Affiliation:
1. The Johns Hopkins University Applied Physics Laboratory, Laurel, MD 20723. E-mail: brian.a.powell@jhuapl.edu
Abstract
This work explores the extent to which LSB embedding can be made secure against structural steganalysis through a modification of cover image statistics prior to message embedding. LSB embedding disturbs the statistics of consecutive k-tuples of pixels, and a kth-order structural attack detects hidden messages with lengths in proportion to the size of the imbalance amongst sets of k-tuples. To protect against kth-order structural attacks, cover modifications involve the redistribution of k-tuples among the different sets so that symmetries of the cover image are broken, then repaired through the act of LSB embedding so that the stego image bears the statistics of the original cover. We find this is only feasible for securing against up to 3rd-order attacks since higher-order protections result in virtually zero embedding capacities. To protect against 3rd-order attacks, we perform a redistribution of triplets that also preserves the statistics of pairs. This is done by embedding into only certain pixels of each sextuplet, constraining the maximum embedding rate to be ⩽ 2 / 3 bits per channel. Testing on a variety of image formats, we report best performance for JPEG-compressed images with a mean maximum embedding rate undetectable by 2nd- and 3rd-order attacks of 0.21 bpc.
Subject
Computer Networks and Communications,Hardware and Architecture,Safety, Risk, Reliability and Quality,Software
Reference65 articles.
1. Security against sample pair steganalysis in eight queens data hiding technique;Bansal;International Journal of Computer Network and Information Security,2016
2. R. Böhme and A. Westfeld, Exploiting preserved statistics for steganalysis, in: Information Hiding, J. Fridrich, ed., Springer, Berlin, Heidelberg, 2005, pp. 82–96.
3. Deep residual network for steganalysis of digital images;Boroumand;IEEE Transactions on Information Forensics and Security,2019
4. Deep learning in steganography and steganalysis
5. Detection of hiding in the least significant bit;Dabeer;Signal Processing, IEEE Transactions on,2004