The ALASKA Steganalysis Challenge: A First ...
Type de document :
Communication dans un congrès avec actes
DOI :
Titre :
The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis "Into The Wild"
Auteur(s) :
Cogranne, Rémi [Auteur]
Laboratoire Modélisation et Sûreté des Systèmes [LM2S]
Giboulot, Quentin [Auteur]
Laboratoire Modélisation et Sûreté des Systèmes [LM2S]
Bas, Patrick [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Laboratoire Modélisation et Sûreté des Systèmes [LM2S]
Giboulot, Quentin [Auteur]
Laboratoire Modélisation et Sûreté des Systèmes [LM2S]
Bas, Patrick [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Titre de la manifestation scientifique :
ACM IH&MMSec (Information Hiding & Multimedia Security)
Ville :
Paris
Pays :
France
Date de début de la manifestation scientifique :
2019-07-03
Titre de la revue :
ACM IH&MMSec (Information Hiding & Multimedia Security)
Mot(s)-clé(s) en anglais :
steganography
steganalysis
contest
forensics
Security and privacy
steganalysis
contest
forensics
Security and privacy
Discipline(s) HAL :
Sciences de l'ingénieur [physics]/Traitement du signal et de l'image [eess.SP]
Informatique [cs]/Traitement des images [eess.IV]
Informatique [cs]/Traitement des images [eess.IV]
Résumé en anglais : [en]
This paper presents ins and outs of the ALASKA challenge, a ste-ganalysis challenge built to reflect the constraints of a forensic steganalyst. We motivate and explain the main differences w.r.t. the BOSS challenge (2010), ...
Lire la suite >This paper presents ins and outs of the ALASKA challenge, a ste-ganalysis challenge built to reflect the constraints of a forensic steganalyst. We motivate and explain the main differences w.r.t. the BOSS challenge (2010), specifically the use of a ranking metric prescribing high false positive rates, the analysis of a large diversity of different image sources and the use of a collection of steganographic schemes adapted to handle color JPEGs. The core of the challenge is also described, this includes the RAW image data-set, the implementations used to generate cover images and the specificities of the embedding schemes. The very first outcomes of the challenge are then presented, and the impacts of different parameters such as demosaicking, filtering, image size, JPEG quality factors and cover-source mismatch are analyzed. Eventually, conclusions are presented, highlighting positive and negative points together with future directions for the next challenges in practical steganalysis.Lire moins >
Lire la suite >This paper presents ins and outs of the ALASKA challenge, a ste-ganalysis challenge built to reflect the constraints of a forensic steganalyst. We motivate and explain the main differences w.r.t. the BOSS challenge (2010), specifically the use of a ranking metric prescribing high false positive rates, the analysis of a large diversity of different image sources and the use of a collection of steganographic schemes adapted to handle color JPEGs. The core of the challenge is also described, this includes the RAW image data-set, the implementations used to generate cover images and the specificities of the embedding schemes. The very first outcomes of the challenge are then presented, and the impacts of different parameters such as demosaicking, filtering, image size, JPEG quality factors and cover-source mismatch are analyzed. Eventually, conclusions are presented, highlighting positive and negative points together with future directions for the next challenges in practical steganalysis.Lire moins >
Langue :
Anglais
Comité de lecture :
Oui
Audience :
Internationale
Vulgarisation :
Non
Projet ANR :
Collections :
Source :
Fichiers
- https://hal.archives-ouvertes.fr/hal-02147763/document
- Accès libre
- Accéder au document
- https://hal.archives-ouvertes.fr/hal-02147763/document
- Accès libre
- Accéder au document
- document
- Accès libre
- Accéder au document
- ALASKA_lesson_learn_Vsubmitted.pdf
- Accès libre
- Accéder au document
- ALASKA_lesson_learn_Vsubmitted.pdf
- Accès libre
- Accéder au document