Multivariate Side-Informed Gaussian Embedding ...
Type de document :
Compte-rendu et recension critique d'ouvrage
Titre :
Multivariate Side-Informed Gaussian Embedding Minimizing Statistical Detectability
Auteur(s) :
Giboulot, Quentin [Auteur]
Laboratoire Modélisation et Sûreté des Systèmes [LM2S]
Bas, Patrick [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Cogranne, Rémi [Auteur]
Laboratoire Modélisation et Sûreté des Systèmes [LM2S]
Laboratoire Modélisation et Sûreté des Systèmes [LM2S]
Bas, Patrick [Auteur]

Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Cogranne, Rémi [Auteur]
Laboratoire Modélisation et Sûreté des Systèmes [LM2S]
Titre de la revue :
IEEE Transactions on Information Forensics and Security
Pagination :
1841 - 1854
Éditeur :
Institute of Electrical and Electronics Engineers
Date de publication :
2022-05-05
ISSN :
1556-6013
Mot(s)-clé(s) en anglais :
Steganography
JPEG images
hypothesis testing
statistical modeling
JPEG images
hypothesis testing
statistical modeling
Discipline(s) HAL :
Informatique [cs]/Cryptographie et sécurité [cs.CR]
Mathématiques [math]/Statistiques [math.ST]
Sciences de l'ingénieur [physics]/Traitement du signal et de l'image [eess.SP]
Mathématiques [math]/Statistiques [math.ST]
Sciences de l'ingénieur [physics]/Traitement du signal et de l'image [eess.SP]
Résumé en anglais : [en]
Steganography schemes based on a deflection criterion for embedding posses a clear advantage against schemes based on heuristics as they provide a direct link between theoretical detectability and empirical performance. ...
Lire la suite >Steganography schemes based on a deflection criterion for embedding posses a clear advantage against schemes based on heuristics as they provide a direct link between theoretical detectability and empirical performance. However, this advantage depends on the accuracy of the cover and stego model underlying the embedding scheme. In this work we propose an original steganography scheme based on a realistic model of sensor noise, taking into account the camera model, the ISO setting and the processing pipeline. Exploiting this statistical model allows us to take correlations between DCT coefficients into account. Several types of dependency models are presented, including a very general lattice model which accurately models dependencies introduced by a large class of processing pipelines of interest. We show in particular that the stego signal which minimizes the KL divergence under this model has a covariance proportional to the cover noise covariance. The resulting embedding scheme achieves state-of-the-art performances which go well beyond the current standards in side-informed JPEG steganography.Lire moins >
Lire la suite >Steganography schemes based on a deflection criterion for embedding posses a clear advantage against schemes based on heuristics as they provide a direct link between theoretical detectability and empirical performance. However, this advantage depends on the accuracy of the cover and stego model underlying the embedding scheme. In this work we propose an original steganography scheme based on a realistic model of sensor noise, taking into account the camera model, the ISO setting and the processing pipeline. Exploiting this statistical model allows us to take correlations between DCT coefficients into account. Several types of dependency models are presented, including a very general lattice model which accurately models dependencies introduced by a large class of processing pipelines of interest. We show in particular that the stego signal which minimizes the KL divergence under this model has a covariance proportional to the cover noise covariance. The resulting embedding scheme achieves state-of-the-art performances which go well beyond the current standards in side-informed JPEG steganography.Lire moins >
Langue :
Anglais
Vulgarisation :
Non
Projet ANR :
Collections :
Source :
Fichiers
- https://hal-utt.archives-ouvertes.fr/hal-03663628/document
- Accès libre
- Accéder au document
- https://hal-utt.archives-ouvertes.fr/hal-03663628/document
- Accès libre
- Accéder au document
- https://hal-utt.archives-ouvertes.fr/hal-03663628/document
- Accès libre
- Accéder au document
- https://hal-utt.archives-ouvertes.fr/hal-03663628/document
- Accès libre
- Accéder au document
- document
- Accès libre
- Accéder au document
- TIFS_final.pdf
- Accès libre
- Accéder au document
- document
- Accès libre
- Accéder au document
- TIFS_final.pdf
- Accès libre
- Accéder au document