Efficient Steganography in JPEG Images by ...
Type de document :
Compte-rendu et recension critique d'ouvrage
Titre :
Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector
Auteur(s) :
Cogranne, Rémi [Auteur]
Laboratoire Modélisation et Sûreté des Systèmes [LM2S]
Giboulot, Quentin [Auteur]
Laboratoire Modélisation et Sûreté des Systèmes [LM2S]
Bas, Patrick [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Laboratoire Modélisation et Sûreté des Systèmes [LM2S]
Giboulot, Quentin [Auteur]
Laboratoire Modélisation et Sûreté des Systèmes [LM2S]
Bas, Patrick [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Titre de la revue :
IEEE Transactions on Information Forensics and Security
Pagination :
1328 - 1343
Éditeur :
Institute of Electrical and Electronics Engineers
Date de publication :
2021-09-01
ISSN :
1556-6013
Mot(s)-clé(s) en anglais :
Steganography
steganalysis
JPEG images
hypothesis testing
statistical modeling
steganalysis
JPEG images
hypothesis testing
statistical modeling
Discipline(s) HAL :
Statistiques [stat]/Méthodologie [stat.ME]
Statistiques [stat]/Applications [stat.AP]
Sciences de l'ingénieur [physics]/Traitement du signal et de l'image [eess.SP]
Informatique [cs]/Cryptographie et sécurité [cs.CR]
Statistiques [stat]/Applications [stat.AP]
Sciences de l'ingénieur [physics]/Traitement du signal et de l'image [eess.SP]
Informatique [cs]/Cryptographie et sécurité [cs.CR]
Résumé en anglais : [en]
Since the introduction of adaptive steganography, most of the recent research works seek at designing cost functions that are evaluated against steganalysis methods. While those approaches have been successful, they rely ...
Lire la suite >Since the introduction of adaptive steganography, most of the recent research works seek at designing cost functions that are evaluated against steganalysis methods. While those approaches have been successful, they rely on intuitive principles and ad-hoc costs associated with each pixel or Discrete Cosine Transform (DCT) coefficient. Beyond the empirical assessments, the insights one can get from such approaches are very limited. On the opposite, this paper presents an original method for steganography in JPEG images that exploits a statistical model of the DCT coefficients. Within the framework of hypothesis testing theory, we use a statistical model of covers to derive the analytical expression of the most powerful detector. The objective of the steganographer is to minimize the statistical performance of this “omniscient detector” which represents a “worst-case” scenario for security. This paper shows how this method allows designing effective steganography, in terms of both security and computational complexity, in the two main use cases: when having only one single JPEG image and when the uncompressed image is available, case also known as Side-Informed (SI). A wide range of numerical comparisons shows that the proposed method outperforms the current state-of-the-art especially against the latest and most accurate steganalysis approaches based on Deep Learning.Lire moins >
Lire la suite >Since the introduction of adaptive steganography, most of the recent research works seek at designing cost functions that are evaluated against steganalysis methods. While those approaches have been successful, they rely on intuitive principles and ad-hoc costs associated with each pixel or Discrete Cosine Transform (DCT) coefficient. Beyond the empirical assessments, the insights one can get from such approaches are very limited. On the opposite, this paper presents an original method for steganography in JPEG images that exploits a statistical model of the DCT coefficients. Within the framework of hypothesis testing theory, we use a statistical model of covers to derive the analytical expression of the most powerful detector. The objective of the steganographer is to minimize the statistical performance of this “omniscient detector” which represents a “worst-case” scenario for security. This paper shows how this method allows designing effective steganography, in terms of both security and computational complexity, in the two main use cases: when having only one single JPEG image and when the uncompressed image is available, case also known as Side-Informed (SI). A wide range of numerical comparisons shows that the proposed method outperforms the current state-of-the-art especially against the latest and most accurate steganalysis approaches based on Deep Learning.Lire moins >
Langue :
Anglais
Vulgarisation :
Non
Projet ANR :
Collections :
Source :
Fichiers
- https://hal-utt.archives-ouvertes.fr/hal-03342645/document
- Accès libre
- Accéder au document
- https://hal-utt.archives-ouvertes.fr/hal-03342645/document
- Accès libre
- Accéder au document
- https://hal-utt.archives-ouvertes.fr/hal-03342645/document
- Accès libre
- Accéder au document
- https://hal-utt.archives-ouvertes.fr/hal-03342645/document
- Accès libre
- Accéder au document
- document
- Accès libre
- Accéder au document
- TIFS_J_MiPOD_R2_AD.pdf
- Accès libre
- Accéder au document
- document
- Accès libre
- Accéder au document
- TIFS_J_MiPOD_R2_AD.pdf
- Accès libre
- Accéder au document