Skip to main navigation Skip to search Skip to main content

Turning Cost-Based Steganography into Model-Based

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations

Abstract

Most modern steganographic schemes embed secrets by minimizing the total expected cost of modifications. However, costs are usually computed using heuristics and cannot be directly linked to statistical detectability. Moreover, as previously shown by Ker at al., cost-based schemes fundamentally minimize the wrong quantity that makes them more vulnerable to knowledgeable adversary aware of the embedding change rates. In this paper, we research the possibility to convert cost-based schemes to model-based ones by postulating that there exists payload size for which the change rates derived from costs coincide with change rates derived from some (not necessarily known) model. This allows us to find the steganographic Fisher information for each pixel (DCT coefficient), and embed other payload sizes by minimizing deflection. This rather simple measure indeed brings sometimes quite significant improvements in security especially with respect to steganalysis aware of the selection channel. Steganographic algorithms in both spatial and JPEG domains are studied with feature-based classifiers as well as CNNs.

Original languageEnglish
Title of host publicationIH and MMSec 2020 - Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security
PublisherAssociation for Computing Machinery, Inc
Pages151-159
Number of pages9
ISBN (Electronic)9781450370509
DOIs
StatePublished - Jun 22 2020
Event8th ACM Workshop on Information Hiding and Multimedia Security, IH and MMSec 2020 - Denver, United States
Duration: Jun 22 2020Jun 24 2020

Publication series

NameIH and MMSec 2020 - Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security

Conference

Conference8th ACM Workshop on Information Hiding and Multimedia Security, IH and MMSec 2020
Country/TerritoryUnited States
CityDenver
Period06/22/2006/24/20

Keywords

  • costs
  • fisher information
  • model-based
  • steganalysis
  • steganography

Fingerprint

Dive into the research topics of 'Turning Cost-Based Steganography into Model-Based'. Together they form a unique fingerprint.

Cite this