Double Embedding Steganalysis: Steganalysis with Low False Positive Rate

M. Steinebach, A. Ester, Huajian Liu, Sascha Zmuzinksi
{"title":"Double Embedding Steganalysis: Steganalysis with Low False Positive Rate","authors":"M. Steinebach, A. Ester, Huajian Liu, Sascha Zmuzinksi","doi":"10.1145/3267357.3267364","DOIUrl":null,"url":null,"abstract":"The rise of social networks during the last 10 years has created a situation in which up to 100 million new images and photographs are uploaded and shared by users every day. This environment poses a ideal background for those who wish to communicate covertly by the use of steganography. It also creates a new set of challenges for steganalysts, who have to shift their field of work away from a purely scientific laboratory environment and into a diverse real-world scenario, while at the same time having to deal with entirely new problems, such as the detection of steganographic channels or the impact that even a low false positive rate has when investigating the millions of images which are shared every day on social networks. We evaluate how to address these challenges with traditional steganographic and statistical methods, rather then using high performance computing and machine learning. By the double embedding attack on the well-known F5 steganographic algorithm we achieve a false positive rate well below known attacks.","PeriodicalId":263315,"journal":{"name":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3267357.3267364","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The rise of social networks during the last 10 years has created a situation in which up to 100 million new images and photographs are uploaded and shared by users every day. This environment poses a ideal background for those who wish to communicate covertly by the use of steganography. It also creates a new set of challenges for steganalysts, who have to shift their field of work away from a purely scientific laboratory environment and into a diverse real-world scenario, while at the same time having to deal with entirely new problems, such as the detection of steganographic channels or the impact that even a low false positive rate has when investigating the millions of images which are shared every day on social networks. We evaluate how to address these challenges with traditional steganographic and statistical methods, rather then using high performance computing and machine learning. By the double embedding attack on the well-known F5 steganographic algorithm we achieve a false positive rate well below known attacks.
双嵌入隐写分析:具有低假阳性率的隐写分析
在过去的10年里,社交网络的兴起创造了一个局面,每天有多达1亿的新图像和照片被用户上传和分享。这种环境为那些希望通过隐写术进行秘密通信的人提供了理想的背景。这也给隐写分析人员带来了一系列新的挑战,他们必须将他们的工作领域从纯粹的科学实验室环境转移到多样化的现实世界场景中,同时还必须处理全新的问题,例如检测隐写通道,或者在调查每天在社交网络上分享的数百万张图像时,即使是低误报率也会产生影响。我们评估了如何用传统的隐写术和统计方法来应对这些挑战,而不是使用高性能计算和机器学习。通过对著名的F5隐写算法的双重嵌入攻击,我们实现了远低于已知攻击的误报率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信