Keywords:Steganography, Steganalysis, Information Hiding
The increasing digitization offers new ways, possibilities and needs for a secure transmission of information. Steganography and its analysis constitute an essential part of IT-Security. In this work we show how methods of blind-steganalysis can be improved to work in cover-aware scenarios, we will call this non-blind steganalysis. The main objective was to examine how to take advantage of the knowledge of reference images to maximize the accuracy-rate of the analysis.
Therefore we evaluated common stego-tools and their embedding algorithms and established a dataset of 353110 images. The images have been applied to test the potency of the improved methods of the non-blind steganalysis. The results show that the accuray can be significantly improved by using cover-images to produce reference images. Also the aggregation of the outcomes has shown to have a positive impact on the accuracy. Particularly noteworthy is the correlation between the qualities of the stego- and coverimages. Only by consindering both, the accuracy could strongly be improved. Interestingly the difference between both qualities also has a deep impact on the results.
Malte Arnsperger. Die spione aus der nachbarschaft. www.stern.de/panorama/stern-crime/russische-agenten-in-usa-enttarnt-die-spione-aus-der-nachbarschaft-3284138.html, 2010. Accessed: 2019-05-13.
Charles Arthur. China and the internet: Tricks to beat the online censor. www.theguardian.com/world/2010/mar/25/china-internet-how-to-beat-censorship?intcmp=239, 2010. Accessed: 2019-05-25.
I. Avcibas, N. Memon, and B. Sankur. Steganalysis using image quality metrics. IEEE Transactions on Image Processing, 12(2):221–229, Feb 2003.
Benedikt Boehm. Stegexpose a tool for detecting lsb steganography, 2014.
Jan Butora and Jessica Fridrich. Detection of diversified stego sources with cnns. Electronic Imaging, 2019(5):534–1–534–11, 2019.
Mo Chen, Vahid Sedighi, Mehdi Boroumand, and Jessica Fridrich. Jpeg-phase-aware convolutional neural network for steganalysis of jpeg images. In Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pages 75–84. ACM, 2017.
Felix Disselhoff and Manuela Pfohl. Kalter krieg im hortensien-idyll. www.stern.de/panorama/stern-crime/russische-spione-in-den-usa-aufgeflogen-kalter-krieg-im-hortensien-idyll-3278380.html, 2010. Accessed: 2019-05-13.
Larry Carter Eric Olson and Qingzhong Liu. A comparison study using stegexpose for steganalysis. International Journal of Knowledge Engineering, 3(1), June 2017.
Flickr. Beliebteste kameras in der flickr community. https://www.flickr.com/cameras, 2019. Accessed: 2019-05-25.
Jessica Fridrich, Miroslav Goljan, and Dorin Hogea. Attacking the outguess. In Proceedings of the ACM Workshop on Multimedia and Security, volume 2002. Juan-les-Pins, France, 2002.
Jessica Fridrich, Miroslav Goljan, and Dorin Hogea. Steganalysis of jpeg images: Breaking the f5 algorithm. In Fabien A. P. Petitcolas, editor, Information Hiding, pages 310–323, Berlin, Heidelberg, 2003. Springer Berlin Heidelberg.
SEAN GALLAGHER. Steganography: how al-qaeda hid secret documents in a porn video. arstechnica.com/information-technology/2012/05/steganography-how-al-qaeda-hid-secret-documents-in-a-porn-video. Accessed: 2019-05-10.
Li Lin, Jennifer Newman, Stephanie Reinders, Yong Guan, and Min Wu. Domain adaptation in steganalysis for the spatial domain. Electronic Imaging, 2018(7):319–1–319–9, 2018.
Arambam Neelima and Kh Manglem Singh. A short survey on perceptual hash function. ADBU Journal of Engineering technology, 1, 2014.
LILY HAY NEWMAN. Mysterious ’muslimcrypt’ app helps jihadists send covert messages. https://www.wired.com/story/muslimcrypt-steganography/. Accessed: 2019-05-10.
Yang Ou and Kyung Hyune Rhee. A survey on image hashing for image authentication. IEICE TRANSACTIONS on Information and Systems, 93(5):1020–1030, 2010.
Tomás Pevný and Jessica J. Fridrich. Merging markov and dct features for multi-class jpeg steganalysis. In Security, Steganography, and Watermarking of Multimedia Contents, 2007.
Martin Steinebach, Andre Ester, and Huajian Liu. Channel steganalysis. In Proceedings of the 13th International Conference on Availability, Reliability and Security, pages 1–8, 2018.
Clement Fuji Tsang and Jessica Fridrich. Steganalyzing images of arbitrary size with cnns. Electronic Imaging, 2018(7):121–1–121–8, 2018.
Andreas Westfeld and Andreas Pfitzmann. Attacks on steganographic systems. In Andreas Pfitzmann, editor, Information Hiding, pages 61–76, Berlin, Heidelberg, 2000. Springer Berlin Heidelberg.