Natural Steganography: cover-source switching ...
Type de document :
Pré-publication ou Document de travail
Titre :
Natural Steganography: cover-source switching for better steganography
Auteur(s) :
Bas, Patrick [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]

Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Discipline(s) HAL :
Sciences de l'ingénieur [physics]/Traitement du signal et de l'image [eess.SP]
Résumé en anglais : [en]
This paper proposes a new steganographic scheme relying on the principle of " cover-source switching " , the key idea being that the embedding should switch from one cover-source to another. The proposed implementation, ...
Lire la suite >This paper proposes a new steganographic scheme relying on the principle of " cover-source switching " , the key idea being that the embedding should switch from one cover-source to another. The proposed implementation, called Natural Steganography, considers the sensor noise naturally present in the raw images and uses the principle that, by the addition of a specific noise the steganographic embedding tries to mimic a change of ISO sensitivity. The embedding methodology consists in 1) perturbing the image in the raw domain, 2) modeling the perturbation in the processed domain, 3) embedding the payload in the processed domain. We show that this methodology is easily tractable whenever the processes are known and enables to embed large and undetectable payloads. We also show that already used heuristics such as synchronization of embedding changes or detectability after rescaling can be respectively explained by operations such as color demosaicing and down-scaling kernels.Lire moins >
Lire la suite >This paper proposes a new steganographic scheme relying on the principle of " cover-source switching " , the key idea being that the embedding should switch from one cover-source to another. The proposed implementation, called Natural Steganography, considers the sensor noise naturally present in the raw images and uses the principle that, by the addition of a specific noise the steganographic embedding tries to mimic a change of ISO sensitivity. The embedding methodology consists in 1) perturbing the image in the raw domain, 2) modeling the perturbation in the processed domain, 3) embedding the payload in the processed domain. We show that this methodology is easily tractable whenever the processes are known and enables to embed large and undetectable payloads. We also show that already used heuristics such as synchronization of embedding changes or detectability after rescaling can be respectively explained by operations such as color demosaicing and down-scaling kernels.Lire moins >
Langue :
Anglais
Collections :
Source :
Fichiers
- https://hal.archives-ouvertes.fr/hal-01360024/document
- Accès libre
- Accéder au document
- http://arxiv.org/pdf/1607.07824
- Accès libre
- Accéder au document
- https://hal.archives-ouvertes.fr/hal-01360024/document
- Accès libre
- Accéder au document
- https://hal.archives-ouvertes.fr/hal-01360024/document
- Accès libre
- Accéder au document
- document
- Accès libre
- Accéder au document
- 1607.07824v1.pdf
- Accès libre
- Accéder au document
- 1607.07824
- Accès libre
- Accéder au document