steganolysis by bit
TRANSCRIPT
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 1/50
By
-chandana kaza
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 2/50
` Steganography
` Steganalysis
` Conventional methods` Machine learning based steganalysis
` Experiments and results
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 3/50
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 4/50
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 5/50
` Passive warden-examines and determines whether the
message contains hidden message.
` Active warden-alters the message, even though there is
no trace of secret message.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 6/50
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 7/50
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 8/50
` Not suited Images with low number of colors
Images with unique semantic content
` Best suited Gray scale images
Uncompressed scans of photographs
Images captured by digital camera
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 9/50
` Simple and straight forward
` Embed message into the least significant bit plane.
` Difficult to be found by human eye.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 10/50
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 11/50
Cover image Stego image
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 12/50
` To detect the existence of steganography
` Estimate the message length
` Extract hidden information
` Achieved by exploiting differences between files.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 13/50
` 2 types of LSB embedding Sequential
Non-sequential
Classifying of steganalysis techniques
Instance based
Non-instance based
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 14/50
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 15/50
` The 2 Method [Pfitzmann and Westf eld]
` Splits images into segments
` Calculate 2 co-efficients f or ever y segments
` Decide whether there is hidden message.
` Suitable f or sequentisl LSB
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 16/50
` If embedded message bit and original bit are different
then, flip bit.
` Technique
Let pixel value=j
If j=2i, after flip j=2i+1
If j=2i+1, after flip j=2i
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 17/50
` Combines 2 pixel values 2i and 2i+1 together as a pair,
and the two values differ in the lowest bit.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 18/50
` Let frequencies of flip bits be h2i and h2i+1 .
` After embedding (h2i*=(h2i+h2i+1)/2), expectation of
h2i.
` Difference between h2i and h2i+1 can be determined
` Calculate the probability p
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 19/50
` Where k is the total number of all possible pixels.
` If p is close to 1 then image is embedded.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 20/50
` Suitable for any type of situation.
` Exploits spatial correlation in images.
` Based on analyzing how the number of R and S groups
changes with the increased message length embedded
in LSB plane.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 21/50
` Technique
Consider a MXN image with pixel values from set p.
For gray scale p={0««255}
Divide the image into disjoint groups of n adjacent pixels.
Define a discrimination function f(xl . . . . . xn)ER that assigns
a real number to each pixel group
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 22/50
Purpose of the function is to quantify the smoothness or
³regularity´ of the group of pixels.
The noisier the group of pixels G=(x1«.xn), the larger the value of the discrimination function.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 23/50
o Define an invertible operation F on p called flipping.
o LSB Flipping F1:0<->1,2<->3,«.,254<->255
o Shifted Lsb Flipping F-1:-1<->0,1<->2,«.,255<->256
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 24/50
` Depending on the above operation we define 3 pixel
groups
` Where F(G)=(F(x1),«.f(xn))
` The flipping function can be captured by a mask M,
which is a n-tuple with values -1,0,1.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 25/50
` Number of R groups for mask M:RM
` Number of singular groups:SM
` Statistical hypothesis
For typical image
This theory is violated after randomizing the LSB
plane.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 26/50
` Randomization of the LSB plane forces
ie, the difference tend to become
zero as the message length increases.
` In the case of R -M and S-M the opposite
happens.
Sm Rm $
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 27/50
` P is the length of message.
` The initial measurement of R and S groups is R M( p/2),
S M (p/2), R- M (p/2), and
` S- M (p/2)
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 28/50
` The points RM(p/2), RM(1/2), RM(1-p/2) and
SM(p/2), SM(1/2), SM(1-p/2) determine 2 parabolas.
` Now calculate the root of the quadratic equation
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 29/50
` The above equation is obtained by linearly re-scaling
the x-axis.
` p/2 becomes 0 and 100-p/2 becomes 1
` The message length P is calculated from the root of the
equation
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 30/50
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 31/50
` Learning denotes changes in the system that
enable the system to do the same task more
effectively next time.
` Ex: classify an object as an instance
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 32/50
` The conventional methods just used some hypothesis
observed heuristically.
` If they are differences between the real model and fixedmodel, they will fail.
` ML is used to reduce the errors brought by fixed
models.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 33/50
` For hidden information detection simple
classifiers are used.
` Using machine learning the quality of
classifiers will be improved and successively
more stable performance can be acquired.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 34/50
` Hidden information process is treated as classification
process.
` I/p-images` O/p-class labels
` The data set is built based on the values in 2 and RS
methods.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 35/50
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 36/50
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 37/50
` Training set: A portion of data set used to fit(train) a model for
prediction or classification of values that are known in the
training set, but unknown in (future)data.
` Test set: A set of data used only to assess the performance
[generalization] of a fully-specified classifier.
` Feature extraction: Transforming the input data into the set of
features to reduce redundant information is called featur es extraction.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 38/50
` 24 bit color images are collected
` Embed different length of messages into images
` Extract features using different methods for sequential and
non-sequential cases.
` Perform preprocessing
` Every image will result an instance represented by a set of
features in the data set.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 39/50
` Build the experiment platform on WEKA
` Test results on different machine learning methods.
Naïve Bayes
Bayes networks Decision trees
KNN
SVM
Neural networks
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 40/50
` Apply ML-based classifier on POV3 algorithm.
` The LSB bit-plane is treated as sequential pixel samples andis split into 100 segments.
` For every segment, the 2 probability for all the pixels fromthe first segment to current one is calculated.
` We get 300 coefficients, simple 2 then make a decision
according to a threshold.
` But our method uses these as features and constructclassifiers.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 41/50
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 42/50
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 43/50
` Precision 1/Image complexity
` Precision embed rate
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 44/50
Because most of the pictures are in high complexitylevel 2-4, so ML-based methods generally perform better than simple 2 .
Conclude that applying machine learning to 2 caneffectively improve the accuracy
Classifier wrapped conventional steganalysis
maybe a good solution to detect sequential LSBsteganography.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 45/50
` We use RS approach in this case
` The differences between R±M(p/2), and S±M(p/2),
increase when message length p increases.
` The features are calculated using the difference
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 46/50
` Direct difference is not used in order to reducethe bias between different images.
` Test this feature based methods with MLtechniques.
` Main focus is on the change of embed rate, thedifference between different intrinsiccomplexities.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 47/50
Precision
(RMS)Embed 0.1 Embed 0.2 Embed 0.5 Embed 1.0
Embed All
Mixed
Naive Bayes 50.90%(0.59) 53.80%(0.57) 54.90%(0.45) 94.56%(0.31) 80.48%(0.37)
Bayes Net 89.21%(0.27) 95.85%(0.17) 99.35%(0.07) 99.45%(0.07) 95.44%(0.18)
kNN 92.16%(0.28) 97.55%(0.16) 99.45%(0.07) 99.70%(0.05) 96.38%(0.19)
J48 94.11%(0.27) 98.05%(0.14) 99.40%(0.08) 99.65%(0.06) 97.56%(0.14)
SMO 59.39%(0.64) 75.32%(0.50) 93.21%(0.26) 96.70%(0.18) 80.90%(0.44)
BP 53.10%(0.50) 54.10%(0.50) 52.70%(0.50) 56.80%(0.50) 80.00%(0.40)
Threshold RS 95.30% 98.75% 99.70% 87.11% 97.38%
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 48/50
yFrom table, we can see that J48 performs best in
mixed embed rate case, and can get nearly 98%
accuracy at all embed levels.
yWe use only two features, this result is comparable
to 2 case in sequential embedding and is better
than threshold based RS can do.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 49/50
` 1. http://www.cs.waikato.ac.nz/ml/weka/.
` 2. http://www.outguess.org/.
` 3. S. Antani, R. Kasturi, and R. Jain. A survey on the use of pattern recognition methods for abstraction,indexing and
retrieval of images and video. P att er n Recog nition , 35(4):945{965, 2002.
` 4.G. Berg, I. Davidson, M.-Y. Duan, and G. Paul. Searching for hidden messages: Automatic detection of steganography. In IAAI , pag es 51-56, 2003.
` 5. M. Morkel. St e ganography And St e ganaly si s , IC S A Research Group. University of Pretoria, South Africa. January 2005.
` 6. Y.-M. Di, H. Liu, A. Ramineni, and A. Sen. Detecting hidden information in images: A comparative study. In 2nd
Work shop on P rivacy P r eservin g Data Minin g ( PP DM), 2003.
` 7. S. Dumitrescu, X. Wu, and Z. Wang. Detection of lsb steganography via sample pair analysis. In I n f ormationHid in g 5th
I nt er national Work shop I H 2002 Revi sed P aper s , Lectur e Not es in C omput erScience vol . 2578, pag es 355{372, 2003.
` 8. J. J. Fridrich. Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes.
In I n f ormationHid in g 6 th I nt er national Work shop I H 2004 Revi sed S el ect ed P aper s , Lectur e Not es in C omput er Science vol .
3200, pages 67{81, 2004.
8/8/2019 Steganolysis by Bit
http://slidepdf.com/reader/full/steganolysis-by-bit 50/50
Thank you