Presentation - Vision Research Lab - University of California, Santa

advertisement
Secure Steganography: Statistical
Restoration of the Second Order
Dependencies for Improved Security
A. Sarkar, K. Solanki, U. Madhow, S. Chandrasekaran and B. S.
Manjuanth
Presented by:
Anindya Sarkar
Vision Research Lab,
Department of Electrical & Computer Engg,
University of California, Santa Barbara
April 16, 2007
April 13, 2020
information bits to be
embedded
BASIC DATA HIDING SYSTEM
011100111001
Retrieve the embedded
information bits
110011001111
Encode information bits by
adding redundancy
011100111001
110011001111
11010101010010111111
100111…….1111111110
Embed bits
Noisy
channel
(coding or
benign
attacks)
Original image (host
signal or cover)
April 13, 2020
Stego image (with
embedded data)
Image, after
coding or benign
attacks
Ways to detect hiding
PERCEPTUAL
TRANSPARENCY
YES
Focus of
steganography and
steganalysis work
STATISTICAL
TRANSPARENCY
To ensure
undetectability based
on this setup
Received Image
Model for0.4
0.3
Cover
Image’s 0.2
0.1
PMF
0.4
Image 0.3
PMF 0.2
0
0.1
In DCT 0
domain
-4 -3 -2 -1 0 1 2 3 4
April 13, 2020
NOT
SURE
-4 -3 -2 -1 0 1 2 3 4
Model for0.3
0.2
Stego
Image’s 0.1
0
PMF
-4 -3 -2 -1 0 1 2 3 4
Make stego
pmf very
close to
cover pmf
model
Make stego
pmf very
close to
original
cover pmf
Steganography – main contributions
• Restoration of nth order co-occurrence statistics,
based on correspondence between Earth
Mover’s Distance and Statistical Restoration
framework
• Locally optimal method that restores intra and
inter-block correlation
• Result – resisting detection using 1D, 2D and
joint intra and inter block based statistics –
robust steganography method
April 13, 2020
Random
Random
detector
detector
Steganalysis performed using the 4
different features: the statistical
compensation was done using 2-D
EMD on non-overlapping pairs,
belonging to the same row of a 8x8
block
April 13, 2020
Steganalysis performed using the 4
different features: the statistical
compensation was done using joint
intra & inter- block compensation
bincount
Histogram
Original dataset X
X=H U C: H for hiding, C for compensation
H
Bin indices (values taken by X)
C
^
When H is used for hiding, H changes to H: pmf changes
H,hidden
^
(H)
C
^
Using C for compensation, C is changed to C: we restore original pmf
H,hidden C,compensated
^
^
(H)
(C)
April 13, 2020
STATISTICAL RESTORATION SETUP
Histogram difference before compensation
Histogram difference after compensation
1200
25
1000
20
15
800
10
600
400
Image
200
:10%
hiding
0
5
0
-5
-10
-200
-15
-400
-600
-40
-20
-30
-20
-10
0
10
20
30
40
-25
-40
-30
-20
-10
0
10
20
30
40
Histogram difference, considering joint intra-inter correlation, before and after
compensation: Max value in LHS=1200, in RHS=25: 1D pmf is compensated
After
compensation
After
compensation
Intra-block (left) and inter-block (right) histogram (absolute) difference
matrix, plotted in log scale (white: very high value, black: very low value)
April 13, 2020
Histogram difference before compensation
Histogram difference after compensation
2500
40
30
2000
20
1500
10
image:
20%
1000
0
-10
500
hiding
0
-20
-30
-40
-500
-50
-1000
-40
-30
-20
-10
0
10
20
30
40
-60
-40
-30
-20
-10
0
10
20
30
40
Histogram difference, considering joint intra-inter correlation, before and after
compensation: Max value in LHS=2500, in RHS=50: 1D pmf is compensated
After
compensation
After
compensation
Intra-block (left) and inter-block (right) histogram (absolute) difference
matrix, plotted in log scale (white: very high value, black: very low value)
April 13, 2020
Histogram
bincount
EMD based flow helps to convert a given pmf to another
with minimum changes
After
compensation
a
b
c
d
e
bin index
pmf of C (part of X to be
used for compensation)
f
a
b
c
d
e
f
Target pmf of C (that
ensures pmf matching)
EMD solution: it gives the redistribution of weights (flows) among the bins
such that ∑ ∑ D.F is minimized (D: inter cluster distance, F: inter cluster flow)
Problems – cannot restore both intra and inter-block statistics, handle overlapping
pairs and determine the optimal perturbations per coefficient,
April 13, 2020
Clockwise from top left:
zigzag intra-block scanning,
alternate scanning across rows of an
image to obtain inter-correlated blocks,
matrix A with Nc columns, Nc being no. of
AC DCT terms chosen per block and Nb
rows (no. of 8x8 blocks in image) –
April 13, 2020
C-compensation point, Hnon-compensation point
(may be used for hiding)
H and C locations
alternate
April 13, 2020
If N is a C-point, then the points
T,B,L and R are all H-points. Given
a C-point, say N, we compute the
bin-counts in the pairs (L,N), (N,R)
(T,N) and (N,B)
(Nc terms)
4 AC DCT coefficients per block
1
1
L
2
2
1
1
1
With respect to
current point N,
T
N
B1
1
2
R
3
3
2
1
1
2
2
2
inter-block histogram,
computed using
T=top, B1=bottom
overlapping pairs,
column-wise
L=left, R=right
neighbor
4
2
(1,1) (1,2) (2,1) (2,2)
5
Bin-count
4 8x8 blocks
(Nr terms)
2
intra-block histogram,
computed using
overlapping pairs, row-wise
5
1
1
(1,1) (1,2) (2,1) (2,2)
Histogram bins
Intra and inter-block histogram computation for the Nr x Nc joint
correlation matrix A (here Nc=Nr=4)
April 13, 2020
Details of the Joint Intra-Inter Block based Scheme
L et B i n t r a and B i n t er denot e t he int r a-block and int er -block bincount s obt ained
P using t he m at r ix A.
B i n t r a (a; b) = P
I ; I i j = 1 if f A i j = a; A i ;j + 1 = bg else 0
i ;j i j
B i n t er (a; b) =
J i j ; J i j = 1 if f A i j = a; A i + 1;j = bg else 0
i ;j
A ft er dat a hiding w it hout com p ensat ion, let t he m odi¯ed int r ablock and int er -block bin-count s of t he m at r ix A b e called B 0
and
intr a
B 0 , r esp ect ively. L et us consider t he elem ent A i j , w hich equals
i n t er
N , w hile it s D 4 neighb or s ar e A i ;j ¡ 1 = L ( left ) , A i ;j + 1 = R ( r ight ) ,
A i ¡ 1;j = T ( t op) and A i + 1;j = B 1 ( b ot t om )
Since we allow a p er t ur bat ion of only § 1, N can b e m app ed t o one
of f N ¡ 1; N ; N + 1g. W e com put e t he 4 bin-count di®er ence values for
N 0 2 f N ¡ 1; N ; N + 1g:
D(N 0; 1) = B i n t r a (L ; N 0) ¡ B 0
(L ; N 0)
intr a
D(N 0; 2) = B i n t r a (N 0; R) ¡ B 0
(N 0; R)
intr a
D(N 0; 3) = B i n t er (T; N 0) ¡ B 0 (T; N 0)
i n t er
D(N 0; 4) = B i n t er (N 0; B 1 ) ¡ B 0 (N 0; B 1 )
i n t er
April 13, 2020
Determining the Optimal perturbation for each point
T he squar ed di®er ence b et ween t he or iginal and m odi¯ed hist ogr am s for t he int r a and int er -block cases ar e consider ed. A m ax imum of 4£ 3= 12 D t er m s m ay var y dep ending on how N is changed, as
in t he expr ession for t he squar ed er r or cost funct ion J . N is conver t ed
t o t hat N opt for w hich t he squar ed di®er ence t er m J is m inim ized.
J (N + ±) =
X4
f D(N ; i ) + 1 ¡ I ±;0 g2 +
i= 1
X4
+
X4
f D(N ¡ 1; i ) ¡ I ±;¡ 1 g2
i= 1
f D(N + 1; i ) ¡ I ±;1 g2 ; ± = f ¡ 1; 0; 1g
i= 1
w her e t he indicat or funct ion I ±;k = 1 if ± = k and = 0 ot her w ise
N opt = ar g m in 0 0
J (N 0)
N ; N 2 f N ¡ 1;N ;N + 1g
W e r ep eat t his pr ocess t o obt ain a locally opt im al solut ion for each
com p ensat ion locat ion of A.
April 13, 2020
Random
Random
detector
detector
Steganalysis performed using the 4
different features: the statistical
compensation was done using 2-D
EMD on non-overlapping pairs,
belonging to the same row of a 8x8
block
April 13, 2020
Steganalysis performed using the 4
different features: the statistical
compensation was done using joint
intra & inter- block compensation
Conclusions
•
Correspondence between EMD – used for PMF
matching as an image similarity measure, and the
statistical restoration based steganography framework
•
Shortcomings of EMD framework have been tackled
using the joint correlation matrix locally optimum
method
•
We get close to perfect security for various 2D features
April 13, 2020
QUESTIONS??
April 13, 2020
Download