T. Qiao, Cathel Zitzmann, R. Cogranne, F. Retraint
{"title":"Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters","authors":"T. Qiao, Cathel Zitzmann, R. Cogranne, F. Retraint","doi":"10.1145/2600918.2600932","DOIUrl":"https://doi.org/10.1145/2600918.2600932","url":null,"abstract":"This paper investigates the statistical detection of data hidden within DCT coefficients of JPEG images using a Laplacian distribution model. The main contributions is twofold. First, this paper proposes to model the DCT coefficients using a Laplacian distribution but challenges the usual assumption that among a sub-band all the coefficients follow are independent and identically distributed (i.i.d). In this paper it is assumed that the distribution parameters change from DCT coefficient to DCT coefficient. Second this paper applies this model to design a statistical test, based on hypothesis testing theory, which aims at detecting data hidden within DCT coefficient with the JSteg algorithm. The proposed optimal detector carefully takes into account the distribution parameters as nuisance parameters. Numerical results on simulated data as well as on numerical images database show the relevance of the proposed model and the good performance of the ensuing test.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130752152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video steganalysis based on subtractive probability of optimal matching feature","authors":"Yanzhen Ren, Liming Zhai, Lina Wang, T. Zhu","doi":"10.1145/2600918.2600938","DOIUrl":"https://doi.org/10.1145/2600918.2600938","url":null,"abstract":"This paper presents a novel motion vector (MV) steganalysis method. MV-based steganographic methods exploite the variability of MV to embed messages by modifying MV slightly. However, we have noticed that the modified MVs after steganography cannot follow the optimal matching rule which is the target of motion estimation. It means that steganographic methods conflict with the basic principle of video compression. Aiming at this difference, we proposed a steganalysis feature based on Subtractive Probability of Optimal Matching(SPOM), which statistics the MV's Probability of the Optimal matching (POM) around its neighbors, and extract the classification feature by subtracting the POM of the test video and its recompressed video. Experiment results show that the proposed feature is sensitive to MV-based steganography methods, and outperforms the other methods, especially for high temporal activity video.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114348473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hong Zhang, Yun Cao, Xianfeng Zhao, Weiming Zhang, Nenghai Yu
{"title":"Video steganography with perturbed macroblock partition","authors":"Hong Zhang, Yun Cao, Xianfeng Zhao, Weiming Zhang, Nenghai Yu","doi":"10.1145/2600918.2600936","DOIUrl":"https://doi.org/10.1145/2600918.2600936","url":null,"abstract":"In this paper, with a novel data representation named macroblock partition mode, an effective steganography integrated with H.264/AVC compression is proposed. The main principle is to improve the steganographic security in two directions. First, to embed messages, an internal process of H.264 compression, i.e., the macroblock partition, is slightly perturbed, hence the compression compliance is ensured. Second, to minimize the embedding impact, a high efficient double-layered structure is deliberately designed. In the first layer, the syndrome-trellis codes (STCs) is utilized to perform adaptive embedding, and the costs in visual quality and compression efficiency are both considered to construct the distortion model. In the second layer, facilitated by the wet paper codes (WPCs), an expected 3-bit per change gain in embedding efficiency is obtained.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126790291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic location of frame deletion point for digital video forensics","authors":"Chunhui Feng, Zhengquan Xu, Wenting Zhang, Yanyan Xu","doi":"10.1145/2600918.2600923","DOIUrl":"https://doi.org/10.1145/2600918.2600923","url":null,"abstract":"Detection of frame deletion is of great significance in the field of video forensics. Several approaches have been presented through analyzing the side effect caused by frame deletion. However, most of the current approaches can detect the existence of frame deletion but not the exact location of it. In this paper, we present a method which can directly locate the frame deletion point. Through the analysis of the distinguishing fluctuation feature of motion residual caused by frame deletion compared to interference frames and ordinary video content jitter in tampered video sequence, an algorithm based on the total motion residual of video frame is proposed to detect the frame deletion point. Moreover, an initiative processing procedure for frame motion residual and an adaptive threshold detector are introduced so that the robustness of the detection can be markedly improved. Experimental results show that the proposed algorithm is effective in generalized scenarios such as different encoding settings, rapid or slow motion sequences and multiple group of picture deletion. It also has a high performance that the true positive rate reaches 90% and the false alarm rate is less than 0.8%.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126315359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Audio source authentication and splicing detection using acoustic environmental signature","authors":"Hong Zhao, Yifan Chen, Rui Wang, Hafiz Malik","doi":"10.1145/2600918.2600933","DOIUrl":"https://doi.org/10.1145/2600918.2600933","url":null,"abstract":"Audio splicing is one of the most common manipulation techniques in the audio forensic world. In this paper, the magnitudes of acoustic channel impulse response and ambient noise are considered as the environmental signature and used to authenticate the integrity of query audio and identify the spliced audio segments. The proposed scheme firstly extracts the magnitudes of channel impulse response and ambient noise by applying the spectrum classification technique to each suspected frame. Then, correlation between the magnitudes of query frame and reference frame is calculated. An optimal threshold determined according to the statistical distribution of similarities is used to identify the spliced frames. Furthermore, a refining step using the relationship between adjacent frames is adopted to reduce the false positive rate and false negative rate. Effectiveness of the proposed method is tested on two data sets consisting of speech recordings of human speakers. Performance of the proposed method is evaluated for various experimental settings. Experimental results show that the proposed method not only detects the presence of spliced frames, but also localizes the forgery segments. Comparison results with previous work illustrate the superiority of the proposed scheme.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133225196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks","authors":"Erwin Quiring, Pascal Schöttle","doi":"10.1145/2600918.2600939","DOIUrl":"https://doi.org/10.1145/2600918.2600939","url":null,"abstract":"With unlimited access to a watermark detector, an attacker can use sensitivity attacks to remove the watermark of a digital medium. Randomized detectors and non-parametric decision boundaries are two ways of defending the watermark against these attacks. However, both approaches have their vulnerabilities when used individually. The first enables working with the randomized region boundary. The second still provides reliable information. This paper presents a combination of these two approaches to overcome their shortcomings. We develop a detector that has a randomized region with non-parametric outer boundaries. To empirically evaluate our combination, we apply two attack algorithms: Kalker's attack and Blind Newton Sensitivity Attack. The combination is more effective than the non-parametric boundary alone and comparable with using only the randomized threshold. In addition, we increase security by preventing attacks against the outer boundaries.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124159974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive steganalysis against WOW embedding algorithm","authors":"Weixuan Tang, Haodong Li, Weiqi Luo, Jiwu Huang","doi":"10.1145/2600918.2600935","DOIUrl":"https://doi.org/10.1145/2600918.2600935","url":null,"abstract":"WOW (Wavelet Obtained Weights) [5] is one of the advanced steganographic methods in spatial domain, which can adaptively embed secret message into cover image according to textural complexity. Usually, the more complex of an image region, the more pixel values within it would be modified. In such a way, it can achieve good visual quality of the resulting stegos and high security against typical steganalytic detectors. Based on our analysis, however, we point out one of the limitations in the WOW embedding algorithm, namely, it is easy to narrow down those possible modified regions for a given stego image based on the embedding costs used in WOW. If we just extract features from such regions and perform analysis on them, it is expected that the detection performance would be improved compared with that of extracting steganalytic features from the whole image. In this paper, we first proposed an adaptive steganalytic scheme for the WOW method, and use the spatial rich model (SRM) based features [4] to model those possible modified regions in our experiments. The experimental results evaluated on 10,000 images have shown the effectiveness of our scheme. It is also noted that our steganalytic strategy can be combined with other steganalytic features to detect the WOW and/or other adaptive steganographic methods both in the spatial and JPEG domains.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125840322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"What's the PointiSA?","authors":"S. Ghosh, Jason Hiser, J. Davidson","doi":"10.1145/2600918.2600928","DOIUrl":"https://doi.org/10.1145/2600918.2600928","url":null,"abstract":"Software watermarking, fingerprinting, digital content identification, and many other desirable security properties can be improved with software protection techniques such as tamper resistance and obfuscation. Previous research has demonstrated software protection can be significantly enhanced using a Process-level Virtual Machine (PVM). They can provide robust program protections, particularly at run time, which many other software protection techniques lack. PVMs have been used to provide tamper detection, dynamic code obfuscation, and resistance to static disassembly. Over-all, the presence of PVMs makes it more difficult for the adversary to achieve their goals. Recently, a new attack methodology, called Replacement Attacks, was described that successfully targeted PVM-protected applications. This methodology circumvents execution of the protective PVM instance through the use of another virtual machine to execute the program. The replacement occurs dynamically and allows execution of the application without any PVM-based protections. In this work, we formalize the notion of a replacement attack using a novel model. We then present a defense against such attacks. To the best of our knowledge, this technique is the first defense against replacement attacks. The technique relies on software interpretation of instructions, which forms the basis of PVMs. By carefully modifying the semantics of some individual instructions, it is possible to make the application unusable without the presence of the protective PVM instance. The technique is called PointISA, named after a point function|a function which returns true for only one given input. We provide a formal description of PointISAs and an evaluation of the strength of the approach.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129971841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From StirMark to StirTrace: Benchmarking pattern recognition based printed fingerprint detection","authors":"M. Hildebrandt, J. Dittmann","doi":"10.1145/2600918.2600926","DOIUrl":"https://doi.org/10.1145/2600918.2600926","url":null,"abstract":"Artificial sweat printed fingerprints need to be detected during crime scene investigations of latent fingerprints. Several detection approaches have been suggested on a rather small test set. In this paper we use the findings from StirMark applied to exemplar fingerprints to build a new StirTrace tool for simulating different printer effects and enhancing test sets for benchmarking detection approaches. We show how different influence factors during the printing process and acquisition of the scan sample can be simulated. Furthermore, two new feature classes are suggested to improve detection performance of banding and rotation effects during printing. The results are compared with original existing detection feature space. Our evaluation based on 6000 samples indicates that StirTrace is suitable to simulate influence factors resulting into overall 195000 simulated samples. Furthermore, the original and our extended feature set show resistance towards image manipulations with the exception of scaling (to 50 and 200%) and cropping to 25%. The new feature space enhancement is capable for handling banding, rotation as well as removal of lines and columns and shearing artifacts, while the original feature space performs better for additive noise, median cut and stretching in X-direction.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132305363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gradient based prediction for reversible watermarking by difference expansion","authors":"Ioan-Catalin Dragoi, D. Coltuc, I. Caciula","doi":"10.1145/2600918.2600924","DOIUrl":"https://doi.org/10.1145/2600918.2600924","url":null,"abstract":"This paper proposes a novel predictor, EGBSW (Extended Gradient Based Selective Weighting), and investigates its usefulness in difference expansion reversible watermarking. EGBSW is inspired by GBSW, a causal predictor previously used in lossless image compression and known to outperform well-known predictors as the median edge detector (MED) or the gradient-adjusted predictor (GAP). The proposed predictor operates on a larger prediction context than the one of GBSW, namely a rectangular window of 16 pixels located around the pixel to be predicted. Similar to GBSW, the extended predictor computes the gradients on horizontal, vertical and diagonal directions and selects the smallest two gradients. Opposite to the classical predictor, EGSBW uses a set of four simple linear predictors associated with the four principal directions and computes the output value as a weighted sum between the predicted values corresponding to the selected gradients. The reversible watermarking scheme based on EGBSW appears to outperform not only the ones based on GBSW, MED or GAP, but also some recently proposed schemes based on the average on the rhombus context. Experimental results are provided.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127626202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}