computer science at the Technical University of Darmstadt and finished his diploma thesis on copyright protection for digital audio in 1999. In 2003 he received his PhD at the Technical University of Darmstadt for this work on digital audio watermarking. In 2016 he became honorary professor at the TU Darmstadt. He gives lectures on Multimedia Security as well as Civil Security. He is Principle Investigator at ATHENE and represents IT Forensics and AI Security. Before he was Principle Investigator at CASED with the topics Multimedia Security and IT Forensics. In 2012 his work on robust image hashing for detection of child pornography reached the second rank Deutscher IT Sicherheitspreis”, an award funded by Host Görtz.

Huajian Liu, Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany

Huajian Liu received his B.S. and M.S. degrees in electronic engineering from Dalian University of Technology, China, in 1999 and 2002, respectively, and his Ph.D. degree in computer science from Technical University Darmstadt, Germany, in 2008. He is currently a senior research scientist at Fraunhofer Institute for Secure Information Technology (SIT). His major research interests include information security, digital watermarking, robust hashing and digital forensics.

References

Malte Arnsperger. Die spione aus der nachbarschaft. www.stern.de/panorama/stern-crime/russische-agenten-in-usa-enttarnt-die-spione-aus-der-nachbarschaft-3284138.html, 2010. Accessed: 2019-05-13.

Charles Arthur. China and the internet: Tricks to beat the online censor. www.theguardian.com/world/2010/mar/25/china-internet-how-to-beat-censorship?intcmp=239, 2010. Accessed: 2019-05-25.

I. Avcibas, N. Memon, and B. Sankur. Steganalysis using image quality metrics. IEEE Transactions on Image Processing, 12(2):221–229, Feb 2003.

Benedikt Boehm. Stegexpose a tool for detecting lsb steganography, 2014.

Jan Butora and Jessica Fridrich. Detection of diversified stego sources with cnns. Electronic Imaging, 2019(5):534–1–534–11, 2019.

Mo Chen, Vahid Sedighi, Mehdi Boroumand, and Jessica Fridrich. Jpeg-phase-aware convolutional neural network for steganalysis of jpeg images. In Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pages 75–84. ACM, 2017.

Felix Disselhoff and Manuela Pfohl. Kalter krieg im hortensien-idyll. www.stern.de/panorama/stern-crime/russische-spione-in-den-usa-aufgeflogen-kalter-krieg-im-hortensien-idyll-3278380.html, 2010. Accessed: 2019-05-13.

Larry Carter Eric Olson and Qingzhong Liu. A comparison study using stegexpose for steganalysis. International Journal of Knowledge Engineering, 3(1), June 2017.

Flickr. Beliebteste kameras in der flickr community. https://www.flickr.com/cameras, 2019. Accessed: 2019-05-25.

Jessica Fridrich, Miroslav Goljan, and Dorin Hogea. Attacking the outguess. In Proceedings of the ACM Workshop on Multimedia and Security, volume 2002. Juan-les-Pins, France, 2002.

Jessica Fridrich, Miroslav Goljan, and Dorin Hogea. Steganalysis of jpeg images: Breaking the f5 algorithm. In Fabien A. P. Petitcolas, editor, Information Hiding, pages 310–323, Berlin, Heidelberg, 2003. Springer Berlin Heidelberg.

SEAN GALLAGHER. Steganography: how al-qaeda hid secret documents in a porn video. arstechnica.com/information-technology/2012/05/steganography-how-al-qaeda-hid-secret-documents-in-a-porn-video. Accessed: 2019-05-10.

Li Lin, Jennifer Newman, Stephanie Reinders, Yong Guan, and Min Wu. Domain adaptation in steganalysis for the spatial domain. Electronic Imaging, 2018(7):319–1–319–9, 2018.

Arambam Neelima and Kh Manglem Singh. A short survey on perceptual hash function. ADBU Journal of Engineering technology, 1, 2014.

LILY HAY NEWMAN. Mysterious ’muslimcrypt’ app helps jihadists send covert messages. https://www.wired.com/story/muslimcrypt-steganography/. Accessed: 2019-05-10.

Yang Ou and Kyung Hyune Rhee. A survey on image hashing for image authentication. IEICE TRANSACTIONS on Information and Systems, 93(5):1020–1030, 2010.

Tomás Pevný and Jessica J. Fridrich. Merging markov and dct features for multi-class jpeg steganalysis. In Security, Steganography, and Watermarking of Multimedia Contents, 2007.

Martin Steinebach, Andre Ester, and Huajian Liu. Channel steganalysis. In Proceedings of the 13th International Conference on Availability, Reliability and Security, pages 1–8, 2018.

Clement Fuji Tsang and Jessica Fridrich. Steganalyzing images of arbitrary size with cnns. Electronic Imaging, 2018(7):121–1–121–8, 2018.

Andreas Westfeld and Andreas Pfitzmann. Attacks on steganographic systems. In Andreas Pfitzmann, editor, Information Hiding, pages 61–76, Berlin, Heidelberg, 2000. Springer Berlin Heidelberg.

Downloads

Published

2021-03-20

How to Cite

1.
Bunzel N, Steinebach M, Liu H. Cover-aware Steganalysis. JCSANDM [Internet]. 2021 Mar. 20 [cited 2024 Nov. 21];10(1):1-26. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/5967

Issue

Section

ARES 2020 Workshops

Most read articles by the same author(s)

1 2 > >>