steganolysis by bit

50
By -chandana kaza

Upload: atulnandwal

Post on 09-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 1/50

By

-chandana kaza

Page 2: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 2/50

` Steganography

` Steganalysis

` Conventional methods` Machine learning based steganalysis

` Experiments and results

Page 3: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 3/50

Page 4: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 4/50

Page 5: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 5/50

` Passive warden-examines and determines whether the

message contains hidden message.

` Active warden-alters the message, even though there is

no trace of secret message.

Page 6: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 6/50

Page 7: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 7/50

Page 8: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 8/50

` Not suited Images with low number of colors

Images with unique semantic content

` Best suited Gray scale images

Uncompressed scans of photographs

Images captured by digital camera

Page 9: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 9/50

` Simple and straight forward

` Embed message into the least significant bit plane.

` Difficult to be found by human eye.

Page 10: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 10/50

Page 11: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 11/50

Cover  image Stego image

Page 12: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 12/50

` To detect the existence of steganography

` Estimate the message length

` Extract hidden information

` Achieved by exploiting differences between files.

Page 13: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 13/50

` 2 types of LSB embedding Sequential

 Non-sequential

Classifying of steganalysis techniques

Instance based

 Non-instance based

Page 14: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 14/50

Page 15: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 15/50

` The 2 Method [Pfitzmann and Westf eld]

` Splits images into segments

` Calculate 2 co-efficients f or  ever y segments

` Decide whether  there is hidden message.

` Suitable f or sequentisl LSB

Page 16: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 16/50

` If embedded message bit and original bit are different

then, flip bit.

` Technique

Let pixel value=j

If j=2i, after flip j=2i+1

If j=2i+1, after flip j=2i

Page 17: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 17/50

` Combines 2 pixel values 2i and 2i+1 together as a pair,

and the two values differ in the lowest bit.

Page 18: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 18/50

` Let frequencies of flip bits be h2i and h2i+1 .

` After embedding (h2i*=(h2i+h2i+1)/2), expectation of 

h2i.

` Difference between h2i and h2i+1 can be determined

` Calculate the probability p

Page 19: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 19/50

` Where k is the total number of all possible pixels.

` If p is close to 1 then image is embedded.

Page 20: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 20/50

` Suitable for any type of situation.

` Exploits spatial correlation in images.

` Based on analyzing how the number of R and S groups

changes with the increased message length embedded

in LSB plane.

Page 21: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 21/50

` Technique

Consider a MXN image with pixel values from set p.

For gray scale p={0««255}

Divide the image into disjoint groups of n adjacent pixels.

Define a discrimination function f(xl . . . . . xn)ER that assigns

a real number to each pixel group

Page 22: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 22/50

Purpose of the function is to quantify the smoothness or 

³regularity´ of the group of pixels.

The noisier the group of pixels G=(x1«.xn), the larger the value of the discrimination function.

Page 23: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 23/50

o Define an invertible operation F on p called flipping.

o LSB Flipping F1:0<->1,2<->3,«.,254<->255

o Shifted Lsb Flipping F-1:-1<->0,1<->2,«.,255<->256

Page 24: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 24/50

` Depending on the above operation we define 3 pixel

groups

` Where F(G)=(F(x1),«.f(xn))

` The flipping function can be captured by a mask M,

which is a n-tuple with values -1,0,1.

Page 25: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 25/50

`  Number of R groups for mask M:RM

`  Number of singular groups:SM

` Statistical hypothesis

For typical image

This theory is violated after randomizing the LSB

 plane.

Page 26: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 26/50

` Randomization of the LSB plane forces

ie, the difference tend to become

zero as the message length increases.

` In the case of R -M and S-M the opposite

happens.

Sm Rm $

Page 27: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 27/50

` P is the length of message.

` The initial measurement of R and S groups is R M(  p/2),

S  M (p/2), R- M (p/2), and 

` S- M (p/2)

Page 28: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 28/50

` The points RM(p/2), RM(1/2), RM(1-p/2) and

SM(p/2), SM(1/2), SM(1-p/2) determine 2 parabolas.

`  Now calculate the root of the quadratic equation

Page 29: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 29/50

` The above equation is obtained by linearly re-scaling

the x-axis.

`  p/2 becomes 0 and 100-p/2 becomes 1

` The message length P is calculated from the root of the

equation

Page 30: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 30/50

Page 31: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 31/50

` Learning denotes changes in the system that

enable the system to do the same task more

effectively next time.

` Ex: classify an object as an instance

Page 32: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 32/50

` The conventional methods just used some hypothesis

observed heuristically.

` If they are differences between the real model and fixedmodel, they will fail.

` ML is used to reduce the errors brought by fixed

models.

Page 33: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 33/50

` For hidden information detection simple

classifiers are used.

` Using machine learning the quality of 

classifiers will be improved and successively

more stable performance can be acquired.

Page 34: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 34/50

` Hidden information process is treated as classification

 process.

` I/p-images` O/p-class labels

` The data set is built based on the values in 2 and RS

methods.

Page 35: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 35/50

Page 36: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 36/50

Page 37: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 37/50

` Training set: A portion of data set used to fit(train) a model for 

 prediction or classification of values that are known in the

training set, but unknown in (future)data.

` Test set: A set of data used only to assess the performance

[generalization] of a fully-specified classifier.

` Feature extraction: Transforming the input data into the set of 

features to reduce redundant information is called featur es extraction.

Page 38: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 38/50

` 24 bit color images are collected

` Embed different length of messages into images

` Extract features using different methods for sequential and

non-sequential cases.

` Perform preprocessing

` Every image will result an instance represented by a set of 

features in the data set.

Page 39: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 39/50

` Build the experiment platform on WEKA

` Test results on different machine learning methods.

 Naïve Bayes

Bayes networks Decision trees

KNN

SVM

 Neural networks

Page 40: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 40/50

` Apply ML-based classifier on POV3 algorithm.

` The LSB bit-plane is treated as sequential pixel samples andis split into 100 segments.

` For every segment, the 2  probability for all the pixels fromthe first segment to current one is calculated.

` We get 300 coefficients, simple 2 then make a decision

according to a threshold.

` But our method uses these as features and constructclassifiers.

Page 41: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 41/50

Page 42: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 42/50

Page 43: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 43/50

` Precision 1/Image complexity

` Precision embed rate

Page 44: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 44/50

Because most of the pictures are in high complexitylevel 2-4, so ML-based methods generally perform better than simple 2 .

Conclude that applying machine learning to 2 caneffectively improve the accuracy

Classifier wrapped conventional steganalysis

maybe a good solution to detect sequential LSBsteganography.

Page 45: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 45/50

` We use RS approach in this case

` The differences between R±M(p/2), and S±M(p/2),

increase when message length p increases.

` The features are calculated using the difference

Page 46: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 46/50

` Direct difference is not used in order to reducethe bias between different images.

` Test this feature based methods with MLtechniques.

` Main focus is on the change of embed rate, thedifference between different intrinsiccomplexities.

Page 47: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 47/50

Precision

(RMS)Embed 0.1 Embed 0.2 Embed 0.5 Embed 1.0

Embed All 

Mixed

Naive Bayes 50.90%(0.59) 53.80%(0.57) 54.90%(0.45) 94.56%(0.31) 80.48%(0.37)

Bayes Net 89.21%(0.27) 95.85%(0.17) 99.35%(0.07) 99.45%(0.07) 95.44%(0.18)

kNN 92.16%(0.28) 97.55%(0.16) 99.45%(0.07) 99.70%(0.05) 96.38%(0.19)

J48 94.11%(0.27) 98.05%(0.14) 99.40%(0.08) 99.65%(0.06) 97.56%(0.14)

SMO 59.39%(0.64) 75.32%(0.50) 93.21%(0.26) 96.70%(0.18) 80.90%(0.44)

BP 53.10%(0.50) 54.10%(0.50) 52.70%(0.50) 56.80%(0.50) 80.00%(0.40)

Threshold RS 95.30% 98.75% 99.70% 87.11% 97.38%

Page 48: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 48/50

yFrom table, we can see that J48 performs best in

mixed embed rate case, and can get nearly 98% 

accuracy at all embed levels.

yWe use only two features, this result is comparable

to 2 case in sequential embedding and is better 

than threshold based RS can do.

Page 49: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 49/50

` 1. http://www.cs.waikato.ac.nz/ml/weka/.

` 2. http://www.outguess.org/.

` 3. S. Antani, R. Kasturi, and R. Jain. A survey on the use of pattern recognition methods for abstraction,indexing and

retrieval of images and video.  P att er n Recog nition , 35(4):945{965, 2002.

` 4.G. Berg, I. Davidson, M.-Y. Duan, and G. Paul. Searching for hidden messages: Automatic detection of steganography. In IAAI  , pag es 51-56, 2003.

` 5. M. Morkel. St e ganography And St e ganaly si s , IC S  A Research Group. University of Pretoria, South Africa. January 2005.

` 6. Y.-M. Di, H. Liu, A. Ramineni, and A. Sen. Detecting hidden information in images: A comparative study. In 2nd  

Work  shop on  P rivacy  P r eservin g Data Minin g (  PP  DM), 2003.

` 7. S. Dumitrescu, X. Wu, and Z. Wang. Detection of lsb steganography via sample pair analysis. In I n f  ormationHid in g 5th

 I nt er national Work  shop  I  H 2002 Revi sed   P aper  s , Lectur e Not es in C omput erScience vol . 2578, pag es 355{372, 2003.

` 8. J. J. Fridrich. Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes.

In  I n f  ormationHid in g 6 th  I nt er national Work  shop  I  H 2004 Revi sed S el ect ed   P aper  s , Lectur e Not es in C omput er Science vol . 

3200, pages 67{81, 2004.

Page 50: Steganolysis by Bit

8/8/2019 Steganolysis by Bit

http://slidepdf.com/reader/full/steganolysis-by-bit 50/50

Thank you