Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector

Autor: Cogranne, Rémi, Giboulot, Quentin, Bas, Patrick
Přispěvatelé: Laboratoire Informatique et Société Numérique (LIST3N), Université de Technologie de Troyes (UTT), Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 (CRIStAL), Centrale Lille-Université de Lille-Centre National de la Recherche Scientifique (CNRS), Laboratoire Modélisation et Sûreté des Systèmes (LM2S), Université de Technologie de Troyes (UTT)-Université de Technologie de Troyes (UTT), ANR-18-ASTR-0009,ALASKA,Utilisation de grandes bases d'images hétérogènes en stéganalyse pour se rapprocher d'un contexte opérationnel(2018), ANR-16-DEFA-0003,REVEAL,Outils pour la détection de manipulation d'images numériques.(2016)
Jazyk: angličtina
Rok vydání: 2021
Předmět:
Zdroj: IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2021, pp.1-16. ⟨10.1109/TIFS.2021.3111713⟩
IEEE Transactions on Information Forensics and Security, 2021, 17, pp.1328-1343. ⟨10.1109/TIFS.2021.3111713⟩
ISSN: 1556-6013
Popis: International audience; Since the introduction of adaptive steganography, most of the recent research works seek at designing cost functions that are evaluated against steganalysis methods. While those approaches have been successful, they rely on intuitive principles and ad-hoc costs associated with each pixel or Discrete Cosine Transform (DCT) coefficient. Beyond the empirical assessments, the insights one can get from such approaches are very limited. On the opposite, this paper presents an original method for steganography in JPEG images that exploits a statistical model of the DCT coefficients. Within the framework of hypothesis testing theory, we use a statistical model of covers to derive the analytical expression of the most powerful detector. The objective of the steganographer is to minimize the statistical performance of this “omniscient detector” which represents a “worst-case” scenario for security. This paper shows how this method allows designing effective steganography, in terms of both security and computational complexity, in the two main use cases: when having only one single JPEG image and when the uncompressed image is available, case also known as Side-Informed (SI). A wide range of numerical comparisons shows that the proposed method outperforms the current state-of-the-art especially against the latest and most accurate steganalysis approaches based on Deep Learning.
Databáze: OpenAIRE