This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: YASS: Yet Another Steganographic Scheme that Resists Blind Steganalysis Kaushal Solanki †† , Anindya Sarkar † , and B. S. Manjunath † † Department of Electrical and Computer Engineering, ⋆⋆ University of California, Santa Barbara, CA 93106 †† Mayachitra Inc., 5266 Hollister Avenue, Santa Barbara, CA 93111 [email protected],[email protected],[email protected] Abstract. A new, simple, approach for active steganography is pro- posed in this paper that can successfully resist recent blind steganaly- sis methods, in addition to surviving distortion constrained attacks. We present Y et A nother S teganographic S cheme (YASS), a method based on embedding data in randomized locations so as to disable the self- calibration process (such as, by cropping a few pixel rows and/or columns to estimate the cover image features) popularly used by blind steganaly- sis schemes. The errors induced in the embedded data due to the fact that the stego signal must be advertised in a specific format such as JPEG, are dealt with by the use of erasure and error correcting codes. For the presented JPEG steganograhic scheme, it is shown that the detection rates of recent blind steganalysis schemes are close to random guessing, thus confirming the practical applicability of the proposed technique. We also note that the presented steganography framework, of hiding in ran- domized locations and using a coding framework to deal with errors, is quite simple yet very generalizable. Key words: data hiding, error correcting codes, steganalysis, steganog- raphy, supervised learning. 1 Introduction Secure communication of a secret message has always been important to people, and it is not surprising that steganography , the art of communicating without revealing its existence, as well as cryptography , the art of concealing the meaning of a message, have a rich history. In this paper, we consider the problem of secure steganography via hiding information in digital images. In steganography, a message signal is embedded into a host or cover signal to get a composite or stego signal in such a way that the presence of hidden information cannot be detected by either statistical or perceptual analysis of the stego signal. In case of ⋆⋆ This research is supported in part by a grant from ONR # N00014-05-1-0816. 2 YASS: Yet Another Steganographic Scheme active steganography, there is an additional requirement that the hidden data must be recoverable even after benign or malicious processing of the stego signal by an adversary. JPEG is arguably the most popular format for storing, presenting, and ex- changing images. It is not surprising that steganography in the JPEG format, and its converse problem of steganalysis of JPEG images to find ones with hid- den data, have received considerable attention from researchers over the past decade. There are many approaches and software available for JPEG steganog- raphy, which include OutGuess , StegHide , model-based steganography ,...
View Full Document
- Fall '11
- Steganalysis, steganographic scheme