Detectability-based JPEG steganography ...
Document type :
Compte-rendu et recension critique d'ouvrage
Title :
Detectability-based JPEG steganography modeling the processing pipeline: the noise-content trade-off
Author(s) :
Giboulot, Quentin [Auteur]
Laboratoire Modélisation et Sûreté des Systèmes [LM2S]
Cogranne, Rémi [Auteur]
Laboratoire Modélisation et Sûreté des Systèmes [LM2S]
Bas, Patrick [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Laboratoire Modélisation et Sûreté des Systèmes [LM2S]
Cogranne, Rémi [Auteur]
Laboratoire Modélisation et Sûreté des Systèmes [LM2S]
Bas, Patrick [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Journal title :
IEEE Transactions on Information Forensics and Security
Pages :
2202-2217
Publisher :
Institute of Electrical and Electronics Engineers
Publication date :
2021-01-08
ISSN :
1556-6013
English keyword(s) :
Steganography
Steganalysis
Discrete cosine transforms
Digital Imaging pipeline
Steganalysis
Discrete cosine transforms
Digital Imaging pipeline
HAL domain(s) :
Informatique [cs]/Cryptographie et sécurité [cs.CR]
Informatique [cs]/Traitement du signal et de l'image [eess.SP]
Statistiques [stat]/Applications [stat.AP]
Informatique [cs]/Traitement du signal et de l'image [eess.SP]
Statistiques [stat]/Applications [stat.AP]
English abstract : [en]
The current art of steganography shows that schemes using a deflection criterion (such as MiPOD) for JPEG steganography are usually subpar with respect to distortionbased schemes. We link this lack of performance to a poor ...
Show more >The current art of steganography shows that schemes using a deflection criterion (such as MiPOD) for JPEG steganography are usually subpar with respect to distortionbased schemes. We link this lack of performance to a poor estimation of the variance of the model of the noise on the cover image. However, this statistically-based method provides a better assessment of the detectability of hidden data as well as theoretical guarantees under a given model. In this paper, we propose a method to obtain better estimates of the variances of DCT coefficients by taking into account the dependencies introduced by development pipeline on pixels. A second method, which is a side-informed extension of Gaussian Embedding in the JPEG domain using quantization error as side-information, is also formulated and shown to achieve state-of-the-art performances. Eventually, the trade-off between noise and content complexity in steganography is thoroughly analyzed through the lenses of these two new methods using a wide range of numerical experiments.Show less >
Show more >The current art of steganography shows that schemes using a deflection criterion (such as MiPOD) for JPEG steganography are usually subpar with respect to distortionbased schemes. We link this lack of performance to a poor estimation of the variance of the model of the noise on the cover image. However, this statistically-based method provides a better assessment of the detectability of hidden data as well as theoretical guarantees under a given model. In this paper, we propose a method to obtain better estimates of the variances of DCT coefficients by taking into account the dependencies introduced by development pipeline on pixels. A second method, which is a side-informed extension of Gaussian Embedding in the JPEG domain using quantization error as side-information, is also formulated and shown to achieve state-of-the-art performances. Eventually, the trade-off between noise and content complexity in steganography is thoroughly analyzed through the lenses of these two new methods using a wide range of numerical experiments.Show less >
Language :
Anglais
Popular science :
Non
ANR Project :
Collections :
Source :
Files
- https://hal.archives-ouvertes.fr/hal-03096658/document
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-03096658/document
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-03096658/document
- Open access
- Access the document
- document
- Open access
- Access the document
- Template4_postAQ.pdf
- Open access
- Access the document
- Template4_postAQ.pdf
- Open access
- Access the document